Mohamed Mowafy3 min360° Visibility over your attack surface - How Vulnerability Managers fortify your security posture.Vulnerability management solutions are a go to for organizations with a large attack surface and threat landscape.
Mohamed Mowafy5 min6 parameters to help you choose adequate backup … Mowafy discusses the types of backup, backup destinations and the main aspects to look for when choosing a backup solution for your needs.
Ahmed Elhaddad2 minSonicWall Capture ATP: 223 Days, 9,071 test runs, 4,251 malicious samples and ZERO false positives! SonicWall's Capture ATP is leading the ICSA Labs test scores for the six quarters straight. Patented RTDMI technology leverages AI and...
Ahmed Elhaddad4 minUncompromising SIEM – 10 features to upscale your cybersecurity's detection and response.If you work(ed) in cybersecurity, especially for a data-heavy or a digital product-led organization, you know how your security devices’...
Maysa Elawamry2 minHow SSDF can guide DevSecOps in a security-first mobile and web application developmentThis brief post discusses common code level security frameworks that are adopted by application developers, which are guided by NIST's SSDF
Ahmed Elhaddad5 minOWASP Top 10 Application security risks 2021A listing of OWASP top 10 security risks for web applications. An explanation of what CWE is and how it helped in consolidating 2021's list
Mohamed Mowafy2 minApp developer? Here are 5 basic code level security practices that you need to consider immediately!Mohamed Mowafy shares his input on how to start your software development lifecycle securely with 5 basic measures