No Image

Augustin J. Farrugia

Joined on January 3, 2005
Total Post Views: 17,842


Information about this member is not available yet.

Featured Blogs

Person to Person Security and Privacy Infringement

IT security strategies invariably focus on maintaining impenetrable fortresses around computers and network systems. Firewalls, virtual private networks and anti-virus programs are the tools IT engineers use to create their digital security. Sophisticated defense systems can be very effective at keeping the obvious attackers at bay, yet they often create a false sense of security because the real attacks, the kind that inflict irreparable damage on a system or network, avoid the obvious routes into the secure fortress. more

Topic Interests

PrivacyCybersecurityCyberattackCybercrimeThreat Intelligence

Recent Comments

Popular Posts

Person to Person Security and Privacy Infringement