Saleem YousafMar 312 min readExploring Passwordless Security: Pros and ConsIn the ever-evolving landscape of cybersecurity, the traditional password-based authentication method is increasingly being scrutinized...
Saleem YousafMay 6, 20233 min readSecuring your digital footprint - A guide to Attack Surface Management (ASM)In the earlier days of cyber security, implementing controls could be done with a perimeter approach. A well-architected network with a...
Saleem YousafMay 6, 20233 min readThe value of Phishing simulations in security awarenessPhishing is a threat as old as the internet itself, and it seems incredible that we are still talking about it in 2023. Unfortunately,...