In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]
I would like to dedicate this post to my friend and colleague Dr. Eduardo Gelbstein who sadly passed […]
For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another […]
On the 1st of June 2018 at Webster University in Geneva I talked about security of IoTs. From […]
Webster University undergraduate catalog description: The course provides students with insight on common cyber-attacks and the techniques for identifying, […]
Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. […]
This course is designed for bachelor of science students with major in computer science. Although level 3000 course […]
The week after official launch of the EU General Data Protection Regulation (GDPR) a conference on privacy and […]
It is difficult to perceive risks and opportunities related to information if we cannot estimate its value. In […]
The role of a Chief Information Security Officer (CISO) is not to manage technology, although information and communication […]