is Security inconvenient?

we presume Security is always equal inconvenient, either form consumer point of view, or developer. as a consumer you have to remember passwords and configure stuff, and as a developer to need to make sure you put controls around authentication process and how passwords are being used. I agree that is inconvenient but are we… Continue reading is Security inconvenient?

Attacks are not advanced, we are naive!

cyber attacks that you hear about them in news these days are not advanced at all, this is security community acting so naive and blind, knowingly and unknowingly which then implies into thinking that attacks are sophisticated. in mature industries like agriculture, professionals study their enemies and for centuries they have been able to defeat… Continue reading Attacks are not advanced, we are naive!

Software is the root cause of all insecurities

Software is the core of any computerized system and it is the most effective way of introducing insecurities to cyberspace with all its entities. eliminate fancy tools like synthesizer if you want your child be a musician. root cause of all security vulnerabilities (mainly) resides with the software, the foundation of all computer systems, where… Continue reading Software is the root cause of all insecurities

Security and Quality

Security is a matter of usability and one of elements of quality of a system. ain’t it literally a matter of “safety”? how come Quality does care about a defect related to safety of a user in physical world but not the virtual world? security bug is named differently: security vulnerability, but ain’t just a… Continue reading Security and Quality

Cyber Security: The Essential Role of Internet Service Provider

It has been logically proven to me that some elements of cyber security of any internet user is solely on shoulder of ISP but that has been the last thing we ever cared perhaps because we tend to complicate simple things! ISP is supposed to be the only owner, or main layer to internet user… Continue reading Cyber Security: The Essential Role of Internet Service Provider

Regulating Dark Web!

I came across an article the other day on Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources!  A publication from justice.gov with interesting insight but opened an old wound for me! Trying to regulate an environment which is naturally unregulated sounds not reasonable. it is like saying you can… Continue reading Regulating Dark Web!

Fix Cybersecurity Issues vs Making Money Out of Them!

Have we really been fixing cyber-security issues and challenges, or we just want to make money out of “lack of awareness”? The simplest analogy I can think of is cigarette and generally tabaco industry. If we really believed that those are against society and individual health, how much is cost of cancer and other complications… Continue reading Fix Cybersecurity Issues vs Making Money Out of Them!

Organic Compliance! Deep Dive into a Clause, No Matter which…

One of the effective techniques to handle ISO 27001 or any other security management standard or framework is to go deep into a matter regardless of where you want to start or even where to are forced to start.  In practice, the main challenging question and the answer for that to many organizations, when they… Continue reading Organic Compliance! Deep Dive into a Clause, No Matter which…

Is EFS secure?

I have seen many official statements about EFS being so insecure and we should not use it blah blah…and that is so surprising for me something from professional sources hearing a unprofessional statement, or better say, inaccurate assumption about one of the simplest and effective ways towards cryptographic practices!  Assuming you know what Encrypting File… Continue reading Is EFS secure?

The Main Source of Cyber Threat Intelligence

Which firm, company or solution can have the most comprehensive source of threat intelligence? The question should come to your mind when you are shopping for this security matter for any reason. Sources can have different type of data and then convert it to useful information via either active or passive mechanisms to gather intelligence,… Continue reading The Main Source of Cyber Threat Intelligence