top of page
The Big Cyber Blog
Search


Exploring Passwordless Security: Pros and Cons
In the ever-evolving landscape of cybersecurity, the traditional password-based authentication method is increasingly being scrutinized...
Saleem Yousaf
Mar 31, 20242 min read
10
0
Securing your digital footprint - A guide to Attack Surface Management (ASM)
In the earlier days of cyber security, implementing controls could be done with a perimeter approach. A well-architected network with a...
Saleem Yousaf
May 6, 20233 min read
11
0
The value of Phishing simulations in security awareness
Phishing is a threat as old as the internet itself, and it seems incredible that we are still talking about it in 2023. Unfortunately,...
Saleem Yousaf
May 6, 20233 min read
10
0
bottom of page