Reducing The Cyber Impact By Thinking Smart

Rule #1 Breaking to Attack Flow!

Rule #2 Simulating Active Defense Capabilities

Why do I need it?

Habits, Controls, and Uncertainty

Transitioning to Cyber-resilience

--

--

--

Security Researcher and Thinker, Wing Tsun/Escrima Sihing. I'm @ozanpasa on twitter.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Email Scam: Extortion / Blackmail (Uses YOUR Password in Header)

Privacy Matters — Why You Should Care

How To Block / Blacklist a Number on BLU Grand XL LTE

How To Block / Blacklist a Number on BLU Grand XL LTE

QA and Cybersecurity

Agile methodology variant for security testing

What to Do When Outlook Inbox Repair Tool(scanpst.exe) Fails to Repair PST Files

What to Do When Outlook Inbox Repair Tool(scanpst.exe) Fails to Repair PST Files

Burn Process — SERGS

Hackers were able to exploit macOS zero-day to compromise Hong Kong Users.

{UPDATE} Split Balls 3D Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ozan Ozkara

Ozan Ozkara

Security Researcher and Thinker, Wing Tsun/Escrima Sihing. I'm @ozanpasa on twitter.

More from Medium

Cowrie Honeypot Threat Analysis: Two Cryptocurrency Mining Approaches

REsurfaced: REvil is back

Security Blue Team’s BTL1 Certification

Know more about SOAR platform in cybersecurity: (Orchestration, Automation and Response)

Soar Platform, Security Orchestration and automation