In this week’s episode, we will continue with part 2 on “Preparing for and responding to ransomeware attack”As I said last week, ransomware is a threat that will be around us for the foreseeable future.Do listen to part 1 before...
Ransomware is a persistent threat that will continue to pose a challenge to us in the foreseeable future. In this week’s episode, we will explore the history of ransomware, the common tactics, techniques, and procedures used by threat actors...
This week we will dive into a collection of powerful system utilities and tools designed to help users diagnose, troubleshoot, and monitor Windows operating system.These utilities provide advanced functionality beyond what is typically available in...
AI is getting into all sorts of places but no less than in cybersecurity in both a good way and bad ways. In a good way with bolstering Incident response live cycle but unfortunately in a bad way with generating convincing phishing email or...
In our second episode, we continue exploring the concept of adopting a platform security. In this second part we will pick up where we left off from last week and will encourage you to listed to the first episode if you have not done so.Before we...
In this episode, we explore the recently much talked about concept of adopting a platform security. As technology advances, cyber criminals continually adapt their tactics. Engaged in a constant cat-and-mouse game, staying ahead is crucial. It...
It was the LEAP event this past week. LEAP is a technology event in Saudi Arabia, Riyadh and it attracts every technology company imaginable especially in the cyber security domain. This is year was no different.At LEAP, I met with Port53, a firm...
This week I attended Qatar Web Summit. This is a technology and start-up summit held yearly in Doha, Qatar. There were a lot going on and I am lucky to have spent time with the Ken Fee, the CEO of Business Technology Architect shorten as BTA where...
In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave...
In today’s interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security...