ICS Common Vulnerabilities – 1
Every week, I plan to share with you the vulnerabilities and solution suggestions that I encounter most in Industrial control systems. In this week’s article, I will share Remote Desktop…
Continue readingEvery week, I plan to share with you the vulnerabilities and solution suggestions that I encounter most in Industrial control systems. In this week’s article, I will share Remote Desktop…
Continue readingIn this article, I will share with you the relationship between Emerging Technology & Disruptive Technology concepts and cyber security. Let’s start by trying to understand what these two concepts…
Continue readingSome extraordinary people always go ahead of technological innovations with their imaginations, and things that seem like dreams to us suddenly become reality. Metaverse, which is used as an abbreviation…
Continue readingIn today’s blog post I’ll try to share with you Richard’s model of DNA and how important trying to achieve it is when preparing to handle incidents, and that incident…
Continue readingThe cyber world is an endlessly expanding field, which offers huge opportunity for the digital transformation due to the subsisting high cyber prospect and interconnectivity. The goal behind digital transformation…
Continue readingBlockchain technology is being implemented in lots of innovative applications, together with cryptocurrencies, financial systems, communication systems, IoT, health care, censorship resistance, smart contracts, digital voting, and distributed provenance. Attackers…
Continue readingThere are various varieties of online scams being notion up by cyber crooks each day. it’s miles crucial in an effort to stumble on what we are provided with (via…
Continue readingAll hackers have a series of steps to meet their demands, these steps help hackers to get important information step by step and then use that information to penetrate the…
Continue readingThe Washington Post, one of the largest and oldest newspapers in the United States, reported on December 13, 2020, that many government agencies, including the U.S. Department of the Treasury…
Continue readingMany new safety specialists misunderstand this idea and believe the greater data you have got, the better off you’re. I’ve seen corporation register their tools to random threat intelligence feeds…
Continue readingNanotechnology refers to the creation of helpful materials, devices and systems through matter on the metric linear unit (nm) scale, with characteristic dimensions below 100nm, and exploiting of novel phenomena…
Continue readingIn my blog, which I started with Turkish content in 2018, I decided to continue my blog posts with English content in order to increase my international awareness. You can…
Continue reading