Your Technical Foundation Is Rare

If You Were Ahead of the Curve 30 or 40 Years Ago… That means you built a first-principles understanding of computing, networks, and systems. Most people today—even in AI—are building on abstractions. But you? You understand the layers beneath. And remember: that’s not obsolete; it’s leverage. What I’m really saying is, you’re lucky if you… Continue reading Your Technical Foundation Is Rare

What is your background in Computer Security?

Can you be a cybersecurity professional just because you are passionate about it or overnight got a certificate? Real quick answer: NO, not at all! That is actually one of the main reasons behind hackers being always ahead of the security community. I hear people in this industry, well, I should say in this commercial… Continue reading What is your background in Computer Security?

Essential Algorithms: A Practical Approach to Computer Algorithms Using Python and C#

Essential AlgorithmsA Practical Approach to Computer Algorithms Using Python and C#by Stephens, Rod This book resonated deeply with me—especially the chapter on Sorting, which brought back memories of my first real challenge in assembly language programming. I had to sort millions of records using various algorithms to find the fastest one, and that experience shaped… Continue reading Essential Algorithms: A Practical Approach to Computer Algorithms Using Python and C#

Does AI help us in security operations?

it does but only if it is originated from a intelligent programmer. AI is as smart as the people who did its modeling. an artificial intelligence cannot be more intelligent than its origination. presuming AI will be helping us securing cyberspace is like presuming we will have a accurate Accounting system or flawless GL just… Continue reading Does AI help us in security operations?

Relying on SAST/DAST

Relying on DAST/SAST is like investing in a restaurant where chef needs to be reminded of how to safely handle knife. no surprise that software developers have been dragging computer end-users to current situation when software products are no longer reliable, or they are packed with vulnerabilities. I have mentioned before that I believe the… Continue reading Relying on SAST/DAST

Software is the root cause of all insecurities

Software is the core of any computerized system and it is the most effective way of introducing insecurities to cyberspace with all its entities. eliminate fancy tools like synthesizer if you want your child be a musician. root cause of all security vulnerabilities (mainly) resides with the software, the foundation of all computer systems, where… Continue reading Software is the root cause of all insecurities

Does Cloud Guarantees Security?

There is a wrong perception of Cloud security among consumers of the Cloud solutions and platforms. Actually, classic Clouds are more insecure than traditional computing even though it is set on stone for most people even many “IT professionals” that Cloud computing is natively more secure, or by default it is at least more secure… Continue reading Does Cloud Guarantees Security?

Penetration Testing vs. Secure Code Review

What is the best way to make sure a software product is secure?  The easiest way is to roll out to the market and see what is going to happen and hope everything does well…no kidding, that is what most software developers do!  Let’s forget about what majority of software community do and see what… Continue reading Penetration Testing vs. Secure Code Review