Yes, of course it is! It is not however simple to design information systems with privacy in mind […]
It is very disappointing for an information security professional to repeatedly discover how organizations neglect security basics. Vulnerability […]
In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]
I would like to dedicate this post to my friend and colleague Dr. Eduardo Gelbstein who sadly passed […]
For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another […]
On the 1st of June 2018 at Webster University in Geneva I talked about security of IoTs. From […]
Webster University undergraduate catalog description: The course provides students with insight on common cyber-attacks and the techniques for identifying, […]
Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. […]
This course is designed for bachelor of science students with major in computer science. Although level 3000 course […]
The week after official launch of the EU General Data Protection Regulation (GDPR) a conference on privacy and […]