Moazzam KhaninallaboutsecurityWhy Do Malicious Domains Get Registered In the First Place?Domain name makes it easier to remember a site using human readable names rather than machine readable IP addresses, it also allows many…Feb 15, 2022Feb 15, 2022
Moazzam KhaninallaboutsecurityLog4J: Yet Another ExplanationLog4j, discovered at the end of 2021, has easily eclipsed the major vulnerabilities of the past decade in terms of damage it can do with…Feb 14, 2022Feb 14, 2022
Moazzam KhaninallaboutsecurityLoad Malware from Public Cloud CampaignOrganizations are on a journey to cloud and more and more workload is being shifted to the cloud every single day.Feb 12, 2022Feb 12, 2022
Moazzam KhaninallaboutsecurityCoping with Insider Threats using Machine LearningInsider threat has always been a difficult to handle issue, even before computers you could always defend against enemies from the outside…Jan 14, 2022Jan 14, 2022
Moazzam KhaninallaboutsecurityPre-trained Models for Cyber SecurityWe have seen the steps to design your own models from scratch in my earlier blogs, but training your own machine learning model involves a…Jan 12, 2022Jan 12, 2022
Moazzam KhaninallaboutsecurityManaging Security using Open and Integrated PlatformEd’s cell phone rings at 4:00 am in the morning, it’s his boss who wants him to look into the security logs of their organization because…Jan 12, 2022Jan 12, 2022
Moazzam KhaninallaboutsecurityOpen, automated and integrated security with STIXSecurity landscape has always been very complex but with the shift to cloud it has become even more complicated. Following are some of the…Jan 4, 2022Jan 4, 2022
Moazzam KhaninallaboutsecurityRole of Data in Cyber Security Classification and PredictionGarbage in and garbage out has always been a core principle of a computing system that provides any value. It is even more true for ML…Dec 29, 2021Dec 29, 2021
Moazzam KhaninallaboutsecurityHow to pick a good threat intelligence sourceHaving an effective threat intelligence feed at your disposal is crucial to keep your organization safe because your entire security…Dec 29, 2021Dec 29, 2021
Moazzam KhaninallaboutsecurityPart III Security Consideration Based on Cloud Service Category· Infrastructure as a service (IaaS) SecurityAug 20, 2021Aug 20, 2021