top of page
Cynthia Cullen
Home
Speaking Engagements
Publications
Videos
Blog
Contact
Privacy Policy
More
Use tab to navigate through the menu items.
BLOG
Securing application data while maintaining full functionality
Two Key requirements to consider in evaluating data security are: Referential Integrity & Data schema/application format
Featured Posts
Are you Blindfolded? Why SIEM, app sec, behavior analytics are crucial for security
Recent Posts
Build a Nearly Free Vulnerability Testing Environment
GDPR - Global Data Protection Regulation
IRS Scammers Target College Students
Securing application data while maintaining full functionality
Detection and Prevention of 'unauthorized' Backdoors
Are you Blindfolded? Why SIEM, app sec, behavior analytics are crucial for security
Password security fail? Add multifactor authentication, behavior analytics
NSA 'hacker-in-chief' talks top ways to prevent exploits
Follow Cynthia
bottom of page