• Skip to primary sidebar
  • Skip to content

M. Mekin Pesen

Cyber Arrows: The Posts About Cyber Security and Information Security

  • Home
  • About
  • Contact
  • RSS
Attila and His-Hordes Overrun Italy and The Arts

January 25, 2021 by M. Mekin Pesen

Overlooked or Underrated Problems of The Secure Messaging Apps

People mostly do not take any action in the absence of a financial gain, a moral incentive or a financial loss. In the recent WhatsApp case, most people did not even care what happened. That is because neither the loss nor the gain is visible to the masses. Whatever is done for security or privacy, reckless crowds will always be ready in the pocket of the sovereign player. This situation causes those who hold the …

Continue Reading about Overlooked or Underrated Problems of The Secure Messaging Apps →

Filed Under: Application Security Tagged With: data-at-rest, data-in-use, secure messaging, secure messaging apps, telegram, whatsapp

Mustafa Kemal Pasha Leaving TBMM for the Front

October 29, 2020 by M. Mekin Pesen

Security Tenets for Mobile Applications

There is hardly a day without a security or privacy issue affecting mobile applications. A considerable amount of mobile apps, including popular ones, lack certain security and privacy requirements. When you survey current best-practices or secure frameworks, you will see a whole bunch of conditions and to-do. But there should be minimum requirements for hardening and securing any mobile applications from …

Continue Reading about Security Tenets for Mobile Applications →

Filed Under: Mobile Security Tagged With: application security, mobile application security, mobile security

Charles-Antoine Coypel: Fury of Achilles

September 27, 2020 by M. Mekin Pesen

SOAR Fiction: The Playbooks

The tool which can find its real meaning from its user's scenarios and sine qua non inputs is a Security Orchestration Automation and Response (SOAR) platform. By bringing productivity growth in security workflows, harmonizing security tools for multiple purposes, providing flexibility into your security architecture and accelerating decision-making process, SOAR is mainly used for security operations centres (SOC) …

Continue Reading about SOAR Fiction: The Playbooks →

Filed Under: Security Monitoring Tagged With: security automation, security orchestration, security response, SOAR

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

I am M. Mekin Pesen. This is my arena and I am a lifelong learner. I have more than 10 years of cybersecurity job experience in finance, telecom and insurance industries. Read more...

  • LinkedIn
  • Twitter
  • Twitter
  • Pocket

Recent Posts

  • Overlooked or Underrated Problems of The Secure Messaging Apps
  • Security Tenets for Mobile Applications
  • SOAR Fiction: The Playbooks
  • Bringing Order to Chaos: Securing Containers
  • Security Architecture in Business Context

Categories

  • Application Security
  • Container Security
  • General
  • Internet Security
  • Mobile Security
  • Network Security
  • Security Architecture
  • Security Monitoring
  • Threat Intelligence

THE CYBER ARROWS

Please check your inbox for a verification message from “FeedBurner Email Subscriptions” to activate your subscription.

  • Home
  • About
  • Contact
  • RSS
  • LinkedIn
  • Twitter
  • Pocket

COPYRIGHT © 2021, M. Mekin Pesen. Unauthorized use and/or duplication of this blog's content and material without express and written permission from M. Mekin Pesen is strictly prohibited. Only links may be used, provided that full credit is given to “M. Mekin Pesen” with appropriate and exact URL direction to the original content.

DISCLAIMER: Expressions and opinions posted in this website are my own. Unless I am quoting someone explicitly, none of these reflects my employer, those of people I work with, the persons who I am connected in my social life and any other people. The downloading, using, installation or implementing of any codes, software and tools from this website is at your own risk. M. Mekin Pesen does not accept any responsibility for the correct functioning and operation of software, code or tool downloaded from this website or referred by this website.