PinnedPublished inCyberBakery.netCracking the Code: Addressing the Challenges of Password SecurityIn 2024, managing passwords continues to be one of the most critical cybersecurity challenges. Security experts often point out that the…Jul 2, 2024Jul 2, 2024
Is the Purdue Model Obsolete in the Era of IoT and Cloud Industrial Control Systems(ICS)?This is one of the articles that was published on my blog.Jan 8Jan 8
Uncovering Misunderstandings About Cloud Security — And How to Resolve ThemI'm certain you’ve heard many concerns from CISOs who are struggling to gain visibility into cloud environments despite their considerable…Aug 9, 2024Aug 9, 2024
Published inCodeXStrengthening Software Development Security: Critical Takeaways from the CrowdStrike IncidentI am writing this post in a week when we saw the most significant IT outage ever. A content update in the CrowdStrike sensor caused a blue…Jul 23, 2024Jul 23, 2024
Rethinking Cybersecurity: Challenging the Commoditisation and Embracing Restorative PracticesOriginally published on www.cyberbakery.netJul 11, 2024Jul 11, 2024
Published inCyberBakery.netYou’re Using More Open-Source Than You RealiseOriginally published on Cyberbakery.net. https://www.cyberbakery.net/youre-using-more-open-source-than-you-realise/Jul 5, 20241Jul 5, 20241
Published inCyberBakery.netKeep Calm and Patch On!! Log4Shell is just not another Zero-DayOriginally published at https://cyberbakery.net/ on Dec 19, 2021Mar 25, 2022Mar 25, 2022
Published inCodeXIf History Could Indicate The Future….. Cybersecurity Predictions for 2022In this first post this year, I am taking out my crystal ball to predict the cybersecurity outlook in 2022 and beyond. If history could…Mar 25, 2022Mar 25, 2022
Published inInfoSec Write-upsWhose Responsibility Is For Good Cyber Hygiene?It was just over thirty years when Tim Berners-Lee’s research at CERN, Switzerland, resulted in World Wide Web, which we also Know as the…Mar 25, 2022Mar 25, 2022
Published inCyberBakery.netApplication Programming Interface (API): Cybersecurity Risks and Mitigation StrategiesOriginally published on cyberbakery.netMar 19, 2022Mar 19, 2022