As announced in the post “February 11. is the “Safer Internet Day” I give today the book for free.
This is to celebrate the Safer Internet Day and to help the readers of my blogs to improve their online and offline security.
Enjoy !
Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC
As announced in the post “February 11. is the “Safer Internet Day” I give today the book for free.
This is to celebrate the Safer Internet Day and to help the readers of my blogs to improve their online and offline security.
Enjoy !
A company doesn’t exist anymore if it is not present on at least a few social media platforms. Depending on the area they are active, they could go for average consumer or for highly skilled professionals. In order to address their customers, they need to use one or another social media platform. However, the tendency […]
(ISC)2 requires that a candidate meets some requirements before he/she receives the right to call himself/herself (ISC)2 certified. Receiving the (ISC)² credential is a several-step process: Required Experience – possessing the required number of years for the appropriate credential Study – taking advantage of the educational materials (ISC)² makes available for you to review and […]
My entire automatic posting on ITSecurityNews.info which is retweeted on @ITSecurityNews, @SorinMustaca and @sorinm_security is built on IFTTT.com. Well, this is why you didn’t get some tweets on time: Last night at approximately 10:00pm PST much of the work IFTTT does in the background stopped due to an issue with one of our backend services. Our monitoring […]
You must be logged in to post a comment.