Category: Security Fundamentals

  • zero-trust: reselling old under a different name

    the market has been acting as a reseller since late 90’s. we simply resell an old solution under a different shiny name again and again. one of the best examples is zero trust. with all noises around this concept, poor desperate companies waiting to resolve their security issues, or perhaps thirsty budgets waiting to find…

  • is security really a journey?

    you have probably heard or even sick of it: security is a journey…it never ends…security is not a destination…yada yada is security really a journey, or let’s say, does it have to be an endless journey where we actually do not enjoy or even hate to have such a journey? security as a journey yes…

  • is Dark Web really dark?

    it has been relatively a long time since threat intelligence sources started to integrate what they call as “dark web” into their system of data/intelligence gathering, prioritization and delivery as a service to threat hunters. nothing really wrong with that, it is actually a reasonable and even crucial part of any threat hunting system, but…

  • are you surprised by SolarWinds hack?

    it is really funny when they call it one of the most sophisticated hacks in history and stuff like that, because it is actually one the most stupid hacks of all the times. nothing is really surprising about Solarigate or whatever they call it to me except how those companies that forever they have been…

  • is Security inconvenient?

    we presume Security is always equal inconvenient, either form consumer point of view, or developer. as a consumer you have to remember passwords and configure stuff, and as a developer to need to make sure you put controls around authentication process and how passwords are being used. I agree that is inconvenient but are we…

  • Attacks are not advanced, we are naive!

    cyber attacks that you hear about them in news these days are not advanced at all, this is security community acting so naive and blind, knowingly and unknowingly which then implies into thinking that attacks are sophisticated. in mature industries like agriculture, professionals study their enemies and for centuries they have been able to defeat…

  • Cyber Security: The Essential Role of Internet Service Provider

    It has been logically proven to me that some elements of cyber security of any internet user is solely on shoulder of ISP but that has been the last thing we ever cared perhaps because we tend to complicate simple things! ISP is supposed to be the only owner, or main layer to internet user…

  • Fix Cybersecurity Issues vs Making Money Out of Them!

    Have we really been fixing cyber-security issues and challenges, or we just want to make money out of “lack of awareness”? The simplest analogy I can think of is cigarette and generally tabaco industry. If we really believed that those are against society and individual health, how much is cost of cancer and other complications…

  • The Main Source of Cyber Threat Intelligence

    Which firm, company or solution can have the most comprehensive source of threat intelligence? The question should come to your mind when you are shopping for this security matter for any reason. Sources can have different type of data and then convert it to useful information via either active or passive mechanisms to gather intelligence,…

  • Why Folks Are Not Able to Secure Their Network?

    The question simply is: Why we do not feel insecure even spending a lot, giant teams of professional and bunch of fancy tools?  And the answer simply is: Wrong Direction!  As long as one’s going wrong direction, we certainly cannot even imagine being able to reach the destination. How it is possible to reach the…