• Skip to primary sidebar
  • Skip to content

M. Mekin Pesen

Cyber Arrows: The Posts About Cyber Security and Information Security

  • Home
  • About
  • Contact
The Facade of the Alexander Sarcophagus in the Istanbul Archaeology Museum

by M. Mekin Pesen on June 18, 2022

The Security Architecture of a Typical Web and Mobile Application

Many web and mobile applications are developed routinely in large organisations. You can benefit from some threat modelling for security architecture assessment, even though they are not one-size-fits-all solutions. The known models do not tick all the boxes. It is doubtful that even those who created these models use them …

Continue Reading about The Security Architecture of a Typical Web and Mobile Application →

Filed Under: Security Architecture Tagged With: access security, application security, data security, identity security, mobile application security, network security, security architecture, threat modelling

by M. Mekin Pesen on December 14, 2021

How to Stop Wasting Your Vulnerability Scanning

While running vulnerability scanning tools on a network, they should have a configuration that does not breake the operation, integrity and fragility of the infrastructure. They should be used in a sensitive and effective manner. Otherwise, the heaviest object in the universe might be your vulnerability scan …

Continue Reading about How to Stop Wasting Your Vulnerability Scanning →

Filed Under: Security Monitoring Tagged With: vulnerability assessment, vulnerability management, vulnerability scanning

by M. Mekin Pesen on October 28, 2021

The Uselessness of E-Mail Hash Scanning

Securing e-mail is a very heavy task due to its ancient infrastructure. Though this job should primarily rely on user awareness, there are a couple of measures that should be considered collectively such as security gateways, SPF, DKIM, DMARC, etc. But scanning of an e-mail message’s or body’s hash value in known malicious …

Continue Reading about The Uselessness of E-Mail Hash Scanning →

Filed Under: Useless Security Tagged With: e-mail security, useless security

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

I am M. Mekin Pesen. This is my arena and I am a lifelong learner. I have 12 years of cyber security job experience. Read more...

  • LinkedIn
  • Twitter
  • Twitter
  • Pocket

Recent Posts

  • The Security Architecture of a Typical Web and Mobile Application
  • How to Stop Wasting Your Vulnerability Scanning
  • The Uselessness of E-Mail Hash Scanning
  • Three Blows of The Sword Against National Cyberspace Defense
  • A Game of Boundaries and Vulnerabilities

Categories

  • Application Security
  • Container Security
  • Internet Security
  • Mobile Security
  • Network Security
  • Security Architecture
  • Security Monitoring
  • Strategy
  • Threat Intelligence
  • Useless Security

Popular Posts

  • Bringing Order to Chaos: Securing Containers
  • Home
  • About
  • Contact
  • LinkedIn
  • Twitter
  • Pocket

COPYRIGHT © 2023, M. Mekin Pesen. Unauthorized use and/or duplication of this blog's content and material without express and written permission from M. Mekin Pesen is strictly prohibited. Only links may be used, provided that full credit is given to “M. Mekin Pesen” with appropriate and exact URL direction to the original content.

DISCLAIMER: Expressions and opinions posted in this website are my own. Unless I am quoting someone explicitly, none of these reflects my employer, those of people I work with, the persons who I am connected in my social life and any other people. The downloading, using, installation or implementing of any codes, software and tools from this website is at your own risk. M. Mekin Pesen does not accept any responsibility for the correct functioning and operation of software, code or tool downloaded from this website or referred by this website.