Latest News - Technology

Discussion – Database Security

Discussion – Database Security Databases store information that is used by organizations, individuals, and governments. Information in a database is intended for use by authorized personnel...

Threat Modeling – Health Care Facility

Threat Modeling – Health Care Facility Threat modeling allows for the optimization of applications and business processes through the identification of core security vulnerabilities in the...

Cyber Security and The Internet of Things

Cyber Security and The Internet of Things The publication by Abomhara and Køien (2015), is about cyber-attacks on the internet of things (IoT) platform. It explains that due to the advancements in...