PinnedUgurInterplay of incentivesMany may know of the famous marshmallow experiment conducted by Walter Mischel at Stanford University where children were offered a…Sep 16, 2022Sep 16, 2022
UgurCybersecurity and cloud computing: Risks and benefitsIf you have data living in the cloud (who doesn’t nowadays?) and an ecommerce business, you should be taking cybersecurity seriously.Feb 5, 2023Feb 5, 2023
UgurTypes of Cyber Attacks Commonly Used By HackersHow Do Cyber Attacks Happen?Dec 26, 2022Dec 26, 2022
UgurTelcom and BPO Companies Under Attack by SIM Swapping HackersA persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at lease since June…Dec 11, 2022Dec 11, 2022
UgurWhat is the Log4Shell Vulnerability?Log4j is a logging library written in Java and the vulnerability, CVE-2021–44228, also commonly known as Log4Shell, allows a remote actor…Oct 13, 2022Oct 13, 2022
UgurWhat is the CIA triad? The CIA triad components, definedThe CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for…Sep 19, 2022Sep 19, 2022