
Machine learning and AI
Engineering personality analysis from machine learning
From social media to eye movement to handwriting, there are numerous ways to uncover your personality traits — and for cybercriminals to exploit them.

Machine learning and AI
Engineering speech recognition from machine learning
The goal of speech recognition is to translate spoken words into text, and machine learning is helping it evolve.

Machine learning and AI
Engineering voice impersonation from machine learning
Voice cloning can become a problem as scammers use it in new ploys to get money from people and corporations.

(ISC)² CISSP
Information and asset classification in the CISSP exam
Information and asset classification is covered in domain 2 of the CISSP exam. Learn what you need to know to earn your CISSP certification.

Machine learning and AI
Machine learning for social engineering
Social engineering is a form of communication that aims at gaining people’s trust at first and then prompting them to share sensitive information or do somet

Vulnerabilities
Common vulnerability assessment types
A vulnerability assessment is a process so complicated that it often requires a comprehensive approach. This would mean that a multiple sub-assessments are t

Vulnerabilities
Common security threats discovered through vulnerability assessments
A vulnerability assessment can efficiently highlight a huge number of diverse security issues. Here are our top 10 security threats that companies may stumbl

Digital forensics
Spoofing and Anonymization (Hiding Network Activity)
Introduction Forensic investigators should always pay heed to the possibility of a cybercriminal to have been using spoofing and anonymizing techniques to c

Cryptography
Case Studies in Poor Password Management
Introduction In essence, a password is a cryptographic secret that needs proper storage and management. Even for individual users this can be a difficult ta

IoT Security
IoT security fundamentals: IoT vs OT (Operational Technology)
Introduction: Knowing the Notions Industrial Internet of Things (IIoT) incorporates technologies such as machine learning, machine-to-machine (M2M) commu