Security+: Risk Management Best Practices

Security+: Risk Management Best Practices

Introduction Cybersecurity professionals deal with a constantly changing threat landscape. Information security knowledge becomes obsolete fast and professionals need regular interdisciplinary... Go on to the site to read the full article ... Read More
Security+: Social Engineering Attacks

Security+: Social Engineering Attacks

Introduction Social engineering focuses on the weakness of the human factor. As long as an institution has personnel, there is a risk of being penetrated via social engineering. Researching... Go on to the site to read the full article ... Read More
What Does Your Intelligent Personal Assistant (IPA) Know About You?

What Does Your Intelligent Personal Assistant (IPA) Know About You?

1. Introduction Artificial intelligence (AI) is no longer a theme in science fiction. It is being integrated into our daily life as a result of the high adoption of intelligent appliances.... Go on to the site to read the full article ... Read More
Top 10 Threats from Unprotected Intelligent Personal Assistants (IPAs)

Top 10 Threats from Unprotected Intelligent Personal Assistants (IPAs)

1. Introduction Intelligence personal assistants (IPA), also known as virtual personal assistant (VPA), is the rising star in the high technology industry. It is an intelligent software application... Go on to the site to read the full article ... Read More