Ivan FedoretsIf You Still use this Common Service You are Under a Threat of RansomwareThe End of Remote VPN. We should’ve Done it Sooner!Oct 28
TahirKeep it simple and stupid (KISS): The Simplicity Advantage in CybersecurityThe idea behind KISS is straightforward-security measures should be as simple as possible without sacrificing effectiveness.Sep 1
TahirThe Equation of CybersecurityCybersecurity is about prevention, detection, and response. That’s the formula: S = P + D + R. Prevention is the first step. In…Sep 12Sep 12
TahirSecure by Design: Building Security into the BlueprintSecure by Design flips the script. It’s about baking security into the very DNA of your systems and applications from the outset. It’s not…Sep 1Sep 1
TahirCYBERSECURITY: FROM PREVENTION TO RAPID RESPONSEIf prevention is about locking your doors and windows, detection is realizing when someone’s still gotten in, and response is what you doSep 12Sep 12
Ivan FedoretsIf You Still use this Common Service You are Under a Threat of RansomwareThe End of Remote VPN. We should’ve Done it Sooner!Oct 28
TahirKeep it simple and stupid (KISS): The Simplicity Advantage in CybersecurityThe idea behind KISS is straightforward-security measures should be as simple as possible without sacrificing effectiveness.Sep 1
TahirThe Equation of CybersecurityCybersecurity is about prevention, detection, and response. That’s the formula: S = P + D + R. Prevention is the first step. In…Sep 12
TahirSecure by Design: Building Security into the BlueprintSecure by Design flips the script. It’s about baking security into the very DNA of your systems and applications from the outset. It’s not…Sep 1
TahirCYBERSECURITY: FROM PREVENTION TO RAPID RESPONSEIf prevention is about locking your doors and windows, detection is realizing when someone’s still gotten in, and response is what you doSep 12
TahirThe Flaw of Security by ObscuritySecurity by obscurity is one of those ideas that should work. The basic concept is simple: if an attacker doesn’t know how your system…Sep 1
TahirIntroduction to CIA TriadIn cybersecurity, there’s a trio of principles that guide almost everything we do: Confidentiality, Integrity, and Availability. You might…Sep 1
Diana Kelley, SecurityCurveA Closer Look: Open Enterprise Security Architecture (O-ESA) from the Open GroupContinuing our deeper dive into security architectures, this week we’ll cover the Open Enterprise Security Architecture (O-ESA) from the…Feb 25, 2021