• Skip to primary sidebar
  • Skip to content

M. Mekin Pesen

Cyber Arrows: The Posts About Cyber Security and Information Security

  • Home
  • About
  • Contact
  • RSS
Peter Paul Ruben's copy of the lost Battle of Anghiari

by M. Mekin Pesen on November 22, 2019

Tussling for Cyber Threat Intelligence Power Under the Shadow of Swords

In terms of cyber security capability, undisputedly, Google and Microsoft have both security analytics, web scanning and classifying, machine learning (ML), artificial intelligence (AI), user and entity behaviour analytics (UEBA) alongside diverse intelligence resources. Hence, we can accept them as of equal strength in the capability and resources. But this situation may differ in details. And some details can …

Continue Reading about Tussling for Cyber Threat Intelligence Power Under the Shadow of Swords →

Filed Under: Threat Intelligence Tagged With: cyber threat intelligence, google, microsoft, threat intelligence, virustotal, wer, windows error report

by M. Mekin Pesen on October 22, 2019

Social Media’s Utopia: Security and Privacy

Social media have almost become a starting point when connecting to the internet for most people. The fact that users internalize the services provided by social networks and make them an indispensable habit of daily routine has not only exposed them to various dangers, but also the sense of belonging they have created in time has turned into their reflections in real life. For some, this has even caused pathological …

Continue Reading about Social Media’s Utopia: Security and Privacy →

Filed Under: Internet Security Tagged With: social media, social networks

by M. Mekin Pesen on July 16, 2019

Firewalls: Overestimated, Underestimated and Misunderstood

Once it was our impenetrable castle. Later it just became like a wall. Then, it transformed into a fence. I am talking about firewalls. After all this ordeal of evolution, it again tries to gain a central role in security even at the dawn of the software-defined networks (SDN). And this role is based on controlling access. But do we really understand firewalls, what are they and what are they supposed to …

Continue Reading about Firewalls: Overestimated, Underestimated and Misunderstood →

Filed Under: Network Security Tagged With: firewall, sdn

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

I am M. Mekin Pesen. This is my arena and I am a lifelong learner. I have about 11 years of cyber security job experience in finance, insurance and telecom industries. Read more...

  • LinkedIn
  • Twitter
  • Twitter
  • Pocket

Recent Posts

  • Overlooked or Underrated Problems of The Secure Messaging Apps
  • Security Tenets for Mobile Applications
  • SOAR Fiction: The Playbooks
  • Bringing Order to Chaos: Securing Containers
  • Security Architecture in Business Context

Categories

  • Application Security
  • Container Security
  • General
  • Internet Security
  • Mobile Security
  • Network Security
  • Security Architecture
  • Security Monitoring
  • Threat Intelligence

THE CYBER ARROWS

Please check your inbox for a verification message from “FeedBurner Email Subscriptions” to activate your subscription.

  • Home
  • About
  • Contact
  • RSS
  • LinkedIn
  • Twitter
  • Pocket

COPYRIGHT © 2021, M. Mekin Pesen. Unauthorized use and/or duplication of this blog's content and material without express and written permission from M. Mekin Pesen is strictly prohibited. Only links may be used, provided that full credit is given to “M. Mekin Pesen” with appropriate and exact URL direction to the original content.

DISCLAIMER: Expressions and opinions posted in this website are my own. Unless I am quoting someone explicitly, none of these reflects my employer, those of people I work with, the persons who I am connected in my social life and any other people. The downloading, using, installation or implementing of any codes, software and tools from this website is at your own risk. M. Mekin Pesen does not accept any responsibility for the correct functioning and operation of software, code or tool downloaded from this website or referred by this website.