top of page
The Big Cyber Blog
Search
Saleem Yousaf
May 6, 20233 min read
Securing your digital footprint - A guide to Attack Surface Management (ASM)
In the earlier days of cyber security, implementing controls could be done with a perimeter approach. A well-architected network with a...
11 views0 comments
Saleem Yousaf
May 6, 20233 min read
The value of Phishing simulations in security awareness
Phishing is a threat as old as the internet itself, and it seems incredible that we are still talking about it in 2023. Unfortunately,...
8 views0 comments
Saleem Yousaf
Jan 29, 20233 min read
How to protect against supply chain attacks
Cybercriminals are a clever bunch when it comes to attacking their targets. Previously it used to be easy to target a particular company...
5 views0 comments
Saleem Yousaf
Jan 29, 20233 min read
How to solve the Ransomware problem
In 2023 it is safe to say that cybercrime has evolved from a mere nuisance to a global threat of monumental proportions. To prove this is...
3 views0 comments
Saleem Yousaf
Jan 29, 20233 min read
How to protect against Cryptojacking
The cryptocurrency craze has been going on for many years now, and for a good reason. The attraction of cryptocurrency for users lies in...
3 views0 comments
Saleem Yousaf
Dec 22, 20223 min read
Purple teams and how they supercharge your security testing
A few decades back, penetration testing was considered a highly effective control that CISOs would swear by. It sounded simple enough:...
10 views0 comments
Saleem Yousaf
Dec 22, 20223 min read
How Cloud HSMs take away the complexity of key management
Key management is no one’s idea of a fun time. If you are not familiar with the term, then this involves the secure handling of...
6 views0 comments
Saleem Yousaf
Dec 16, 20223 min read
Penetration Testing is dead .. Long live Breach and Attack Simulation
Stop if you have heard this before A CISO budgets for a penetration test for their company covering all the key assets that a...
14 views0 comments
bottom of page