• Skip to primary sidebar
  • Skip to content

M. Mekin Pesen

Cyber Arrows: The Posts About Cyber Security and Information Security

  • Home
  • About
  • Contact

by M. Mekin Pesen on October 22, 2019

Social Media’s Utopia: Security and Privacy

Social media have almost become a starting point when connecting to the internet for most people. The fact that users internalize the services provided by social networks and make them an indispensable habit of daily routine has not only exposed them to various dangers, but also the sense of belonging they have created in …

Continue Reading about Social Media’s Utopia: Security and Privacy →

Filed Under: Internet Security Tagged With: social media, social networks

by M. Mekin Pesen on July 16, 2019

Firewalls: Overestimated, Underestimated and Misunderstood

Once it was our impenetrable castle. Later it just became like a wall. Then, it transformed into a fence. I am talking about firewalls. After all this ordeal of evolution, it again tries to gain a central role in security even at the dawn of the software-defined networks (SDN). And this role is based on controlling access. …

Continue Reading about Firewalls: Overestimated, Underestimated and Misunderstood →

Filed Under: Network Security Tagged With: firewall, sdn

Circumventing of FT's paywall

by M. Mekin Pesen on June 26, 2019

Circumventing The Paywalls and The Paywalls Dilemma

More and more online news resources have been using a paywall for generating revenue from their news, articles and content since 2010. This is an indisputable right of the owners. What about end users? Are these paywalls embraced by users? Are the paywalls working correctly? From the end user perspective, it seems there is …

Continue Reading about Circumventing The Paywalls and The Paywalls Dilemma →

Filed Under: Useless Security Tagged With: circumventing, paywalls

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 3
  • Go to page 4
  • Go to page 5

Primary Sidebar

I am M. Mekin Pesen. This is my arena and I am a lifelong learner. I have 13 years of cyber security job experience. Read more...

  • LinkedIn
  • Twitter
  • Twitter
  • Pocket

Recent Posts

  • The Security Architecture of a Typical Web and Mobile Application
  • How to Stop Wasting Your Vulnerability Scanning
  • The Uselessness of E-Mail Hash Scanning
  • Three Blows of The Sword Against National Cyberspace Defense
  • A Game of Boundaries and Vulnerabilities

Categories

  • Application Security
  • Container Security
  • Internet Security
  • Mobile Security
  • Network Security
  • Security Architecture
  • Security Monitoring
  • Strategy
  • Threat Intelligence
  • Useless Security

Popular Posts

  • Bringing Order to Chaos: Securing Containers
  • Home
  • About
  • Contact
  • LinkedIn
  • Twitter
  • Pocket

COPYRIGHT © 2023, M. Mekin Pesen. Unauthorized use and/or duplication of this blog's content and material without express and written permission from M. Mekin Pesen is strictly prohibited. Only links may be used, provided that full credit is given to “M. Mekin Pesen” with appropriate and exact URL direction to the original content.

DISCLAIMER: Expressions and opinions posted in this website are my own. Unless I am quoting someone explicitly, none of these reflects my employer, those of people I work with, the persons who I am connected in my social life and any other people. The downloading, using, installation or implementing of any codes, software and tools from this website is at your own risk. M. Mekin Pesen does not accept any responsibility for the correct functioning and operation of software, code or tool downloaded from this website or referred by this website.