It’s not a secret anymore, Hackers know our passwords. 551,509,767 real-world passwords previously exposed in data breaches. Are you one...
read more
Developing and Maintaining Secure Products
Here is the recoding link for the ones who missed the session by EC Council Master...
read more
Artificial Intelligence The Ultimate Weapon in the War against Cyber Criminals
For a legion of cybersecurity experts from across the globe,...
read more
Recommended by Hacker News
The Hacker News has just recommended, our book "Cybersecurity Attack and Defense Strategies" which we wrote with...
read more
Free Internet Security Threat Report
Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business.
Symantec’s 2019 Internet Security Threat Report...
read more
STRATEGIC PERSPECTIVE INTO THE TRADECRAFT OF THREAT ACTORS
Phishing and ransomware have been effective weapons for hackers. Even the most sophisticated...
read more
The Art of Human Hacking
If you in Ankara do not miss out the Free BreakFast Event and exclusive Book Signing...
read more
WHAT IS AN ENDPOINT API?
Programs that need to interact with each other communicate through an Application Program Interface (API). The...
read more
Time to patch Windows
Microsoft has just released today (10 July 2019) new patches, and here is what you need to...
read more
What is a CISO ?
A CISO, or Chief Information Security Officer, is primarily responsible for an organization’s cyber security initiatives....
read more
Leave a Reply