sekimia.com
Sekimia - Events
http://www.sekimia.com/events.aspx.html
January 2014 - Hadi El-Khoury presenting SEKIMIA's approach at FIC 2014. Presenting SEKIMIA's innovative approach (in French) during an interview with TECHTOC.TV. January 2014 - SEKIMIA identified for the FIC 2014 Innovative SME award. SEKIMIA is honored to take part in this contest and is eager to demonstrate its know-how and highly innovative solutions. Que le plus innovant gagne! October 2013 - SEKIMIA sponsors the CyberSecMonth CitiZENSec campaign. Congratulations to ISSA France Chapter. Arguments In...
takesecurityback.com
blackhat Archives - Take Security Back Blog
http://www.takesecurityback.com/tag/blackhat
Take Security Back Blog. Have you met Khalil Sehnaoui, a Lebanese face of DefCon and Black Hat? John McAfee and Khalil Sehnaoui. This is the first in a series of Q&A with Lebanese cybersecurity practitioners and we have the great pleasure to start with Khalil Sehnaoui. On the right in the picture taken at DefCon22). Khalil very generously answered our questions. TSB How did you get started in Infosec/Cybersecurity? TSB Why did you choose this field? I chose this field because it is what I love to do, bec...
takesecurityback.com
data classification Archives - Take Security Back Blog
http://www.takesecurityback.com/tag/data-classification
Take Security Back Blog. Tag Archives: data classification. Information Security on a Budget: Data Classification & Data Leakage Prevention. A guest post by Zouheir Abdallah. CISA, Cyber Security – Senior Specialist Q-CERT/ictQatar. This article first appeared in the “Towards a Secure Cyber Space” special publication booklet 2014-2015 of the Research and Strategic Studies Center (RSSC), Lebanese Armed Forces. These challenges are summarized into what is known as the C.I.A triad; Confidentiality, ...Refer...
takesecurityback.com
CONTRIBUTE - Take Security Back Blog
http://www.takesecurityback.com/contribute
Take Security Back Blog. Contribute to take security back, spread the word. If you are reading this, we would imagine you have been singled out and invited to do a Guest post on this blog. Before you start working on your post please take a minute to review our 10 golden rules and guidelines. Thanks in advance, we look forward to working together to help creating a more secure Lebanon. Abide by a pure scientific approach covering the security of people, premises and technology. To Take Security Back.
takesecurityback.com
hackers Archives - Take Security Back Blog
http://www.takesecurityback.com/tag/hackers
Take Security Back Blog. Have you met Khalil Sehnaoui, a Lebanese face of DefCon and Black Hat? John McAfee and Khalil Sehnaoui. This is the first in a series of Q&A with Lebanese cybersecurity practitioners and we have the great pleasure to start with Khalil Sehnaoui. On the right in the picture taken at DefCon22). Khalil very generously answered our questions. TSB How did you get started in Infosec/Cybersecurity? TSB Why did you choose this field? I chose this field because it is what I love to do, bec...
takesecurityback.com
applications Archives - Take Security Back Blog
http://www.takesecurityback.com/tag/applications
Take Security Back Blog. Are smartphones becoming the new law enforcement allies? Since the Boston bombing attack on April 15, US law enforcement authorities have been trying to collect. Pictures and videos taken by viewers on the scene with their smartphones, hoping to find clues and catch the culprits. Smartphones are transforming each citizen into a mobile CCTV. Sensor. Despite potential misusage. This is a quite powerful transformation in investigation and traceability. This entry was posted in Guest.
takesecurityback.com
Hadi El-Khoury
http://www.takesecurityback.com/author/hadi
Take Security Back Blog. Author Archives: Hadi El Khoury. About Hadi El Khoury. Seasoned Cybersecurity advisor and trainer, security and privacy by design advocate, digital entrepreneur and growth hacker. Member of the Information Systems Security Association. When it comes to Cybersecurity, does fear persuade or does it paralyze? Special mention to Dr. Robert B. Cialdini. For inspiring this post’s headline. It’s one of the “ 50 scientifically proven ways to be persuasive. As part of the ISSA France.
takesecurityback.com
Asset Archives - Take Security Back Blog
http://www.takesecurityback.com/tag/asset
Take Security Back Blog. Sharing a common language. This blog is about Taking Security Back, so let’s start with some basic definitions about Security and Risk Management. The risk management equation revolves around four components:. Asset that needs protection. Threat that could impact this asset with a certain probability. Vulnerability that eases the threat’s access to the asset. Security Measure in place to prevent or at least complicate threat’s access to the Asset. Asset here is your wallet. This ...
takesecurityback.com
CyberSecurity Archives - Take Security Back Blog
http://www.takesecurityback.com/tag/cybersecurity
Take Security Back Blog. Have you met Khalil Sehnaoui, a Lebanese face of DefCon and Black Hat? John McAfee and Khalil Sehnaoui. This is the first in a series of Q&A with Lebanese cybersecurity practitioners and we have the great pleasure to start with Khalil Sehnaoui. On the right in the picture taken at DefCon22). Khalil very generously answered our questions. TSB How did you get started in Infosec/Cybersecurity? TSB Why did you choose this field? I chose this field because it is what I love to do, bec...
takesecurityback.com
Data classification and DLP
http://www.takesecurityback.com/dlp
Take Security Back Blog. Information Security on a Budget: Data Classification & Data Leakage Prevention. Contribute to take security back, spread the word. A guest post by Zouheir Abdallah. CISA, Cyber Security – Senior Specialist Q-CERT/ictQatar. This article first appeared in the “Towards a Secure Cyber Space” special publication booklet 2014-2015 of the Research and Strategic Studies Center (RSSC), Lebanese Armed Forces. These challenges are summarized into what is known as the C.I.A triad; C...Refer...
SOCIAL ENGAGEMENT