Search
Saturday 16 December 2017
  • :
  • :

Posts by: icitsuser

Elements of A Strong Healthcare IT Security Strategy

A report released by Reuters in 2014 stated that your sensitive health information is 10 times more valuable to hackers than your credit...

Top 3 Biggest Information Security Threats

Today, the growth of technology has improved internet connectivity, which has, in turn, allowed more creativity in business than ever...

Cyber Security Trends in 2017

In January 2017, D-Link Corporation together with its US subsidiary were sued by the TFC. In the lawsuit, TFC claimed that D-Link failed to...

Cryptography and Network Security Principles and Practice

In introduction to cryptography and network security, you learn that cryptography translates as “secret writing”. It refers to the...

Introduction to Cryptography with Coding Theory Solutions

People are always fascinated with keeping information away from others. As children, many of us had a way of exchanging coded messages with...

cryptography

Cryptography and Steganography

Cryptography is the study of concealing information. It is used when communicating over an untrusted medium like the internet. Such mediums...

Cybersecurity Secret of The CIA That Businesses Don’t Seem to Get

The moment you start to spend time reading about the latest developments in cyber security, it’s when you’ll find yourself...

How to Get Business Executives to Support Information Security

Many information security professionals are normally frustrated because of the reasons management gives as to why they couldn’t listen to...

Reasons Why Tableau Rocks

Tableau is revolutionary data visualization software which was developed by Tableau Software. Tableau connects very easily with nearly all...

Cryptography and Network Security

In today’s IT world, cryptography is the most widely used and the most referenced term. This is because it applies to many areas in...