1. "Using The Body as A Wire" IOB How your body can play an integral role in wearable security | Shreyas Sen | TEDxIndianapolis

    "Using The Body as A Wire" IOB How your body can play an integral role in wearable security | Shreyas Sen | TEDxIndianapolis

    38
    0
    3.15K
    8
  2. Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".

    Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".

    114
    1
    5.66K
    24
  3. Cyber Security #internet #security #cyber #risks #minimize #global #news #globalfalcons #WEF #ai

    Cyber Security #internet #security #cyber #risks #minimize #global #news #globalfalcons #WEF #ai

    147
  4. Lying about national cybersecurity & Cyberbiosecurity is bad mm’kay

    Lying about national cybersecurity & Cyberbiosecurity is bad mm’kay

    82
    3
    3.91K
    14
  5. Why Quantum Computers Could Break the Internet #Cybersecurity #InternetSecurity #Encryption #Tech

    Why Quantum Computers Could Break the Internet #Cybersecurity #InternetSecurity #Encryption #Tech

    23
  6. DEFINITELY not decentralized ~ NFV, SDN Humint and Humaint [bio security]

    DEFINITELY not decentralized ~ NFV, SDN Humint and Humaint [bio security]

    19
    0
    3.02K
    2
  7. Human Anomalous Health Incidents = Intra Body Communication for BAN cybersecurity on 802.15.6

    Human Anomalous Health Incidents = Intra Body Communication for BAN cybersecurity on 802.15.6

    20
    0
    2.75K
    11
  8. Neuromodulation & Cybersecurity - JWICS, SIWICS & DHS HART: Biosurveillance in 2024

    Neuromodulation & Cybersecurity - JWICS, SIWICS & DHS HART: Biosurveillance in 2024

    23
    0
    2.98K
    15
  9. Sekur Privacy & Security Segment– The Weekly Hack interview with internet privacy expert Alain Ghiai

    Sekur Privacy & Security Segment– The Weekly Hack interview with internet privacy expert Alain Ghiai

    4
  10. We are Being Tracked on the Internet Via Our Phone Number! Zero Anonymity

    We are Being Tracked on the Internet Via Our Phone Number! Zero Anonymity

    139
    0
    6.79K
    28
  11. Free DIY Offline Internet Backup Project Guide! ( How to Build an Off-Grid Database for Survival )

    Free DIY Offline Internet Backup Project Guide! ( How to Build an Off-Grid Database for Survival )

    5
    0
    519
    1
  12. CCP is Trying to Create and Control Its Own Internet

    CCP is Trying to Create and Control Its Own Internet

    12
  13. Hegseth Adviser Set Up Signal on Pentagon Computer, Bypassing Security Protocols

    Hegseth Adviser Set Up Signal on Pentagon Computer, Bypassing Security Protocols

    10
  14. Honeypots Cybersecurity's Secret Weapon #security #tech #info #news #cyber #info #hack #attack

    Honeypots Cybersecurity's Secret Weapon #security #tech #info #news #cyber #info #hack #attack

  15. Unwitting Assets Ep 2: Patrick Bergy on Attribution, Social Engineering & National Public Internet

    Unwitting Assets Ep 2: Patrick Bergy on Attribution, Social Engineering & National Public Internet

    4
    0
    384
    1
  16. Data Breaches, Hacked Pokémon, and Market Manipulation: The Chaos of the Digital Age

    Data Breaches, Hacked Pokémon, and Market Manipulation: The Chaos of the Digital Age

    54
    3
    101K
    25
  17. TURN THEM OFF THEY ARE INTENTIONALLY KEEPING YOU IGNORANT!

    TURN THEM OFF THEY ARE INTENTIONALLY KEEPING YOU IGNORANT!

    42
    0
    2.04K
    2
  18. US Announces Plan to Ban Chinese Software in Internet-Connected Vehicles

    US Announces Plan to Ban Chinese Software in Internet-Connected Vehicles

    2
  19. Google Acquires Cybersecurity Firm Wiz for $32 Billion in Historic Dea

    Google Acquires Cybersecurity Firm Wiz for $32 Billion in Historic Dea

  20. Open Source Phones :The Only Safe Smartphones, Very Little Sacrifices to Convenience Today

    Open Source Phones :The Only Safe Smartphones, Very Little Sacrifices to Convenience Today

    61
    1
    1.74K
    9