Hiep Nguyen

Leveraging AI in Cybersecurity: Transforming Threat Detection, Prevention, and Beyond

In an era of accelerating digital transformation, emerging challenges cast a shadow over technological advancements. Among them, cybersecurity threats are …

Sep 23,2023

5 min read

Hiep Nguyen Open

How Simply Browsing The Internet Gives Scammers An Advantage – And What You Can Do About It

Data privacy has become one of the most talked about topics in 2023. According to recent statistics, the data brokering …

Aug 24,2023

3 min read

Sania Saleem

VPN vs. MPLS: Choosing the Right Solution for Your Business

The corporate world of today is all about connectivity. Having a dependable and secure network is essential to your business, …

May 30,2023

6 min read

Szilárd Pfeiffer

Email Delivery: How to Break All the Rules of Zero Trust

92% of malware spread through the email system. This is not a surprise if we consider that the email delivery system breaks almost all the rules defined in Zero Trust. Even though there are several ways to apply security policies to email transfer, these methods are not nearly as widely declared and enforced as they should be. In this article, I’ll describe how an organization should transform its email delivery to ensure it conforms to the Zero Trust model.

Apr 03,2023

9 min read

1
Angelina Tsuboi OfficialNew Edition

The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?

About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …

Feb 23,2024

15 min read

Olga Nasibullina OfficialNew Edition

Safeguarding Earth's Frontline: The Crucial Role of Cybersecurity in Space Operations

The security of space assets has become paramount in our interconnected world, where space operations rely on a complex infrastructure …

Feb 23,2024

9 min read

Anaïs Shay-Lynn Vydelingum OfficialNew Edition

Space Cybersecurity: a Strategic Issue in the Current Geopolitical Context

by Anaïs Shay-Lynn Vydelingum The security of space infrastructures is a geopolitical issue, as space-based resources are increasingly used by …

Feb 23,2024

5 min read

Jamel METMATI OfficialNew Edition

S-WAN: Simulate the test of Space systems

The article presents the simulation environment for SmallSat. The purpose is to show how to create an environment to test …

Feb 21,2024

8 min read

1
Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …

Sep 14,2023

9 min read

Youssef Khaoulaj Course

Web Application Penetration Testing (W71)

Enter a short description of the course.

Aug 30,2023

8 min read

1
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.