Maysa Elawamry5 minSocial Engineering Pt.2 - How security awareness for individual members protects organizations. In our previous episode of the security awareness series, we talked to you about 7 manipulative tactics that cybercriminals use to...
Maysa Elawamry5 minSocial Engineering from Phishing to Vishing: How a user innocently assists a cyber attacker – Part 1Social Engineering is a description of tactics used by cyberattackers with malicious intents to harm a device or organization. Here's how.
Mohamed Mowafy15 minThe 7 layers of cybersecurity- a comprehensive guide to ensure your protection up to the human layerBetween NIST, MITRE ATT&CK, and the likes. the 7-layer cybersec. map draws a comprehensive guide to cybersecurity that fits most use-cases.
Maysa Elawamry3 min5 reasons why MHE recommends Kaspersky Antivirus Software for resources-light businesses.Maysa reasons why Kaspersky's antivirus software makes sense for organizations with little to no spend on cybersecurity
Mohamed Mowafy3 min360° Visibility over your attack surface - How Vulnerability Managers fortify your security posture.Vulnerability management solutions are a go to for organizations with a large attack surface and threat landscape.
Ahmed Elhaddad5 minOWASP Top 10 Application security risks 2021A listing of OWASP top 10 security risks for web applications. An explanation of what CWE is and how it helped in consolidating 2021's list
Mohamed Mowafy2 minApp developer? Here are 5 basic code level security practices that you need to consider immediately!Mohamed Mowafy shares his input on how to start your software development lifecycle securely with 5 basic measures