Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & Chief Executive Officer at Quantum Infinite Solutions Group Ltd.
  • Residence:
    Dublin
  • County:
    Dublin
  • Country:
    Ireland
Big Data Services
Data Science Consulting
Data Analytics Consulting
  • Big Data
  • Machine Learning
  • Analytical Ai
  • Computer Vision

Tag: Week

Instagram’s new age verification tool – Week in security with Tony Anscombe
June 24, 2022 / Security
Instagram’s new age verification tool – Week in security with Tony Anscombe

As Instagram checks a brand-new age confirmation device, what are a few of the worries when it concerns verifying a…

How to spot malicious spam – Week in security with Tony Anscombe
June 17, 2022 / Security
How to spot malicious spam – Week in security with Tony Anscombe

As the danger of obtaining a malware-laden e-mail rises, take a minute to take into consideration just how to find…

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe
June 10, 2022 / Security
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

Listed below are three themes that stood out on the world’s largest gathering of cybersecurity professionals Having simply come again…

Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe
June 3, 2022 / Security
Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe

A testimonial of the vital patterns that specified the threatscape in the initial 4 months of 2022 and also what…

Cryptocurrency: secure or not? – Week in security with Tony Anscombe
May 21, 2022 / Security
Cryptocurrency: secure or not? – Week in security with Tony Anscombe

When you listen to the term ‘cryptocurrency’, does ‘safe’ additionally occur? Below are some effects of the absence of audio…

How to spot and avoid a phishing attack – Week in security with Tony Anscombe
May 13, 2022 / Security
How to spot and avoid a phishing attack – Week in security with Tony Anscombe

Can you identify the telltale indicators of a phishing effort and also examine if an e-mail that has landed in…

1 2