International Jobs in Cybersecurity Data Science
In part I of this blog post series, I told you how you can set yourself apart from the competition, and prove that you have the knowledge and skills to…
In part I of this blog post series, I told you how you can set yourself apart from the competition, and prove that you have the knowledge and skills to…
In a previous blog post, I told you how you can set yourself apart from the competition, and prove that you have the knowledge and skills to be entrusted with…
A lot of students ask me what to do to become a Cybersecurity Data Scientist (CSDS). Like all worthwhile things, you have to put in to get out. And becoming…
If you've been paying any attention at all to what's going on, you must have heard about DeepFakes. In case you happened to have not, DeepFake is a technology that…
If you've been paying any attention at all to what's going on, you must have heard about DeepFakes. In case you happened to have not, DeepFake is a technology that…
In this post, I’m going to cover how AI can comb through video and audio OSINT to emerge with useful insights. Whether this powerful technology will be used for good…
Open Source Intelligence (OSINT) is a concept to describe the search, collection, analysis, and use of information from open sources, as well as the techniques and tools used. In this…
Open Source Intelligence (OSINT) is about using openly available information to extract insights. In this post, I’m going to give you a better look at how AI is enabling automated…
Open Source Intelligence (OSINT) is about using openly available information to extract insights. Governments, for example, utilize OSINT sources for different purposes such as national security, counterterrorism, cybertracking of terrorists,…
To see what we will be talking about, check out of this mind blowing video If you would like to learn how to use AI to imitate voice, get a…