Index
A
Adams, Cleve
about 134
apps permissions
career 134
cloud services 142
corporate network, hacking
Cyber breaches
cybersecure
cybersecurity
cybersecurity, evolution 136
cybersecurity risks
cybersecurity, top trends 134, 135
identity
information, leakage
information security 138
operations and security, working with 139, 140
password authentication
secure authentication
security policy, for security networking
work protocols 140, 142
AI integration
strategic plan, importance
artificial intelligence (AI) 123, 169, 193
destructive potential
AT&T Alien Labs 131
B
bias
transmitted, through computing
blockchain
about
future
practical uses
technologies
Bring Your Own Device (BYOD)
about 37
career-focused websites 40
human factors 41
oversharing, example on Facebook 38, 39
oversharing, prevention 38
C
Cloud...