• Skip to primary sidebar
  • Skip to content

M. Mekin Pesen

Cyber Arrows: The Posts About Cyber Security and Information Security

  • Home
  • About
  • Contact
  • Newsletter

by M. Mekin Pesen on June 10, 2021

Three Blows of The Sword Against National Cyberspace Defense

Nations and organizations like NATO faces three prominent cyberspace risks which cannot be easily coped with unless they become part of the root solution. These risks are a quantum-capable adversary, supply-chain compromises and the compromised or paralyzed IoTs. The importance of them arises from undeterred enemies. The …

Continue Reading about Three Blows of The Sword Against National Cyberspace Defense →

Filed Under: Strategy Tagged With: cyberspace defense, cyberspace security, cyberspace strategy

a game of snakes and ladders

by M. Mekin Pesen on April 14, 2021

A Game of Boundaries and Vulnerabilities

Security boundary is not formed by firewalls, routers, gateways or identity. It is only defined by your budget and the regulations you are subject to, if they exist. You cannot bend the regulations according to your comfort, and your budget may be directly affected by economics that is adepto ex imperium. Security is a …

Continue Reading about A Game of Boundaries and Vulnerabilities →

Filed Under: Security Architecture Tagged With: measuring security, security economics

Attila and His-Hordes Overrun Italy and The Arts

by M. Mekin Pesen on January 25, 2021

Overlooked or Underrated Problems of The Secure Messaging Apps

People mostly do not take any action in the absence of a financial gain, a moral incentive or a financial loss. In the recent WhatsApp case, most people did not even care what happened. That is because neither the loss nor the gain is visible to the masses. Whatever is done for security or privacy, reckless crowds will always …

Continue Reading about Overlooked or Underrated Problems of The Secure Messaging Apps →

Filed Under: Application Security Tagged With: data-at-rest, data-in-use, secure messaging, secure messaging apps, telegram, whatsapp

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

I am M. Mekin Pesen. This is my arena and I am a lifelong learner. I have 12 years of cyber security job experience. Read more...

  • LinkedIn
  • Twitter
  • Twitter
  • Pocket

Recent Posts

  • The Security Architecture of a Typical Web and Mobile Application
  • How to Stop Wasting Your Vulnerability Scanning
  • The Uselessness of E-Mail Hash Scanning
  • Three Blows of The Sword Against National Cyberspace Defense
  • A Game of Boundaries and Vulnerabilities

CYBER ARROWS

A newsletter that tries to catch the most notable cybersecurity articles, resources, analysis and tools.

By subscribing, you agree with Revue’s Terms&Privacy Policy.

Categories

  • Application Security
  • Container Security
  • Internet Security
  • Mobile Security
  • Network Security
  • Security Architecture
  • Security Monitoring
  • Strategy
  • Threat Intelligence
  • Useless Security

Popular Posts

  • Hardening and Securing WordPress Without Plugins
  • Home
  • About
  • Contact
  • Newsletter
  • LinkedIn
  • Twitter
  • Pocket

COPYRIGHT © 2022, M. Mekin Pesen. Unauthorized use and/or duplication of this blog's content and material without express and written permission from M. Mekin Pesen is strictly prohibited. Only links may be used, provided that full credit is given to “M. Mekin Pesen” with appropriate and exact URL direction to the original content.

DISCLAIMER: Expressions and opinions posted in this website are my own. Unless I am quoting someone explicitly, none of these reflects my employer, those of people I work with, the persons who I am connected in my social life and any other people. The downloading, using, installation or implementing of any codes, software and tools from this website is at your own risk. M. Mekin Pesen does not accept any responsibility for the correct functioning and operation of software, code or tool downloaded from this website or referred by this website.