well, I actually changed the second part sarcastically, this is the original version: I am not the technical person but I really must sell you something today, can I connect you to another person in my company, an engineer perhaps? you know, we have a very great product but I am just lacking understanding what… Continue reading I am not the technical person but I must sell you something I have no clue about!
Author: Kaveh Mofidi
While I enjoy working with electronics, computers, and the fields of information and cybersecurity, I believe our challenges as humans extend far beyond infosec—and even beyond technology itself. The real task, I would argue, is to discover solutions for unlimited clean energy, drinkable water, practical waste management and to address the root causes of hunger, war, and injustice on our beautiful little planet. Our primary goal—each of us—should be to keep Earth livable. That is the true challenge we face.
Security solution which acts like traditional painkiller
most security solutions are like traditional painkillers, we certainly feel better after talking them, but the root cause of pain remains intact and unresolved! as long as we do not address root cause of security incidents and vulnerabilities, we will be feeling better from short-term pain relief of “Security Solutions” and then suffering again soon… Continue reading Security solution which acts like traditional painkiller
utilizing dark web as defense
I was shocked when I heard from a “security professional” that using dark web as means understanding cyber threats has been Just Recently been discovered by them as an effective defense mechanism! no kidding! then why we are surprised we get hacked by the most trivial TTP out there? this is very disappointing that “security… Continue reading utilizing dark web as defense
endpoint protection won’t work!
any solution 100% focused on endpoint protection would not actually protect you from cyber threats. best case scenario, you will discover IoC (not even necessary IoA) after the fact, after a system has actually been compromised. the easiest way to confirm this is what is happening everyday in companies with sophisticated but pure endpoint detection… Continue reading endpoint protection won’t work!
cybersecurity and culture
different cultures have different perception and reaction to cybersecurity matters because cyberspace is as diverse as real life and it consists of and affected by all cultures involved. cultures are not significantly different in terms of understanding and identification of behaviors of their members. for example being lazy may have slightly same definition in multiple… Continue reading cybersecurity and culture
you won’t get there without knowing the truth!
one of the main reasons Security community has hard time securing “stuff”, is lack of understanding of Hackers community. without knowing motives, the motivations behind breaking into computer systems, and deep knowledge of hacking and cracking techniques, securing a system is pointless. results are telling us every single day that we are not doing the… Continue reading you won’t get there without knowing the truth!
zero-trust: reselling old under a different name
the market has been acting as a reseller since late 90’s. we simply resell an old solution under a different shiny name again and again. one of the best examples is zero trust. with all noises around this concept, poor desperate companies waiting to resolve their security issues, or perhaps thirsty budgets waiting to find… Continue reading zero-trust: reselling old under a different name
Virtual NATO
It is very late for international community to act on fighting against Ransomware and Cyber-crime in general but still anything better than nothing. EU and US coordination on fighting ransomware reminds me of NATO foundation back in 1949. perhaps countries could have considered cyber crime a “global issue” sooner and act faster against organized international… Continue reading Virtual NATO
Does AI help us in security operations?
it does but only if it is originated from a intelligent programmer. AI is as smart as the people who did its modeling. an artificial intelligence cannot be more intelligent than its origination. presuming AI will be helping us securing cyberspace is like presuming we will have a accurate Accounting system or flawless GL just… Continue reading Does AI help us in security operations?
Relying on SAST/DAST
Relying on DAST/SAST is like investing in a restaurant where chef needs to be reminded of how to safely handle knife. no surprise that software developers have been dragging computer end-users to current situation when software products are no longer reliable, or they are packed with vulnerabilities. I have mentioned before that I believe the… Continue reading Relying on SAST/DAST