Erik S. ØyanThe scan is not enough: why combining scans and pentesting is the best approach to vulnerability…How do you know if your organization has control on its vulnerabilities? Easy, you just run a scan, and then submit the identified…Nov 6, 2023Nov 6, 2023
Erik S. ØyanInside the Hacker’s Mind: Why They Hack and How They Select Their TargetsHave you ever wondered what goes through the mind of a hacker, what triggers and motivates them? And how do they select a target out of all…Sep 24, 2023Sep 24, 2023
Erik S. ØyanAsset Lifecycle Management: The Bedrock of Robust CybersecuritySun Tzu, the ancient Chinese military strategist, said: “If you know the enemy and know yourself, you need not fear the result of a hundred…Sep 16, 2023Sep 16, 2023
Erik S. ØyanThe 5G and Internet of Things Revolution: Why Cybersecurity Matters More Than EverInternet of Things (IoT) implementation is expected to skyrocket over the next few years due to the low latency and fast network speed of…Apr 25, 20231Apr 25, 20231
Erik S. ØyanCybersecurity fundamentals: The CIA TriadIn the ever-evolving landscape of cybersecurity, there exists a foundational principle that has stood the test of time: the “CIA Triad”…Apr 18, 20231Apr 18, 20231
Erik S. ØyanFrom Phishing to Whaling: A Deep Dive into Social Engineering AttacksIn this article, we will explore the dark art of social engineering and its various forms, such as phishing, spear-phishing, and whaling…Apr 10, 2023Apr 10, 2023
Erik S. ØyanI got nothing to hide… or do I?Most people have either heard or said “I’ve got nothing to hide” when discussing privacy or cybersecurity. Unfortunately, many people…Apr 3, 2023Apr 3, 2023