CISA published guide for SOAR, SIEM Implementation

The CISA, in collaboration with international and U.S. partners like the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), has published guidance for organizations looking to implement Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms. This article focuses on the implementation of Security Information and Event Management (SIEM) […]

FIDO2 Vs MFA: Is it time to switch

FIDO2 is an open authentication standard that enables users to log in to online services without using a password. It uses public key cryptography to provide strong authentication that is resistant to phishing and other online attacks.  To use FIDO2, you will need a compatible device and an account with a service that supports FIDO2 […]

Steganography:the art of concealing messages

Steganography is a technique used to hide data within another file or message, making it difficult to detect. It’s different from encryption, which scrambles data to make it unreadable without a key. Instead, steganography conceals the existence of the hidden data itself. How Steganography Works: There are various methods of steganography, but they all involve […]

Neuromarketing, Persuasive Communication, AI and ML: The New Age of Cybersecurity

Neuromarketing and persuasive communication are two fields that have become increasingly intertwined in recent years. By understanding how the brain processes information and makes decisions, marketers can create more effective messages that resonate with their target audience. While these were all known and studied for years and years, we need to take into consideration additional […]

Tech Debt and Risk: you can’t run from it or ignore

Technical debt or tech debt is a metaphor used to describe the consequence of choosing a quick and easy solution over a more robust, long-term solution. This debt accumulates over time and can lead to increased maintenance costs, reduced development velocity, and increased risk of system failures. Examples of Tech Debt in IT Software to […]