Open in app
Home
Notifications
Lists
Stories

Write
Hyperactive Security
Hyperactive Security

Home

Published in Human Link

·Pinned

The Human Resource Factor: How to Protect Employees in the Digital Age

When Human Resources are under attack — Some professions are more susceptible to cyberattacks than others, regardless of the type of business. Today, we are focusing on cyber threats aimed at professionals working in the human resources field. …

Cybersecurity

6 min read

The Human Resource Factor: How to Protect Employees in the Digital Age
The Human Resource Factor: How to Protect Employees in the Digital Age

Published in Human Link

·Pinned

19 Funny Phrases Only Kids Say

For a while, little ones are a mix of wit and innocence, without filters. The phase passes, but it yields a lot of laughs… — Children are an inexhaustible source of spontaneity. Sometimes their statements are so ingenious that keeping them a secret turns out to be simply impossible. You’ve probably heard that there is no being more sincere than a child. And fun! …

Society

3 min read

19 Funny Phrases Only Kids Say
19 Funny Phrases Only Kids Say

Published in Human Link

·Jun 14

GitHub makes its IAM system open source

The company announced that it is opening the source code for Entitlement, its in-house Identity and Access Management (IAM) solution — GitHub announced last week that it has open-sourced its identity and access management (IAM) platform, Entitlements. It leverages the company’s own Git framework to analyze, track, and approve access to another company’s systems. …

Technology

2 min read

GitHub makes its IAM system open source
GitHub makes its IAM system open source

Published in Human Link

·Mar 3

Submission Guidelines

Guidelines to publishing to Human Link To become a Writer Follow the publication Human Link. Add a response comment to this “Submission Guidelines,” with the text “Add me as a writer, please.” Check your publication list to verify you see Human Link now shows (it can take a couple of days). Writing Submissions Basic Rules Follow Medium’s rules; …

Human Link

2 min read

Submission Guidelines
Submission Guidelines

Published in Human Link

·Jan 31

The Value of Diversity in The Workplace And How to Create An Effective Diverse Team

The plurality of identities within companies is still a silent taboo and a great challenge for the Human Resources area. The HR sector is the spokesperson, responsible for transmitting values and maintaining the legacy, often acting as a diplomat to strengthen relations between the company and employees. …

Diversity

6 min read

The Value of Diversity in The Workplace And How to Create An Effective Diverse Team
The Value of Diversity in The Workplace And How to Create An Effective Diverse Team

Published in Human Link

·Jan 12

Write a Security Policy in 4 steps

Technology helps us solve problems, but they are vulnerable to several types of threats. For example, any loss or unavailability could be too dangerous for small and big companies. So, information security is a fundamental investment. But, how do you decide what kind of investments are necessary? …

Cyber

3 min read

Write a Security Policy in 4 steps
Write a Security Policy in 4 steps
Hyperactive Security

Hyperactive Security

Cyber, Hyper, Mother

Following
  • Leah

    Leah

  • wordsmithwriter

    wordsmithwriter

  • Rui Alves

    Rui Alves

  • Carol Lennox

    Carol Lennox

  • Asmund Frost

    Asmund Frost

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable