Hande AriciIs Cyber Security Setting Itself For Failure By Carrying On Without Women Presence?The Conversation says:·8 min read·Aug 29, 2022--1--1
Hande AriciSpace Explorations In The Face Of Cyber ThreatsI encountered these mesmerising and glamorous images taken by James Webb Telescope recently. I am sure most of you did too.·6 min read·Jul 19, 2022----
Hande AriciImportance of Identity & Access ManagementIdentity and Access Management (IAM) has been a very hot topic in security.·4 min read·Jun 6, 2022----
Hande AriciHow To Use Project Management Skills In Cyber Security?Cyber Security is not an easy field to comprehend.·5 min read·May 16, 2022----
Hande AriciCyber Security in Project ManagementProject management is a huge effort from start to end. It requires constant and clear communication, great understanding the goals and…·5 min read·May 9, 2022----
Hande AriciCyber Security In Product ManagementProduct Management is the process of managing a product throughout its lifecycle.·4 min read·May 2, 2022----
Hande AriciWhat Is Secure Software Development Life Cycle (SSDLC)?We need to play smart when it comes to software development as it is far beyond coding.·5 min read·Apr 25, 2022----
Hande AriciHow Hackers Stalk Your KeystrokesYou open your laptop and start surfing on the internet. It is just another regular day.·4 min read·Apr 11, 2022----
Hande AriciPower Of IDS & IPS in Cyber SecurityI believe that we should first start asking questions to understand the criticality of Intrusion Detection and Intrusion Protection…·4 min read·Apr 4, 2022----
Hande AriciWhat To Know About Mitre Att&ck?As the technology is evolving and our IT assets are increasing with each passing day, it’s becoming harder and harder to evaluate our…·3 min read·Mar 28, 2022----