Menu
unlimphotos

Find Similar Images

Stock photos and images of username:LeoWolfert

Investigator is pushing ANTI-COMPUTER FORENSICS onscreen. Fading hexagons enclosing locked lock icons do represent data hiding, wiping of digital artifacts and obfuscation of electronic evidence. Manager is pushing CRM on a touch screen interface. Female and male business people icons embedded in hexagonal matrix structures do represent customer data compiled in an information system.. Entrepreneur in business suit is pointing at SIGN IN on a touch screen interface. Unlocked padlock icons do represent authorized computing access upon successful identification and authentication. Network administrator is touching VULNERABILITY SCANNER onscreen. A virtual magnifier is detecting the only unlocked padlock among otherwise locked icons. Technology concept and security metaphor. Business client pressing LOGON on a touch screen interface. A set of unlocked virtual locks in a coding matrix represent authorized access upon successful identification. Security technology concept. Computer administrator in business suit is pressing CODE INJECTION on a touch screen interface. Three unlocked padlock icons in a a hexagonal coding matrix light up signifying insertion of code. Software developer pushing SHELL COMMAND INJECTION onscreen. Three opened lock icons light up in a code matrix to signify a loss of data confidentiality and unauthorized access by a remote attacker.. Perpetrator is touching CRIMEWARE onscreen. Three unlocked padlock icons embedded in a coding matrix do light up red to signify an attack by automated malware and compromised data confidentiality. Cybercriminal pushing TARGETED THREAT onscreen. Three unlocked lock icons light up in red signifying a targeted destination attack or port attack resulting in the capture of sensitive customer data. Corporate user touching OS COMMAND INJECTION onscreen. Three red opened lock icons represent the insertion of arbitrary code, insecure user supplied data or untrusted input data. Technology concept. Marketeer is pointing at MARKETING on a touch screen interface. Business concept and technology metaphor for the discipline, processes and techniques of B2B or B2C marketing management. Copy space. IT manager pressing IT RISK on a touch screen. Three unlocked lock icons embedded in a hexagonal virtual security structure do light up to represent a possible threat or exploit of vulnerabilities. Human Resources manager is touching CROWDSOURCING onscreen. Countless male and female knowledge worker icons embedded in a hexagonal planning matrix do stream across the screen. Business concept. Corporate recruitment manager is pressing SECURITY ENGINEER onscreen. Technology metaphor and business role concept for a mid-level employee maintaining corporate IT security systems. Copy space. Businessman is pushing CUSTOMER DATA on a touch screen interface. Female and male business people icons in a central planning matrix do represent key customers. Business and technology concept.. Corporate employer is pushing SECURITY ARCHITECT onscreen. Unlocked and secured virtual locks embedded in a hexagonal structure represent software infrastructure with vulnerabilities to be assessed. Corporate manager is pressing CDM onscreen, while organizing female and male business customer icons in a hexagonal data set matrix. Business and technology concept for customer data management. Corporate investigator is touching SECURITY ANALYST onscreen. Loupe icons stand for tools to detect vulnerabilities. Open and closed padlock icons represent damaged and intact data infrastructure. Manager is touching CUSTOMER DATA MANAGEMENT onscreen. Male and female corporate customer icons arranged in a hexagonal planning matrix do represent structured customer data. Business concept. IT professional is pressing SECURITY ADMINISTRATOR on a touch screen. Locked and opened virtual padlock and magnifier icons relate to tools and tasks of managing a company-wide IT security system. Cyber criminal is pointing at PIRACY on a touch screen interface. Three unlocked padlock icons in a virtual hexagonal protective matrix do represent unauthorized access to compromised online content. Cyber professional is pushing SECURITY CONSULTANT on a screen. Magnifier icon, locked and open padlocks embedded in a virtual security protocol matrix represent tasks in the protection of networks. Recruitment agent touching SECURITY MANAGER onscreen. Male and female worker icons, magnifier, open and closed virtual locks reference tasks of staff scheduling and implementation of security tools. Business manager is touching CUSTOMER RELATIONSHIP MANAGEMENT onscreen. Business concept and technology metaphor. Male and female customer icons embedded in hexagons do signify collected client data. Recruiter is pressing SECURITY DIRECTOR on a touch screen. Business concept for the role of a senior-level information security professional with a successful career in cybersecurity. Copy space. Competitor is pressing CYBER SPYING on an interactive touch screen. A stream of unlocked red lock icons embedded in a hexagonal coding matrix stands for the criminal act of accessing sensitive data. Headhunter pushing CISO on touch screen. Technology career concept for C-level management executive position of Chief Information Security Officer. Responsible for overall security of organizations. IT administrator pushing PHISHING. Red unlocked padlock icons in a hexagonal security matrix do represent an exploit of current web security technology and a malicious attack on sensitive data. CEO touching CHIEF INFORMATION SECURITY OFFICER onscreen. Magnifier icon and padlock refer to hands-on technical work of this C-level executive role. Worker symbols relate to people skills of a CISO. IT specialist is touching RISKWARE on an interactive screen. Three opened virtual padlocks among otherwise intact lock icons embedded in a hexagonal coding matrix signify a possible software risk. Businessman presses DATA PRIVACY on a touch screen display. locked padlock icons in hexagons represent protected data sets. Business metaphor and technology concept for information protection. Competitor is pushing INDUSTRIAL ESPIONAGE on a touch screen interface. A stream of virtual, unlocked padlock icons are lighting up red to signify a security breach. Technology and industry concept. Manager is touching VIRTUALIZATION on a screen. Many locked padlock icons entailed in virtual hexagons are structured into an abstract and independent layer. Technology concept and business metaphor. Cyber attacker in business suit is pressing VULNERABILITY onscreen. Three unlocked virtual padlock icons light up in fiery orange to signify the unprotected status of the underlying data matrix. Management consultant or proprietor pushing LICENSING on a touch screen interface. Business concept and technology metaphor. Plenty of copy space over blue business suit and blurred office interior. Management consultant touching MALWARE onscreen. Three opened padlock icons light up in fiery colors to signify a malicious disruption, virus attack or embedded trojan horse. Technology concept. White collar malware author is pressing BADWARE on a touch screen. Three unlocked lock icons embedded in hexagonal shapes do represent compromised data, documents or files. Security software concept. Cyber detective pushing SPYWARE onscreen. Three unlocked padlock icons do light up within a hexagonal coding matrix to signify an exploited software vulnerability and deception of a computer user. Management user is touching SCAREWARE on a screen. Three cracked lock icons are highlighted to represent compromised or malicious software code. Computing technology concept and business metaphor. Marketing manager pressing ADWARE on a screen. Three unlocked padlock icons are popping up in a hexagonal coding matrix signifying the presence of advertising-supported software. Technology concept. Manager is pushing RANSOMWARE on a touch screen. Three opened lock icons light up in a hexagonal code structure signifying an infected computer system or application. Security technology concept. Government executive is touching GOVWARE onscreen. Three unlocked padlock icons embedded within a hexagonal structure do signify an intercepted communications matrix on a target computer. Cyber security professional pressing TROJAN onscreen. Three unlocked padlock icons do light up in a hexagonal coding matrix representing a malicious program, modified code or data corruption. Librarian is pushing DATABASE SECURITY on a touch screen interface. Many closed lock icons embedded in hexagons do represent protected data sets and digital content in a virtual library collection. Agent is pointing at SECURITY BREACH on a touch screen. Three unlocked padlock icons lighting up in red do signify the security exploit within a computer system or network. Technology concept. Manager touching DATABASE on a virtual screen. Closed lock icons in hexagons represent a knowledge collection. Technology concept for organization of related data sets into a meaningful structure. Male manager is pressing HUMAN RESOURCE MANAGEMENT on a touch screen interface. Female and male worker icons arranged in a hexagonal planning matrix. Business and technology concept. Copy space. Data owner is pushing ACCESS CONTROL on a touch screen interface. Technology and business concept for the selective restriction of access rights to computing resources and networks. Management consultant pressing IT SERVICES onscreen. Technology concept and business metaphor for the people, policies and structured processes deployed by information technology service providers. Administrator is touching VIRTUAL FIREWALL onscreen. Business and technology concept for a network firewall operating entirely within a virtualized environment, while providing security services.