• Skip to primary sidebar
  • Skip to content

M. Mekin Pesen

Cyber Arrows: The Posts About Cyber Security and Information Security

  • Home
  • About
  • Contact
  • Newsletter
Mustafa Kemal Pasha Leaving TBMM for the Front

by M. Mekin Pesen on October 29, 2020

Security Tenets for Mobile Applications

There is hardly a day without a security or privacy issue affecting mobile applications. A considerable amount of mobile apps, including popular ones, lack certain security and privacy requirements. When you survey current best-practices or secure frameworks, you will see a whole bunch of conditions and to-do. But there …

Continue Reading about Security Tenets for Mobile Applications →

Filed Under: Mobile Security Tagged With: application security, mobile application security, mobile security

Charles-Antoine Coypel: Fury of Achilles

by M. Mekin Pesen on September 27, 2020

SOAR Fiction: The Playbooks

The tool which can find its real meaning from its user's scenarios and sine qua non inputs is a Security Orchestration Automation and Response (SOAR) platform. By bringing productivity growth in security workflows, harmonizing security tools for multiple purposes, providing flexibility into your security …

Continue Reading about SOAR Fiction: The Playbooks →

Filed Under: Security Monitoring Tagged With: security automation, security orchestration, security response, SOAR

by M. Mekin Pesen on May 25, 2020

Bringing Order to Chaos: Securing Containers

Containers are like Jumanji. You feel as if you are in a game and your every move reveals a series of surprises which may suddenly end up with security disasters. This is because security is considered as an afterthought as always. According to some practitioners, container security is like securing a traditional server. …

Continue Reading about Bringing Order to Chaos: Securing Containers →

Filed Under: Container Security Tagged With: container security, docker security, kubernetes security

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

I am M. Mekin Pesen. This is my arena and I am a lifelong learner. I have 12 years of cyber security job experience. Read more...

  • LinkedIn
  • Twitter
  • Twitter
  • Pocket

Recent Posts

  • The Security Architecture of a Typical Web and Mobile Application
  • How to Stop Wasting Your Vulnerability Scanning
  • The Uselessness of E-Mail Hash Scanning
  • Three Blows of The Sword Against National Cyberspace Defense
  • A Game of Boundaries and Vulnerabilities

CYBER ARROWS

A newsletter that tries to catch the most notable cybersecurity articles, resources, analysis and tools.

By subscribing, you agree with Revue’s Terms&Privacy Policy.

Categories

  • Application Security
  • Container Security
  • Internet Security
  • Mobile Security
  • Network Security
  • Security Architecture
  • Security Monitoring
  • Strategy
  • Threat Intelligence
  • Useless Security

Popular Posts

  • Hardening and Securing WordPress Without Plugins
  • Home
  • About
  • Contact
  • Newsletter
  • LinkedIn
  • Twitter
  • Pocket

COPYRIGHT © 2022, M. Mekin Pesen. Unauthorized use and/or duplication of this blog's content and material without express and written permission from M. Mekin Pesen is strictly prohibited. Only links may be used, provided that full credit is given to “M. Mekin Pesen” with appropriate and exact URL direction to the original content.

DISCLAIMER: Expressions and opinions posted in this website are my own. Unless I am quoting someone explicitly, none of these reflects my employer, those of people I work with, the persons who I am connected in my social life and any other people. The downloading, using, installation or implementing of any codes, software and tools from this website is at your own risk. M. Mekin Pesen does not accept any responsibility for the correct functioning and operation of software, code or tool downloaded from this website or referred by this website.