Sponsored by Keepnet Labs

Cyber Security

All what you need to know about Cyber

The Cyber Dilemma Dr Erdal Ozkaya

The Cybersecurity Dilemma : Join the Free YouTube premiere in September 13

The Cybersecurity Dilemma You all know that Malware/Ransomware is a legitimate code doing illegitimate things. I we could stop a malware from executing, then there would be no problem! So , the question is: WHY ARE YOU ALLOWING THESE MALWARE/RANSOMWARE TO EXECUTE/RUN? This session is all about the Cybersecurity Dilemma that we are facing today, and how we can minimize Cyber attacks...   https://www.youtube.com/watch?v=5B5R1_-TYQs To [...]


Incident response with Microsoft Azure

Incident response with Microsoft Azure – Superior Guide to 1R

Incident response in the cloud As we've already learned, an incident is a service disruption that impacts your customers and end users, regardless of where this is—be it a mobile device or the cloud! We've also learned that incidents can come in many different forms, ranging from performance slowdowns to system crashes or difficulties reaching your server or service! When we look [...]


Posted By Category: Cloud Computing, Cyber Security, How to ...?Comments: 0
CISO Dr Ozkaya

6 Facts you need to know about CISO’s – Free Guide

What is a CISO ? A CISO, or Chief Information Security Officer, is primarily responsible for an organization’s cyber security initiatives. CISOs are technologists, who can participate in high-level initiatives as business strategists. CISO's ensure that IT systems comply with security and regulatory requirements. In summary a C(I)SO is the top Cyber executive of an organization. The Role CISO requires [...]


The Importance of Cybersecurity

Importance of Cybersecurity – Part 1

Importance of Cybersecurity In this fast-paced industry, digitization and staying connected are playing a vital role. This is further coupled with the proliferation of cloud-based and mobile technologies. "Why focus on security?" is a question that has moved from mere security team discussions to board room discussions, and it doesn't stop there either. This, now, is the talk of the industry today. Everyone [...]


Posted By Category: Cyber Security, GeneralTags: Comments: 2
What is Social Engineering

What is Social Engineering ? ( free guide to SE 101 )

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick their victims [...]


Kaseya VSA Breach

Kaseya VSA Breach Consequences of Security Failures

Kaseya VSA Breach Consequences of Security Failures The world has witnessed another large-scale cyber-attack. On July 2, 2021, Kaseya, an IT Systems Management software firm, disclosed a security incident impacting their on-premises version of Kaseya’s Virtual System Administrator (VSA) software. The result was up to 1500 companies being held hostage to a significant ransom demand. Incidents such as these are becoming more commonplace. We are [...]


Mercedes Benz AMG Data Breach

Mercedes Benz AMG Data Breach 2021

 Mercedes Benz AMG Data Breach I regret to inform all of you that I just received an email from Mercedes Benz AMG stating my data which is hold by them has been hacked :( I am one of the 1000 AMG victims and again on of the 1.6 million victims which is hit in the Mercedes-Benz data breach , here [...]


cyber camp baku Erdal Ozkaya

Cyber Camp Baku

Cyber Camp Baku Today Cybersecurity is a top career  not just for adults but also for today's teens to consider. Often its very hard  to find information about what cyber professionals actually do or how to become one especially for the teens. Because of this reason the Azerbaijan Government has created  Cyber Camps for Teens, to share foundational information about cyber [...]


Posted By Category: Announcemets, Cyber SecurityTags: Comments: 0
Kernel API Virtualization by Comodo Erdal

Kernel API Virtualization by Comodo – Uncovered (1)

Kernel API Virtualization by Comodo When it comes to securing your enterprise endpoints, it’s important to have a foundational understanding that there are three types of files: the good, the bad and the unknown. Approaches such as Antivirus (both vendor-branded “next gen” and legacy detection-based), Blacklisting and Whitelisting handle the known good and the bad files – but what about [...]