if you learn cooking from fast‑food ads, don’t expect to become a chef.” the internet is bigger than your search bar people think “internet” means whatever shows up on the first page of a search engine. that is the first mistake. search engines are built for popularity, not accuracy. they show what is loud, not… Continue reading Learn security from internet but not just Google
Privacy—Again, But in Different Words
Privacy: your online identity isn’t masked by using a VPN. A VPN simply redirects your traffic to a private sector—where targeting you becomes easier and more meaningful. Whatever we call a “privacy model” is baked into the nature of the system itself. It can’t be changed or avoided unless you opt out entirely. If you… Continue reading Privacy—Again, But in Different Words
Abusing Internet Users: The Silent Cost Behind “Free” Online Services
There is a reason many of us hesitate to work on platforms like Facebook, Twitter, or any of these so‑called “free” online services. It is not because the technology is bad. It is because the model is bad. These services do not just host our content — they quietly learn from our experiences, our decisions,… Continue reading Abusing Internet Users: The Silent Cost Behind “Free” Online Services
Does Internet Act As A Valid Source Of Information?
Internet was built with the initial goal of providing the most validated data to the corresponding party. Today we are so far away from that mindset but still, how much we can rely on the data provided via the Net? The answer is simply depends on the source of data. People usually believe what they… Continue reading Does Internet Act As A Valid Source Of Information?
No Silver Bullet in Computer Security
There is no silver bullet in any aspect of information security. All the answers like EDR, MFA, SIEM… might get you in a better or worse security posture, it all depends to how you implement and manage but none of them are silver bullet in their area (malware protection, authentication, monitoring…). It is all about… Continue reading No Silver Bullet in Computer Security
Troubleshooting with Google is useless because you won’t learn
problem solving is not searching searching might give you an answer. but it won’t give you understanding. “water usually finds the way out of a leaky pipe, but it won’t fix the plumbing.” systems are complex. success is luck without insight. troubleshooting is its own skill you learn to troubleshoot by knowing what parts interact.… Continue reading Troubleshooting with Google is useless because you won’t learn
Accurate Vendor Risk Assessment
How to have an accurate vendor risk assessment? Assessing your vendors, suppliers, business associates…or any other term you give to who is providing services to your firm is crucial and even might be required from a regulatory stand point (i.e. like in HIPAA). I do not want to get into detail of what would be… Continue reading Accurate Vendor Risk Assessment
Vendor Risk Assessment: Hassle or Blessing?!
A Security Questionnaire, RFI, VRA (Vendor Risk Assessment), VR Management…helps customers identify and evaluate the risks of using a vendor’s product or service. Performing such a review is sometimes mandatory based on the industry (e.g. healthcare). During this standard business process, customer collects written information about security capabilities of a supplier and you could barely… Continue reading Vendor Risk Assessment: Hassle or Blessing?!
Coding Skills and Security Administration
Know how to code and take your computer security effectiveness to next level
Tech Staff Justifies Incompetence!
Have you ever listened to your tech team trying to justify all the tasks left behind, delayed or procrastinated? Do you have an IT team brining excuses for every project there are facing and try to blame everything except the root cause? Then you are not alone! Here is a known list of IT staff… Continue reading Tech Staff Justifies Incompetence!