Samantha CruzinHorangiSecurity for the E-Commerce OwnerSamantha Cruz Cyber Research & DevelopmentJan 17, 2018Jan 17, 2018
Samantha CruzinHorangiWHAT WE LEARNT FROM THE UBER INCIDENT?Samantha Cruz Cyber Research & DevelopmentDec 12, 2017Dec 12, 2017
Samantha CruzinHorangiHow to Secure Your Online CommunicationsWith the prevalence of mobile communication in recent years, it’s become more and more vital to learn how to protect yourself; whether it’s…Oct 5, 2017Oct 5, 2017
Samantha CruzinHorangiProtecting Yourself from Social Engineering AttacksIn the realm of cyber security, one thing is clear: the weakest link in any security system is the human being.Sep 20, 2017Sep 20, 2017
Samantha CruzinHorangiDecoding (Open-source) Intelligence, Part 3: Now What?In part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their…Jul 19, 2017Jul 19, 2017
Samantha CruzinHorangiDecoding (Open-source) Intelligence, Part 2: Tools of the TradeIn part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their…Jun 14, 2017Jun 14, 2017
Samantha CruzinHorangiDecoding (Open-source) Intelligence, Part 1: The Big PictureFor a lot of people, information security in an organization all happens under the hood. At the user-level there may be distinguishable…May 2, 2017May 2, 2017