In our second episode, we continue exploring the concept of adopting a platform security. In this second part we will pick up where we left off from last week and will encourage you to listed to the first episode if you have not done so.Before we...
In this episode, we explore the recently much talked about concept of adopting a platform security. As technology advances, cyber criminals continually adapt their tactics. Engaged in a constant cat-and-mouse game, staying ahead is crucial. It...
It was the LEAP event this past week. LEAP is a technology event in Saudi Arabia, Riyadh and it attracts every technology company imaginable especially in the cyber security domain. This is year was no different.At LEAP, I met with Port53, a firm...
This week I attended Qatar Web Summit. This is a technology and start-up summit held yearly in Doha, Qatar. There were a lot going on and I am lucky to have spent time with the Ken Fee, the CEO of Business Technology Architect shorten as BTA where...
In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave...
In today’s interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security...
This is the second episode of our two part episode on whether quantum computing is a threat to cryptography really. Make sure you listen to episode 1 first as we laid the foundation on what is coming up in this episode.As always lets review this...
Cryptography are the backbone of privacy since time immemorial. Toda is THE foundational block of the connected world without which the Internet will crumble as we know it.There is a feverish discussions happening and fast improving of a new era in...
Not long ago, Microsoft’s exchange online was breached. They now revealed how this happened. UK and US Water Utilities Hit with Cyberattacks Accessing and managing various applications and services remotely is a daily occurrence for a typical...
When things go wrong, they go wrong fast. This week will dive into the widespread exploitation on iVanti VPN solution that attrackted a lot of attention from both the security community as well as from the bad guys. What went wrong? Stay tuned.Just...