Tagged 'cyber security'
All posts tagged with 'cyber security' on Predrag Tasevski's blog
Posts tagged "cyber security"
32 posts tagged with cyber security
International Cooperation Between National Cyber Security Strategies for building a sustainable Digital Transformation, and Critical Infrastructure and Industry
•
5 min read
Cyber Security Challenges for 2018
•
1 min read
Cyber Security overview of 2016 and 2017 predictions (Macedonian language)
•
1 min read
Workshop: Cyber Security and Privacy
•
1 min read
Balkans capacity towards cyber defense
•
3 min read
Stockholm Internet Forum 2014
•
3 min read
Interview: StartCast – Bringing you the most promising StartUps
•
1 min read
Interview: Snowden helped the mass awakening of awareness by Nova Makedonija
•
1 min read
Camp in Plav – Montenegro with Young, Smart and Enthusiast people – REACT 2013 Montenegro
•
3 min read
Belgrade Security Forum 2013 – Session 7: Assuring Cyber-Security in the Western Balkans and the Rest of Europe
•
5 min read
Introduction course to Cyber Security
•
1 min read
Interview for Azerbaijani news: “The punishment for criticizing the social networks is unacceptable” (Russian & Azerbaijani) – Dzhasur Sumerinli
•
1 min read
I can hack your FB, can you catch me...
•
2 min read
Collective Cyber Defence – The Role of Newer Members and Opportunities for Specialization of Bulgaria in the Alliance Questions and answers
•
5 min read
Cyber Security Group in South Eastern Europe
•
3 min read
Network Security Toolkit
•
5 min read
ICSAP – Interactive Cyber Security Awareness Program
•
2 min read
Web Servers Analysis under DoS Attacks, Secure Your Mobile, Protect Your Network and Hack More with Hakin9 11/2012!
•
1 min read
What is network security?
•
7 min read
Identify Possible Infection of Malware Into the Wireshark Capture File
•
7 min read
Security Risk Assessment, PenTest Magazine IS Risk Assessment PT A&S 08/12
•
1 min read
What is wireless network security?
•
5 min read
Ministry of Interior – Macedonia, website defacement: https://mvr.gov.mk
•
7 min read
Clever solution by making site more resilient by optimization
•
5 min read
Testing SNORT – IDS rulesets
•
6 min read
Security Programing Techniques
•
9 min read
Honeypot document
•
7 min read
Testing IDS
•
9 min read
Script Kiddie
•
10 min read
Cost of DDoS, leak of credit card numbers, infected machine and spam
•
7 min read
Major changes in warfare from antiquity to modern
•
8 min read
IP Responsibility and abuse reporting procedure
•
6 min read
Browse other tags
ab (1)
acceleration (2)
access (1)
address spoofing (1)
ai (2)
antiquity (1)
art of war (2)
artificial intelligence (1)
asp.net (1)
assessment (1)
assurance (1)
attacks (6)
audit (1)
authentication (1)
awareness (8)
azerbaijani (1)
balkan (6)
balkans (1)
bash (1)
beer (1)
berlintech (1)
bifo (1)
binary (2)
blog (3)
blogposts (1)
botnet (2)
brute force (1)
bulgaria (1)
bullying (1)
businessmodel (1)
c# (1)
camp (1)
canonical (1)
capture file (1)
career (1)
cell phone (1)
censorship (1)
challenge (4)
challenges (1)
changes warfare (1)
ci/cd (2)
cid (1)
cii (1)
civil hacking (1)
clever solution (1)
cloud (1)
cloud security (1)
cloudcomputing (1)
cms (2)
code (1)
code-review (1)
collectivistic (1)
communication (2)
communitydriven (1)
conditions (1)
conference (6)
confidentiality (1)
course (2)
credit card numbers (1)
cultures (1)
cyber (4)
cyber crime (1)
cyber defence (1)
cyber defense (1)
cyber risk (1)
cyber space (1)
cyber war (1)
cyber warfare (1)
cybersecurity (7)
cyberwar (1)
data (1)
data breaches (2)
data science (1)
data-privacy (1)
ddos (8)
decapcms (1)
default (1)
defence (1)
design (3)
devcommunity (1)
development (1)
dictionary generation (1)
dictionary password attacks (1)
digital devide (1)
digital divide (2)
digital-transformation (2)
digitaltransformation (1)
docusaurus (1)
drupal (1)
eavesdropping (2)
eleventy (1)
encryption (3)
engineer (1)
entrepreneurship (1)
establishment (1)
europe (1)
european-round (1)
exploit (1)
exploitation (1)
external ip (1)
facebook (1)
fb (1)
firesale (1)
forum (2)
foss (1)
framework (1)
franco berardi (1)
freedom (4)
freelancing (1)
frequency (1)
future (1)
future of human communication (2)
german (1)
github-pages (1)
gitlab (2)
gitlab pages (1)
gms (2)
grc (1)
grep (1)
group (1)
guide (1)
hack (1)
hacking (1)
hacktivist (1)
hactivism (2)
half-marathon (3)
hashicorp (1)
hate speech (1)
hci (1)
history (2)
honeypot (1)
honeypot document (1)
hql (1)
hugo (1)
human computer interaction (1)
human factor (2)
human rights (1)
iac (1)
ict (1)
ids (2)
industry (1)
infected machine (1)
infection (1)
informatics (1)
information (1)
information warfare (2)
informations (1)
infrastructure (2)
internet (14)
internet protocol addressing systems (1)
interview (7)
introduction (1)
iot (2)
ip addresses (1)
isoc (1)
isoc-mkd (1)
it risk (1)
it security (3)
italy (2)
jamstack (1)
java (2)
jdbc (1)
jmeter (1)
kaspersky (1)
key speech (1)
keynote (1)
kns (1)
kubernetes (1)
laptop (1)
lecture (1)
legal aspects of cyber security (1)
lenovo (1)
libpoppler (1)
life style (1)
linux (2)
log mining (2)
macedonia (9)
macedonian (1)
malicious analysis (1)
malicious code (2)
malware (6)
malware analysis (1)
man-in-the-middle (1)
marathon (4)
markdown (1)
migration (2)
milan (1)
minimalist (1)
mkd-cirt (1)
mobile (3)
mobile malware analysis (1)
modern (1)
modules (1)
mongodb (1)
montenegro (1)
month (1)
movement (1)
mvr (2)
national (1)
national cyber security strategy (1)
national security (1)
nato (2)
net generation (1)
netlify (1)
network (5)
network crime (3)
network generation (1)
network security (2)
networking (7)
new war (1)
news (1)
newspaper (1)
nextjs (3)
ngo (1)
non-repudation (1)
nova makedonija (1)
online (11)
online community (1)
online generations (2)
online people (1)
open data (1)
open standards (1)
open-source (1)
opensource (1)
openvas (1)
optamization (2)
optional-tag (1)
owasp (1)
password attacks (1)
password generation (1)
pelican (2)
penetration (1)
pentest (1)
pentest mag (1)
perl (1)
philosophy (1)
phone (2)
phone games (1)
phone malware (1)
php5 (1)
plav (1)
plugins (1)
podcast (1)
policy (2)
port scan (2)
posts (74)
prediction (2)
predictions (1)
presentation (2)
primary-tag (1)
privacy (5)
probability (1)
program (1)
protection (1)
psyche (1)
psychological (1)
public interests (1)
python (2)
rainbow tables (1)
ransomware (2)
react (2)
redhat (1)
regular expression (1)
report abuse (1)
research (1)
risk assessment (2)
risk management (2)
ruby on rail (1)
run (4)
running (5)
saas (1)
sapka (1)
script kiddie (1)
sctockholm (1)
sdlc (1)
second life (1)
secondary-tag (1)
security (22)
security model (1)
security risk (1)
security testing (1)
securityculture (1)
serbia (1)
server attack (1)
serverless (1)
shift-left (1)
shift-right (1)
sideproject (1)
siem (1)
simmulation of attacks and defence (2)
skf (1)
smartphone (1)
sms (1)
snort (2)
snort rules (1)
snowden (1)
social (2)
social informatics (1)
social network (1)
social networks (1)
social-technical (1)
society (2)
socio-technical (1)
software (1)
softwaredevelopment (1)
south eastern europe (1)
spam (1)
startcast (1)
startup (3)
startups (1)
static-site (2)
stockholm (1)
strategy (3)
surfaj bezbedno (1)
surveillance (2)
syn flood (2)
talk (1)
teaching (2)
techinnovation (1)
techtalk (1)
tedx (1)
tedxbassalon (1)
tertiary-tag (1)
tester (1)
testing ids (2)
texworks (1)
thinkpad (1)
threats (2)
tips (1)
toolkits (1)
training (2)
ubuntu (3)
unicistech (1)
unix (2)
video (1)
virtual life (1)
virtual machine (1)
virtual machine analysis (1)
vision (1)
vulnerability (2)
vulnerability scanning (2)
war (1)
war strategy (1)
wardriving (1)
warfare (1)
webinar (1)
websites (1)
western (1)
wifi (2)
windows 7 (1)
wireless (2)
wireshark (1)
wiretapping (2)
wlan (2)
wordpress (2)
wordpress attack (1)
wordpress attacks (1)
workflow (1)
workshop (2)
wpan (2)
writing (1)
yata (1)
zenitism (1)