Homepage
Open in app
Sign in
Get started
AllAboutSecurity
A platform to share ideas and discuss all things security.
Cloud Security
Write for Us
Follow
Why Do Malicious Domains Get Registered In the First Place?
Why Do Malicious Domains Get Registered In the First Place?
Domain name makes it easier to remember a site using human readable names rather than machine readable IP addresses, it also allows many…
Moazzam Khan
Feb 14, 2022
Log4J: Yet Another Explanation
Log4J: Yet Another Explanation
Log4j, discovered at the end of 2021, has easily eclipsed the major vulnerabilities of the past decade in terms of damage it can do with…
Moazzam Khan
Feb 13, 2022
Load Malware from Public Cloud Campaign
Load Malware from Public Cloud Campaign
Organizations are on a journey to cloud and more and more workload is being shifted to the cloud every single day.
Moazzam Khan
Feb 11, 2022
Coping with Insider Threats using Machine Learning
Coping with Insider Threats using Machine Learning
Insider threat has always been a difficult to handle issue, even before computers you could always defend against enemies from the outside…
Moazzam Khan
Jan 13, 2022
Pre-trained Models for Cyber Security
Pre-trained Models for Cyber Security
We have seen the steps to design your own models from scratch in my earlier blogs, but training your own machine learning model involves a…
Moazzam Khan
Jan 12, 2022
Managing Security using Open and Integrated Platform
Managing Security using Open and Integrated Platform
Ed’s cell phone rings at 4:00 am in the morning, it’s his boss who wants him to look into the security logs of their organization because…
Moazzam Khan
Jan 11, 2022
Open, automated and integrated security with STIX
Open, automated and integrated security with STIX
Security landscape has always been very complex but with the shift to cloud it has become even more complicated. Following are some of the…
Moazzam Khan
Jan 3, 2022
Role of Data in Cyber Security Classification and Prediction
Role of Data in Cyber Security Classification and Prediction
Garbage in and garbage out has always been a core principle of a computing system that provides any value. It is even more true for ML…
Moazzam Khan
Dec 28, 2021
How to pick a good threat intelligence source
How to pick a good threat intelligence source
Having an effective threat intelligence feed at your disposal is crucial to keep your organization safe because your entire security…
Moazzam Khan
Dec 28, 2021
Part III Security Consideration Based on Cloud Service Category
Part III Security Consideration Based on Cloud Service Category
· Infrastructure as a service (IaaS) Security
Moazzam Khan
Aug 20, 2021
Part II Legacy Infrastructure vs Cloud: Changing Security Considerations.
Part II Legacy Infrastructure vs Cloud: Changing Security Considerations.
1. Cloud Systems
Moazzam Khan
Aug 20, 2021
Part I: Legacy Infrastructure vs Cloud: Changing Security Considerations
Part I: Legacy Infrastructure vs Cloud: Changing Security Considerations
Over the last decade network infrastructure has moved from the traditional on-premise datacenter setup to more of a fully or hybrid cloud…
Moazzam Khan
Aug 20, 2021
How Organizations Team Up to Bring Down a Botnet: A Trickbot Case Study
How Organizations Team Up to Bring Down a Botnet: A Trickbot Case Study
Security organizations, private or governmental often, launch organized efforts to take down major botnets. One such effort was done in…
Moazzam Khan
Oct 12, 2020
Security Issues Since COVID Started and Measures for Prevention
Security Issues Since COVID Started and Measures for Prevention
Present pandemic has made people vulnerable, anxious and confused about the issues surrounding COVID 19, people want to get more updated…
Moazzam Khan
Oct 11, 2020
Twitter Hack: A Social Engineering David and Goliath Story
Twitter Hack: A Social Engineering David and Goliath Story
How the attack happened
Moazzam Khan
Oct 11, 2020
Write for Us
Write for Us
Open the story you want to submit. Click the three-dot button at the top, then Edit story to enter the edit mode.
theinspirer
Oct 4, 2020
About allaboutsecurity
Latest Stories
Archive
About Medium
Terms
Privacy
Teams