Cyber Security //www.isysl.net/taxonomy/term/17 en Protecting Intellectual Property: a Cybersecurity Perspective //www.isysl.net/protecting-intellectual-property-cybersecurity-perspective <span property="schema:name">Protecting Intellectual Property: a Cybersecurity Perspective</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2020-08-31T02:09:16+00:00">Mon, 08/31/2020 - 10:09</span> Mon, 31 Aug 2020 02:09:16 +0000 itixadmin 213 at //www.isysl.net Top Attackers vs. Top Defenders in Cybersecurity - Part 1 //www.isysl.net/top-attackers-vs-top-defenders-cybersecurity-part-1 <span property="schema:name">Top Attackers vs. Top Defenders in Cybersecurity - Part 1</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2018-12-28T08:20:26+00:00">Fri, 12/28/2018 - 16:20</span> Fri, 28 Dec 2018 08:20:26 +0000 itixadmin 183 at //www.isysl.net GPS Vulnerabilities and Exploits //www.isysl.net/gps-vulnerabilities-and-exploits <span property="schema:name">GPS Vulnerabilities and Exploits</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2018-10-28T07:41:43+00:00">Sun, 10/28/2018 - 15:41</span> Sun, 28 Oct 2018 07:41:43 +0000 itixadmin 182 at //www.isysl.net Are Multi-Factor Authentication (MFA) Solutions Equally Secure? //www.isysl.net/are-multi-factor-authentication-mfa-solutions-equally-secure <span property="schema:name">Are Multi-Factor Authentication (MFA) Solutions Equally Secure?</span> <span rel="schema:author"><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="">ThisIsNotAadmin</span></span> <span property="schema:dateCreated" content="2017-11-18T09:09:15+00:00">Sat, 11/18/2017 - 17:09</span> Sat, 18 Nov 2017 09:09:15 +0000 ThisIsNotAadmin 158 at //www.isysl.net How Easy Can Someone Know Where You Are Through Your Phone? //www.isysl.net/how-easy-can-someone-know-where-you-are-through-your-phone <span property="schema:name">How Easy Can Someone Know Where You Are Through Your Phone?</span> <span rel="schema:author"><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="">ThisIsNotAadmin</span></span> <span property="schema:dateCreated" content="2017-10-28T09:04:49+00:00">Sat, 10/28/2017 - 17:04</span> Sat, 28 Oct 2017 09:04:49 +0000 ThisIsNotAadmin 157 at //www.isysl.net Asymmetric Threats in Cybersecurity //www.isysl.net/asymmetric-threats-cybersecurity <span property="schema:name">Asymmetric Threats in Cybersecurity</span> <span rel="schema:author"><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="">ThisIsNotAadmin</span></span> <span property="schema:dateCreated" content="2017-05-01T08:59:49+00:00">Mon, 05/01/2017 - 16:59</span> Mon, 01 May 2017 08:59:49 +0000 ThisIsNotAadmin 156 at //www.isysl.net The ABC's of Cybersecurity Models //www.isysl.net/abcs-cybersecurity-models <span property="schema:name">The ABC&#039;s of Cybersecurity Models</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2016-08-17T09:22:10+00:00">Wed, 08/17/2016 - 17:22</span> Wed, 17 Aug 2016 09:22:10 +0000 itixadmin 211 at //www.isysl.net The Unsteady State of Cybersecurity //www.isysl.net/unsteady-state-cybersecurity <span property="schema:name">The Unsteady State of Cybersecurity</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2016-08-04T09:18:58+00:00">Thu, 08/04/2016 - 17:18</span> Thu, 04 Aug 2016 09:18:58 +0000 itixadmin 210 at //www.isysl.net A Closer Look at Recent ATM Heist in Taiwan //www.isysl.net/closer-look-recent-atm-heist-taiwan <span property="schema:name">A Closer Look at Recent ATM Heist in Taiwan</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2016-07-22T09:16:18+00:00">Fri, 07/22/2016 - 17:16</span> Fri, 22 Jul 2016 09:16:18 +0000 itixadmin 209 at //www.isysl.net Bypassing Firewalls and Avoiding Detection in Penetration Testing //www.isysl.net/bypassing-firewalls-and-avoiding-detection-penetration-testing <span property="schema:name">Bypassing Firewalls and Avoiding Detection in Penetration Testing</span> <span rel="schema:author"><span lang="" about="/user/34" typeof="schema:Person" property="schema:name" datatype="">itixadmin</span></span> <span property="schema:dateCreated" content="2016-06-03T09:10:43+00:00">Fri, 06/03/2016 - 17:10</span> Fri, 03 Jun 2016 09:10:43 +0000 itixadmin 208 at //www.isysl.net