top of page
The Big Cyber Blog
Search
Securing your digital footprint - A guide to Attack Surface Management (ASM)
In the earlier days of cyber security, implementing controls could be done with a perimeter approach. A well-architected network with a...
Saleem Yousaf
May 6, 20233 min read
11 views
0 comments
The value of Phishing simulations in security awareness
Phishing is a threat as old as the internet itself, and it seems incredible that we are still talking about it in 2023. Unfortunately,...
Saleem Yousaf
May 6, 20233 min read
10 views
0 comments
How to protect against supply chain attacks
Cybercriminals are a clever bunch when it comes to attacking their targets. Previously it used to be easy to target a particular company...
Saleem Yousaf
Jan 29, 20233 min read
5 views
0 comments


How to solve the Ransomware problem
In 2023 it is safe to say that cybercrime has evolved from a mere nuisance to a global threat of monumental proportions. To prove this is...
Saleem Yousaf
Jan 29, 20233 min read
3 views
0 comments


How to protect against Cryptojacking
The cryptocurrency craze has been going on for many years now, and for a good reason. The attraction of cryptocurrency for users lies in...
Saleem Yousaf
Jan 29, 20233 min read
3 views
0 comments
Purple teams and how they supercharge your security testing
A few decades back, penetration testing was considered a highly effective control that CISOs would swear by. It sounded simple enough:...
Saleem Yousaf
Dec 22, 20223 min read
10 views
0 comments
Penetration Testing is dead .. Long live Breach and Attack Simulation
Stop if you have heard this before A CISO budgets for a penetration test for their company covering all the key assets that a...
Saleem Yousaf
Dec 16, 20223 min read
14 views
0 comments
bottom of page