Digital transformation is a process transformation. It is driven by innovation, by changing behaviors, by looking at the […]
information security
The fifth generation (5G) mobile network technology is an umbrella term for the family of new technologies for […]
I am honored to present information security management view on information and technology asset management at Annual Audit, […]
It is very disappointing for an information security professional to repeatedly discover how organizations neglect security basics. Vulnerability […]
In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]
Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. […]