SECURE TARGET: A Critical Lens on Tech, Power, and the People Behind It
-
are we still coding, or just copy‑pasting?
this generation of developers has access to more tools than any other time in history. stackoverflow, github issues, reddit, dev.to, kite, tabnine, intellicode… the list keeps growing. and with every new “assistant,” we get further away from the one thing that actually matters in software development: originality. but let’s be honest — the problem is…
-

Learn security from internet but not just Google
if you learn cooking from fast‑food ads, don’t expect to become a chef.” the internet is bigger than your search bar people think “internet” means whatever shows up on the first page of a search engine. that is the first mistake. search engines are built for popularity, not accuracy. they show what is loud, not…
-

Privacy—Again, But in Different Words
Privacy: your online identity isn’t masked by using a VPN. A VPN simply redirects your traffic to a private sector—where targeting you becomes easier and more meaningful. Whatever we call a “privacy model” is baked into the nature of the system itself. It can’t be changed or avoided unless you opt out entirely. If you…
-
Abusing Internet Users: The Silent Cost Behind “Free” Online Services
There is a reason many of us hesitate to work on platforms like Facebook, Twitter, or any of these so‑called “free” online services. It is not because the technology is bad. It is because the model is bad. These services do not just host our content — they quietly learn from our experiences, our decisions,…
-

Offline Is the Only Real Privacy
The Illusion of Being “Connected” We built an internet that behaves like a crowded room where every wall has a microphone. Then we pretend privacy is a setting, a toggle, a subscription, or a VPN logo glowing green. In this era, the truth is simpler and more uncomfortable: Privacy ends the moment you connect. Everything…
-
Does Internet Act As A Valid Source Of Information?
Internet was built with the initial goal of providing the most validated data to the corresponding party. Today we are so far away from that mindset but still, how much we can rely on the data provided via the Net? The answer is simply depends on the source of data. People usually believe what they…
-

No Silver Bullet in Computer Security
There is no silver bullet in any aspect of information security. All the answers like EDR, MFA, SIEM… might get you in a better or worse security posture, it all depends to how you implement and manage but none of them are silver bullet in their area (malware protection, authentication, monitoring…). It is all about…
-

Troubleshooting with Google is useless because you won’t learn
problem solving is not searching searching might give you an answer. but it won’t give you understanding. “water usually finds the way out of a leaky pipe, but it won’t fix the plumbing.” systems are complex. success is luck without insight. troubleshooting is its own skill you learn to troubleshoot by knowing what parts interact.…
-

Accurate Vendor Risk Assessment
How to have an accurate vendor risk assessment? Assessing your vendors, suppliers, business associates…or any other term you give to who is providing services to your firm is crucial and even might be required from a regulatory stand point (i.e. like in HIPAA). I do not want to get into detail of what would be…
-
Vendor Risk Assessment: Hassle or Blessing?!
A Security Questionnaire, RFI, VRA (Vendor Risk Assessment), VR Management…helps customers identify and evaluate the risks of using a vendor’s product or service. Performing such a review is sometimes mandatory based on the industry (e.g. healthcare). During this standard business process, customer collects written information about security capabilities of a supplier and you could barely…