Found 2,824 presentations matching your search
Recently occur landslide data given this pdf, And cause of landslide in Darjeeling and also geograph...
The SQLMap tool can be found in every penetration tester’s toolbox. It is one of the most popular ...
To secure a network, someone in the organization must know exactly where the network needs to be sec...
This attack was made possible due to a programming vulnerability in OpenSSL libraries. The attack wa...
Combining AI with Red Teaming and Bug Bounty accelerates and smartens vulnerability discovery — fr...
Species prioritization is the process of identifying and ranking species based on conservation urgen...
- Definition of ‘Disaster’. - What is a disaster management cycle? - What are the types of Disas...
Malaria remains a significant public health challenge, especially in low-income regions where socioe...
Seniors face an increased vulnerability to various forms of abuse by people known or unknown to them...
A cybersecurity course provides comprehensive training on protecting networks, systems, and data fro...
Tenable Vulnerability Management is a risk-based vulnerability management platform that gives you fu...
Unleash the power of AI to create next-level defenses. This session explores how generative AI, espe...
Variant analysis is the process of using a known vulnerability as a seed to find similar problems i...
CERT-IN has created a panel of qualified auditors to conduct auditing for various Government organ...
A serious disruption of the functioning of a community or a society at any scale due to hazardous ev...
With other tech giants aggressively building their patent portfolios, LinkedIn’s lack of patents p...
ETHICAL HACKING AND SOCIAL ENGINEERING Topics Covered: Ethical Hacking Concepts and Scopes, Threats ...
Top cybersecurity companies offer key features such as advanced threat detection, comprehensive inci...
Explore the fundamental aspects of Vulnerability Assessment and Penetration Testing (VAPT) in our pr...
Worldwide, women are disproportionately affected by economic vulnerability, lower social status, and...
Meta-Techs is an innovative organization that defines the parameters of the cybersecurity services i...
Pregnancy—a symphony of anticipation, transformation, and boundless love. As expectant mothers cra...
This was the opening keynote presented by Allison Littlejohn at the EARLI SIG14 conference on 20th A...