Erdal in the news

Awards : Hall of Fame & Cyber Influencer

This is a very auspicious moment for me to announce  one more milestone in my career: It’s a great honour for me to be given accolades and award for being part of EC Council Hall of Fame and CISO Magazine Cybersecurity Influencer of the year First of all special thank you, to the jury for selecting me , to CISO Magazine for making this happen [...]


Text Book at Marshall University

I can not describe how proud I feel when I receive good news like this ones. After I have announced that our book which we wrote with Yuri, Cybersecurity Attack and Defense Strategies (you can check the blog post here) is used as a textbook at Colorado State University (CSU) some of my Social Media followers reached [...]


Text Book at Colorado State University

ENGR 569 - Cybersecurity Awareness for Systems Engineers I am extremely proud to announce that, I just find out that one more of my books is used as a textbook at Colorado State University. Cybersecurity Attack and Defense Strategies, which we wrote with Yuri was awarded many times by Book Authority, but this news is even more valuable to me [...]


Understanding the cost of a cybersecurity attack: The losses organizations face

http://qualitytechnews.com/understanding-the-cost-of-a-cybersecurity-attack-the-losses-organizations-face-packt-hub/ The average cost of a cybersecurity attack has been increasing over time. The rewards to hackers in cyberheists have also been increasing, and this has been motivating them to come up with even better tools and techniques in order to allow them to steal more money and data. Several cybersecurity companies have listed their estimates for the average costs [...]


Cybersecurity Canon Candidate Book Review: Learn Social Engineering

  Executive Summary Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert will equip you with a holistic understanding of social engineering. It will help you  avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics ranging from baiting, phishing, and spear phishing, to pretexting [...]