Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Peter Berlich"'
Publikováno v:
IEEE Access, Vol 10, Pp 100540-100565 (2022)
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This study conducted a large-scale anti-phishing training with
Externí odkaz:
https://doaj.org/article/34b7eec0f499453e8c4ff94ebc7e05ac
Autor:
Peter Berlich
Publikováno v:
Infosecurity. 6:38-41
Peter Berlich looks at why the infosecurity industry is attracting a high number of qualified individuals from fields like IT, engineering and sciences
Autor:
Alec Bass, Peter Berlich
Publikováno v:
Official (ISC)2 Guide to the CISSP CBK ISBN: 9780849382314
Official (ISC)2 Guide to the CISSP CBK
Official (ISC)2 Guide to the CISSP CBK
Autor:
Michael Waidner, Jan Camenisch, Marit Hansen, Andreas Pfitzmann, Sebastian Clauß, Peter Berlich
Publikováno v:
Information Security Technical Report. 9:35-44
Privacy-Enhancing Technologies (PET) are the technical answer to social and legal privacy requirements. PET become constituents for tools to manage users' personal data. Users can thereby control their individual digital identity, i.e. their individu
Autor:
Peter Berlich
Publikováno v:
ISSE 2013 Securing Electronic Business Processes ISBN: 9783658033705
ISSE
ISSE
The Chief Information Security Officer (CISO) is facing particular career challenges, being rooted in a quickly changing field where managerial tasks are applied to a highly specialized technical foundation. The objective of this study is to explore
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::33c5ed36dc6cd17577c5fbad1c48ce72
https://doi.org/10.1007/978-3-658-03371-2_13
https://doi.org/10.1007/978-3-658-03371-2_13
Autor:
Peter Berlich
Publikováno v:
Infosecurity Today. 2:52-53
Autor:
Peter Berlich
Publikováno v:
Infosecurity. 5:46
Autor:
Peter Berlich
Publikováno v:
Infosecurity. 5:44
Autor:
Peter Berlich, Marco Cremonini
Publikováno v:
Infosecurity. 5:46
Autor:
Peter Berlich
Publikováno v:
Infosecurity. 5:43