Supply chain security activities aim to amplify the security of supply chains, transport, and logistic systems for the world’s cargo and to facilitate legitimate trading. Their objective is combining traditional…
Category
THE EXPERT
“If you see hackers, you see Usi,” someone once suggested I use this line to introduce myself. Perhaps they presumed that people who do not know me would easily remember…
In April 2021, the IT Security Act 2.0 was passed by the German Federal Ministry of the Interior. Among other things, the regulation provides for changes in connection with the…
In order to be able to discuss the similarities and differences between the three frameworks, we need to understand the background of each one. There certainly are some similarities between…
How it started My passion for electronics and communication started at a very young age. It was a hobby that took most of my time throughout school and until I…
The corruption of resources to the people who need them undermines trust in institutions and exacerbates the great inequalities in today’s society. For this reason, the fight against corruption is…
The value Is in the system Technologies rarely exist within a vacuum. We typically invent and build new technologies by using existing ones. IoT, big data, and the cloud are…
In cybersecurity, humans are often seen as the weakest link, as attackers use social engineering techniques to infiltrate organizations, so they can launch ransomware or cause a data breach. According…
Ethical hacking and cloud computing have been continuously developing and improving over the years, and they have become essential services in today’s technological and business world. As millions of people…
We do business in an increasingly complex world of bytes, account numbers, and passwords. Nearly everything in our lives is now stored on a cloud. But our reliance on technology…