• LOGIN
  • No products in the cart.

All posts by Marta Strzelec

29

Aug'17

Meet our Expert – Petter Anderson Lopes

Meet our Expert: Petter Anderson Lopes – Systems Developer Specialist. – Cybersecurity Specialist Consultant, Pentester, Computer Forensics Expert Witness, Audit and …

Read More

28

Aug'17

Meet Our Expert – Renato Basante Borbolla

Meet Our Expert – Renato Basante Borbolla Born in São Paulo, Brazil. Degree in information security technology. Works as CyberSecurity Analyst, Post-graduation …

Read More

28

Aug'17

Meet our expert – Deivison Franco

Deivison P. Franco: Master in Computer Science and in Business Administration. Specialist in Forensic Science (Emphasis in Computer Forensics) and in …

Read More

23

Aug'17

Will Self-Driving Vehicles Be Safe from Hackers? | by Denmon.Lawyer

With an influx of driverless vehicles scheduled to hit the market within the next few years, some question whether the …

Read More

30

Jun'17

“Educating through a hands-on approach is more effective in the long run” – Interview with Sharon Knowles from Da Vinci Forensics

eForensics Magazine: Hello Sharon, how have you been doing? Can you introduce yourself to our readers? Sharon Knowles: Good Day …

Read More

30

May'17

“Don’t wait for an attack to happen” – Interview with Matan Kubovsky, VP of R&D at illusive networks

eForensics Magazine: Hello Matan, thank you for agreeing to do this interview! Could you tell our readers a little bit …

Read More

19

May'17

Credit Card Fraud: How to Protect Your Business – and Your Customers | by Maricel Tabalba

Credit card fraud is bad news for any business, but for small businesses especially, the financial impact of shipping out …

Read More

10

May'17

PCI FAQs and Myths | by BluePay

PCI FAQs And Myths The Payment Card Industry Security Standards Council developed PCI compliance standards more than a decade ago …

Read More

25

Apr'17

Searching for Intelligence – Understanding a Different Dimension of Security – IBM’s CyberBeat

Check out IBM’s original post here Discussion questions:  Explain the basic methodology of Intelligence (e.g. Intel Cycle) and how it applies …

Read More

19

Apr'17

Data Cleaning Checklist | Infographic by Advizor Solutions

Data Cleaning Checklist courtesy of ADVIZOR Solutions

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013