top of page
The Big Cyber Blog
Search
Securing your digital footprint - A guide to Attack Surface Management (ASM)
In the earlier days of cyber security, implementing controls could be done with a perimeter approach. A well-architected network with a...
Saleem Yousaf
May 6, 20233 min read
The value of Phishing simulations in security awareness
Phishing is a threat as old as the internet itself, and it seems incredible that we are still talking about it in 2023. Unfortunately,...
Saleem Yousaf
May 6, 20233 min read
How to protect against supply chain attacks
Cybercriminals are a clever bunch when it comes to attacking their targets. Previously it used to be easy to target a particular company...
Saleem Yousaf
Jan 29, 20233 min read


How to solve the Ransomware problem
In 2023 it is safe to say that cybercrime has evolved from a mere nuisance to a global threat of monumental proportions. To prove this is...
Saleem Yousaf
Jan 29, 20233 min read


How to protect against Cryptojacking
The cryptocurrency craze has been going on for many years now, and for a good reason. The attraction of cryptocurrency for users lies in...
Saleem Yousaf
Jan 29, 20233 min read
Purple teams and how they supercharge your security testing
A few decades back, penetration testing was considered a highly effective control that CISOs would swear by. It sounded simple enough:...
Saleem Yousaf
Dec 22, 20223 min read
How Cloud HSMs take away the complexity of key management
Key management is no one’s idea of a fun time. If you are not familiar with the term, then this involves the secure handling of...
Saleem Yousaf
Dec 22, 20223 min read
Penetration Testing is dead .. Long live Breach and Attack Simulation
Stop if you have heard this before A CISO budgets for a penetration test for their company covering all the key assets that a...
Saleem Yousaf
Dec 16, 20223 min read
bottom of page
