A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks
Abstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people
Read moreAbstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people
Read moreAbstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known
Read moreName: Dr. Silke Holtmanns Affiliation: PwC Finland – 5G Security Team Can you briefly introduce your current role in cybersecurity?
Read moreName: Sonia Compans Affiliation: Technical Officer at ETSI Can you briefly introduce your current role in cybersecurity? I’m the point
Read moreName: Tom Madsen Affiliation: Cybersecurity SME with NNIT Denmark Editorial Board of Cybersecurity Magazine Can you briefly introduce your current
Read moreName: Anand Prasad Affiliation: Deloitte Editor of Cybersecurity Magazine Can you briefly introduce your current role in cybersecurity? My role
Read moreName: Hans Christian Rudolph Affiliation: Deloitte Tohmatsu Cyber Editor of Cybersecurity Magazine Can you briefly introduce your current role in
Read moreAbstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known
Read moreAbstract: This research entails an investigation into enhanced attack detection techniques as a security feature in vehicular platooning. The paper evaluates critical challenges in the security of Vehicular Ad hoc Networks (VANETs) with a focus on vulnerabilities in vehicle platooning. We evaluate the possibilities of securing a platoon through enhanced attack detection following an inside attack while considering current communication-based approaches to vehicular platoon security that have been effective at isolating infected platoon members.
Read moreWith the given demand for cybersecurity professionals in the market, it is essential to understand the space and potential career. In this article we will discuss the overall cybersecurity career space from a birds-eye view.
Usually what one normally hears regarding cybersecurity career is associated to white hacking but there is much more in the cybersecurity space besides identifying the security issues. Given the space in which cybersecurity plays a role, we will look from holistic perspective at a high level in this article thus making this an umbrella article for the space of cybersecurity career.