Ali Taherian is an enthusiastic information security Officer. He’s finished his education in information security and has recently been involved in banking software and payment security industry. Taherian is proud to be certified IBM Cloud Computing Solution Advisor and ECSA and enjoys sharing and tweeting about security advances and news.
- 32M employees offered biochip hand implants for work monitoring, payments | ZDNet https://t.co/fzMwP03Ocg22 hours ago
- Google Play Protect scans for malicious apps - Help Net Security https://t.co/gFsMsp0Qch22 hours ago
- RT @CSIT_QUB: We've a number of fully funded places on MSc Applied Cyber Security to help individuals retrain in #cybersecurity https://t.c…22 hours ago
- RT @WeldPond: UK government wants to give 6,000 teenagers cyber security training https://t.co/bu1RP1tAau22 hours ago
- RT @securityaffairs: New #Debian 9.1 release includes 26 security fixes for 55 packages https://t.co/fJRW9Vfgx5 #securityaffairs #linux22 hours ago
To email me in strict confidence, please use PGP and my public key available at Keybase.
List of cyber security talks on TED
An article emphasising the importance of the first 20 hours in learning new skills and introducing tools and techniques to overcome distractions and increase productivity.
My CISA certification is issued and the digital badge is available to all certification holders.
Smartphones are amazing but perhaps too good that have made us addicted to. We need to revise our habits and here I explain why.
Time is the most valuable and scarce available to mankind. We desire to know about various bodies of knowledge but we don’t have enough time to read books in those diverse areas but technology and the Internet have enabled us to do so and watching talks on TED.com is one simple solution to the foregoing problem. In this post I will explain this topic and provide you with my solution.
Kaizen is the practice of continuous improvement and I use this philosophy to follow my goals. One of those goals is reading books, a lot of books, indeed. I will explain my plan to achieve this goal through simple but effective steps.
Irongate malware targets industrial control systems
A short summary of Cerber Crypto-Ransomware
Very simple but effective steps to find a MBA consultancy project
Hello Fortunately, today I had the chance to be informed about what I’m going to share with you and use this post to take a step helping slow loris to remain in the nature and not as a pet in a cage. For many years, mankind tortures animals to make money and the lovely slow Read more about Save the slow loris[…]