Deepak Joshi

Deepak Joshi

CISO, Cybersecurity, Data Privacy, GRC, AI / ML, MTech IIT Delhi, CISSP, CIPP/E, CHFI, ISO 27001 LA, 27701 LA, 42001 LA, PhD Research Scholar Deepfake Image Forensics

View articles by Deepak Joshi

The Hidden Dangers of Sharing Your Location and Sensitive Details on Social Media

The Hidden Dangers of Sharing Your Location…

July 13, 2024

9 likes

Cybersecurity Risks To Paris Olympics 2024 : Why, How and Recommended Way Ahead For Prevention of Cyber Attacks

Cybersecurity Risks To Paris Olympics 2024 :…

June 17, 2024

15 likes4 comments

MOUSE JIGGLING - A SUBTLE CYBERSECURITY RISK TO ORGANIZATIONAL SECURITY

MOUSE JIGGLING - A SUBTLE CYBERSECURITY RISK…

June 15, 2024

57 likes9 comments

Navigation Apps : Trust But Verify

Navigation Apps : Trust But Verify

May 28, 2024

4 likes

#Deepfake #Risks to #Organisations- Suggested #Prevention #Strategy #For #CISOs

#Deepfake #Risks to #Organisations-…

May 27, 2024

33 likes7 comments

Deepfake Detection Technologies : Broad Categories

Deepfake Detection Technologies : Broad…

May 24, 2024

41 likes3 comments

Navigating International Data Privacy Compliance: How #OECD Guidelines Can Help?

Navigating International Data Privacy…

May 17, 2024

5 likes

Understanding Deepfake Technology - Staying Safe From Potential Harm

Understanding Deepfake Technology - Staying…

May 4, 2024

23 likes10 comments

Quantum Computing : Challenges and Opportunity for Cybersecurity

Quantum Computing : Challenges and…

April 28, 2024

27 likes4 comments

MITRE ATTACK JAN 2024 - CHRONOLOGY AND RECOMMEDATIONS

MITRE ATTACK JAN 2024 - CHRONOLOGY AND…

April 22, 2024

14 likes2 comments

UN Regulations R 155 & R 156 : Steps For Improving Cybersecurity in Cars

UN Regulations R 155 & R 156 : Steps For…

April 19, 2024

5 likes

Basics of Agile Methodology and Recommended Sequence For Doing Agile Certifications

Basics of Agile Methodology and Recommended…

April 17, 2024

22 likes3 comments

Common Mistakes When Using Penetration Testing Tools

Common Mistakes When Using Penetration…

April 14, 2024

12 likes3 comments

#2.   Techniques of #Deepfake #Image Generation

#2. Techniques of #Deepfake #Image…

March 2, 2024

#Unmasking #The #Truth: #Deepfake #Images #And #The #Quest #For #Detection

#Unmasking #The #Truth: #Deepfake #Images…

March 1, 2024

3 likes2 comments

  翻译: