Decoupling Security from the Network: The Evolution of Segmentation By execassist Decoupling Security from the Network: The Evolution of Segmentation Read More »
2020 Phishing By Industry Benchmarking Report By execassist 2020 Phishing By Industry Benchmarking Report Read More »
Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior By execassist Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior Read More »
Exposed and Unprotected in Cloud Environments By execassist Exposed and Unprotected in Cloud Environments Read More »
Menlo Security Isolation Platform – Adaptive Clientless Rendering By execassist Menlo Security Isolation Platform – Adaptive Clientless Rendering Read More »
A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems By execassist A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems Read More »
Drone Automation In Security & Surveillance By execassist Drone Automation In Security & Surveillance Read More »
The Advanced Analytics of Security Entrances By execassist The Advanced Analytics of Security Entrances Read More »
Public Safety prioritisation on commercial networks By execassist Public Safety prioritisation on commercial networks Read More »
An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning By execassist An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning Read More »