PinnedFrom Vulnerability to Immunity (Cyber Resilience) — Part 1Cyber Resilience (In straightforward definition) refers to an organisation’s or system’s ability to withstand cyber incidents. It…Jun 17, 2023Jun 17, 2023
From Modem to Modern: Securing Remote Access for OTIn today’s digital age, accessing resources from any corner of the globe has become routine and part of ways of working. However, securing…Sep 10, 2023Sep 10, 2023
What does define adequate security, and how to measure it?The story starts in a village of blind men and the elephant where each one tries to describe what he touched to each other. The story…Feb 19, 2022Feb 19, 2022
Are we heading towards digital identity crisis?In today’s digital economy, identity is the core element of it. Digital identity has been through evolution over the years, but with rapid…Nov 13, 2021Nov 13, 2021
Deceive or TreatIn this article, I’ll try to deep dive a little about Deception and why you need to consider it as part of your security strategy.Nov 13, 2021Nov 13, 2021
Cyber DiversityThere are different types of systems in most environments, and these systems contain different lines of code that have some…Mar 4, 2021Mar 4, 2021