Sponsored by Keepnet Labs

Cyber Security

All what you need to know about Cyber

Forensic investigation of a Social Engineering attack

Forensic investigation of a Social Engineering attack In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom [...]


How to do 3th part risk management

7 steps to protect against Vulnerable Third-party Service Providers 

7  Steps to protect against Vulnerable Third-party Service Providers : There is no shortage of headlines when it comes to third-party breaches. While third-party software is becoming a common commodity in most organizations, currently there’s a lack of a formal vetting process to assess the security posture of the software and mitigate the risks they pose to a company’s core [...]


DevSecOPs

4 Benefits of Development Security Operations

Benefits of Development Security Operations DevSecOps , short for development, security, and operations —automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery. Learning institutions are continually releasing developers into the world. However, most of these institutions only focus on teaching developers how to actualize functionalities in application [...]


CTI

Building a Cyber Threat Intelligence Platform in 5 steps

Cyber threat intelligence is information about a prevailing or evolving cyber threat that can be disseminated by threat intelligence partners to organizations in order to reinforce security against cyber-attack vectors , This short article will help you to leant how to build a Cyber Threat Intelligence Platform in 5 steps


Don’t let Hackers steal your password 2

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your [...]


Speaking at Qatar Hybrid Cloud & Data Center Summit 2021

Qatar Hybrid Cloud & Data Center Summit 2021 I will be speaking at the event which is sponsored by Microsoft... Join us if you can : Driving Business Innovation while Reducing Costs, Improving Productivity with Agility & Scalability in the Next Normal. Preparing IT Leaders for the Next Normal is the key for business success & continuity. I&O leaders have adapted [...]


New Book : Incident Response in the Age of Cloud

After many months of very hard work , finally my new book " Incident Response in the age of Cloud" for everyone who wants to learn how to identify a security incident and build a series of best practices to stop an attack before it creates serious consequences. Cybercriminals are always in search of new methods and ways to infiltrate [...]


Awarded as Technology Leader by CIO Online and IDC

Technology Leader Award by CIO Online and IDC I am really honored to be selected in the TOP 50 Technology Leaders by IDC and CIO Online. I am thank full to CIO Online, IDC Middle East , the judges as well as my family for their unconditional support, my team for making this happen... Regards Erdal The CIO50 Middle East awards criteria The 2021 CIO50 Middle East awards [...]