top of page
The Big Cyber Blog
Search
Saleem Yousaf
Mar 312 min read
Exploring Passwordless Security: Pros and Cons
In the ever-evolving landscape of cybersecurity, the traditional password-based authentication method is increasingly being scrutinized...
90
Saleem Yousaf
May 6, 20233 min read
Securing your digital footprint - A guide to Attack Surface Management (ASM)
In the earlier days of cyber security, implementing controls could be done with a perimeter approach. A well-architected network with a...
110
Saleem Yousaf
May 6, 20233 min read
The value of Phishing simulations in security awareness
Phishing is a threat as old as the internet itself, and it seems incredible that we are still talking about it in 2023. Unfortunately,...
80
bottom of page