PinnedHyperactive SecurityinHuman LinkChatGPT Artificial Intelligence: A Valuable Cyber Tool or another Cybersecurity Threat?ChatGPT Artificial Intelligence is a new AI chatbot that has the potential to revolutionize the cybersecurity market. AI chatbots have the…Jan 8, 2023Jan 8, 2023
PinnedHyperactive SecurityinHuman LinkThe Human Resource Factor: How to Protect Employees in the Digital AgeWhen Human Resources are under attackFeb 21, 20222Feb 21, 20222
PinnedHyperactive SecurityinHuman Link19 Funny Phrases Only Kids SayFor a while, little ones are a mix of wit and innocence, without filters. The phase passes, but it yields a lot of laughs…Feb 28, 202215Feb 28, 202215
Hyperactive SecurityThe Unseen Risks: Drawing Parallels between Cybersecurity Strategy and the Fukushima DisasterI’ve been binge-watching the riveting docuseries on Netflix about the Fukushima disaster with the family for the last few days. And, it’s…Jul 28, 2023Jul 28, 2023
Hyperactive SecurityinHuman LinkGitHub makes its IAM system open sourceThe company announced that it is opening the source code for Entitlement, its in-house Identity and Access Management (IAM) solutionJun 14, 2022Jun 14, 2022
Hyperactive SecurityinHuman LinkSubmission GuidelinesGuidelines to publishing to Human LinkMar 3, 20222Mar 3, 20222
Hyperactive SecurityinHuman LinkThe Value of Diversity in The Workplace And How to Create An Effective Diverse TeamThe plurality of identities within companies is still a silent taboo and a great challenge for the Human Resources area. The HR sector is…Jan 31, 2022Jan 31, 2022
Hyperactive SecurityinHuman LinkWrite a Security Policy in 4 stepsTechnology helps us solve problems, but they are vulnerable to several types of threats.Jan 12, 2022Jan 12, 2022