Mike Stevens (Page 26)

Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.

Wireless Networks Wireless network which enables end-point devices to communicate with internet by connecting to an AP device. Wiresless device are also referred as WLAN devices. Accessing Wireless Networks YouRead More →

Intro Cybersecurity has dramatically changed in the past decade. The focus has been steadily shifting from protection to detection. In this process, threat hunting (TH) has played an instrumental role.Read More →