This article talks about Quantum Computing and Cryptography
read moreCase Study - Malaysia Airline's Concentration Risk
This case study examines the recent issue with MAS and BFS
read moreBYOVD - Bring Your Own Vulnerable Driver
This articles blablabla
read moreKerberos and Forging Tickets (2023)
This articles Kerberos implementation in Microsoft Active Directory and forging tickets
read moreStill changing passwords regularly?
This article looks at the relevance of frequent password changes
read moreDownfall of Intel Chips
A new vulnerabolity affecting CPUs are discussed in this article
read moreTrue C vs False C - Case study on the role CISO - Part 4
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 3
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 2
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 1
This multi part article looks into the argument whether CISO is a True C or a False C role
read more