Ali Taherian is an enthusiastic information security Officer. He’s finished his education in information security and has recently been involved in banking software and payment security industry. Taherian is proud to be certified IBM Cloud Computing Solution Advisor and ECSA and enjoys sharing and tweeting about security advances and news.
- RT @INTERPOL_Cyber: 8,800 C2 servers and hundreds of compromised websites identified in INTERPOL #cybercrime operation across #ASEAN region13 hours ago
- RT @securityaffairs: #Europol, European police agencies and private actors dismantled #cybercrime ring https://t.co/Oho965Cksb #securityaff…13 hours ago
- RT @ShilpaBShah: Great to see our @DeloitteUK CIO recognised in the list of top 25 leading women breaking the CIO mould #WITN17 #WiL: https…13 hours ago
- IBM | Ponemon Cost of Data Breach 2016 https://t.co/4qsDMYlUjT13 hours ago
- 5 Tips for a Winning Security Project Business Case https://t.co/ImhV0YdF5E13 hours ago
To email me in strict confidence, please use PGP and my public key available at Keybase.
List of cyber security talks on TED
An article emphasising the importance of the first 20 hours in learning new skills and introducing tools and techniques to overcome distractions and increase productivity.
My CISA certification is issued and the digital badge is available to all certification holders.
Smartphones are amazing but perhaps too good that have made us addicted to. We need to revise our habits and here I explain why.
Time is the most valuable and scarce available to mankind. We desire to know about various bodies of knowledge but we don’t have enough time to read books in those diverse areas but technology and the Internet have enabled us to do so and watching talks on TED.com is one simple solution to the foregoing problem. In this post I will explain this topic and provide you with my solution.
Kaizen is the practice of continuous improvement and I use this philosophy to follow my goals. One of those goals is reading books, a lot of books, indeed. I will explain my plan to achieve this goal through simple but effective steps.
Irongate malware targets industrial control systems
A short summary of Cerber Crypto-Ransomware
Very simple but effective steps to find a MBA consultancy project
Hello Fortunately, today I had the chance to be informed about what I’m going to share with you and use this post to take a step helping slow loris to remain in the nature and not as a pet in a cage. For many years, mankind tortures animals to make money and the lovely slow Read more about Save the slow loris[…]