Deep learning is one of the buzziest buzzwords of 2017, and for good reason. Deep learning (more accurately called deep neural networks) attempts to mimic the activities of the brain. The basic principles of neural networks have existed since the late 1950s, yet it wasn’t until around 2010 that computers became powerful enough (and data
Cyber-security is a fast developing industry. As hackers become more and more sophisticated with all the types of attacks, so too must the protection offered by cyber-security companies. Security is set to unveil their new deep learning technology this fall which will take the company’s cyber-security solution to new heights. To understand the magnitude of
This article is about Applying Security in your SDLC and to go through the stages of the Development Life Cycle. The current trend with Software Development is to go through the stages of the Development Life Cycle and then only once everything is complete is a security audit performed. This as touched on in the
How to instant session hijack other people Facebook and Twitter user account? Social Media Facebook and Twitter is popular and widely adopted. For this article would like to share on one ID security risk that is so common for people make use of public WiFi to access their private social media account (actually it work