Open in app

Sign In

Write

Sign In

Ayman Galal
Ayman Galal

Home

About

Feb 19, 2022

What does define adequate security, and how to measure it?

The story starts in a village of blind men and the elephant where each one tries to describe what he touched to each other. The story illustrates how important to connect each part to explain the whole thing correctly. It isn’t one way or the other. It is essential (in…

Cybersecurity

4 min read

What does define adequate security, and how to measure it?
What does define adequate security, and how to measure it?
Cybersecurity

4 min read


Nov 13, 2021

Are we heading towards digital identity crisis?

In today’s digital economy, identity is the core element of it. Digital identity has been through evolution over the years, but with rapid changes in the market, a digital identity revolution needed more than ever. If we go back to 1997, Microsoft released Passport as a universal login, and the…

Digital Identity

5 min read

Are we heading towards digital identity crisis?
Are we heading towards digital identity crisis?
Digital Identity

5 min read


Nov 13, 2021

Deceive or Treat

In this article, I’ll try to deep dive a little about Deception and why you need to consider it as part of your security strategy. I’m sure most of you know what deception is and its history, so I don’t think I need to explain it, but if you need…

Cybersecurity

4 min read

Deceive or Treat
Deceive or Treat
Cybersecurity

4 min read


Mar 4, 2021

A New Security Thinking

Overview Cybersecurity tactics and strategies improved over the years to identify, protect, detect, respond and recover against overwhelming cyber threats. Although it proved successful so far, but the increased sophistication of cyber attacks put pressure on the defenders to proactively protect the system prior to the attack damages rather than passively…

Cybersecurity

3 min read

A New Security Thinking
A New Security Thinking
Cybersecurity

3 min read


Mar 4, 2021

Cyber Diversity

There are different types of systems in most environments, and these systems contain different lines of code that have some vulnerabilities that present holes in the systems. We understand this systematic failure is challenging to eliminate, so a pragmatic approach would be to close these holes as much and fast…

Cybersecurity

3 min read

Cyber Diversity
Cyber Diversity
Cybersecurity

3 min read

Ayman Galal

Ayman Galal

Passionate about Cyber Security & Privacy

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams