Blog

Latest news around the world

15

Nov'19

Detecting Copy-Paste Forgeries in Videos [FREE COURSE CONTENT]

In this video you can get started with detecting forgeries in videos by learning optical flow analysis: and your instructor, …

Read More

14

Nov'19

How Cloud Identity Can Help in Data Privacy and Security | By Sourodip Biswas

How Cloud Identity Can Help in Data Privacy and Security SMAC (Social, Mobile, Analytics and Cloud) have redefined the way …

Read More

09

Nov'19

Child Identity Theft 101 | By Mark Neuzil

Child Identity Theft 101 Originally published here: https://www.slideshare.net/LitvakLawFirm/child-identitytheft101

Read More

08

Nov'19

Why Network Security needs to have Big Data Analytics | By Arslan Hassan

Why Network Security needs to have Big Data Analytics In a nutshell, network security protects the integrity and usability of …

Read More

06

Nov'19

5 Security Measures to Keep Your Mobile Apps Secure | By Keval Padia

5 Security Measures to Keep Your Mobile Apps Secure The luxury of accessing almost every activity from our smartphones comes …

Read More

05

Nov'19

How Face Recognition Could Reduce Organized Crime | By Kevin Martez

How Face Recognition Could Reduce Organized Crime Organized crime includes all criminal activities that are planned and executed by strong, …

Read More

05

Nov'19

How to become a Cybersecurity Architect by Sai Digbijay Patnaik

Security architects, or cybersecurity architects, are responsible for creating a safe and secure environment for the data/information stored in devices, …

Read More

04

Nov'19

Top 10 IoT Security Challenges to Expect in 2020 | By Cathy Trimidal

Top 10 IoT Security Challenges to Expect in 2020 The Internet of Things (IoT) is one of the most hyped …

Read More

30

Oct'19

Encrypted file system forensics - Introduction (EXT4) [FREE COURSE CONTENT]

In this video from our EXT4 File System Forensics by Divya Lakshmanan you will get a quick intro to dealing …

Read More

25

Oct'19

Why Network Security needs to have Big Data Analytics? | By Arslan

Why Network Security needs to have Big Data Analytics? In a nutshell, network security protects the integrity and usability of …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center

Necessary

Cookies that are necessary for the site to function properly. This includes, storing the user's cookie consent state for the current domain, managing users carts to using the content network, Cloudflare, to identify trusted web traffic. See full Cookies declaration

gdpr, PYPF, woocommerce_cart_hash, woocommerce_items_in_cart, _wp_wocommerce_session, __cfduid [x2]

Performance

These are used to track user interaction and detect potential problems. These help us improve our services by providing analytical data on how users use this site.

_global_lucky_opt_out, _lo_np_, _lo_cid, _lo_uid, _lo_rid, _lo_v, __lotr
_ga, _gid, _gat, __utma, __utmt, __utmb, __utmc, __utmz
vuid

Marketing


tr, fr
ads/ga-audiences