Samantha CruzinHorangiSecurity for the E-Commerce OwnerSamantha Cruz Cyber Research & Development5 min read·Jan 17, 2018----
Samantha CruzinHorangiWHAT WE LEARNT FROM THE UBER INCIDENT?Samantha Cruz Cyber Research & Development4 min read·Dec 12, 2017----
Samantha CruzinHorangiHow to Secure Your Online CommunicationsWith the prevalence of mobile communication in recent years, it’s become more and more vital to learn how to protect yourself; whether it’s…2 min read·Oct 5, 2017----
Samantha CruzinHorangiProtecting Yourself from Social Engineering AttacksIn the realm of cyber security, one thing is clear: the weakest link in any security system is the human being.3 min read·Sep 20, 2017----
Samantha CruzinHorangiDecoding (Open-source) Intelligence, Part 3: Now What?In part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their…3 min read·Jul 19, 2017----
Samantha CruzinHorangiDecoding (Open-source) Intelligence, Part 2: Tools of the TradeIn part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their…4 min read·Jun 14, 2017----
Samantha CruzinHorangiDecoding (Open-source) Intelligence, Part 1: The Big PictureFor a lot of people, information security in an organization all happens under the hood. At the user-level there may be distinguishable…4 min read·May 2, 2017----