The Power of Women in Cybersecurity: Promoting Gender Diversity for a Resilient Future
The field of cybersecurity is of paramount importance in today’s digital age, where threats to personal and organizational data continue
Read MoreThe field of cybersecurity is of paramount importance in today’s digital age, where threats to personal and organizational data continue
Read MoreAbstract: An urgent task at this moment is the use of blockchain technology to ensure the security of medical decision
Read MoreMigrating data to the cloud comes with many unique security considerations. The process itself can result in data loss or
Read MoreAbstract: The darknet terminology is not used consistently among scientific research papers. This can lead to difficulties in regards to
Read MoreThis is the last part in the series. In this article I will be focusing on how to micro segment
Read MoreAbstract: Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods.
Read MoreThe second part of the 3-part series is where the rubber meets the road. The first part was an introduction
Read MoreAbstract: Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant
Read MoreThis is the first article in a 3-part series, looking into the various security features that are part of the
Read MoreAbstract: In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows
Read More