Quantcast
Channel: MELIH ABDULHAYOGLU – Internet Security and Trust

Antivirus Problems: Does Your Antivirus Software Give Full Protection?

$
0
0

One of the first things the average person thinks about when a topic like cybersecurity comes up are anti-virus programs. And usually, their thoughts will default to some of the more widely known and used versions. “Just download (and pay for) this program”, so the popular wisdom goes, “and you’ll be safe from viruses and … Continue reading Antivirus Problems: Does Your Antivirus Software Give Full Protection?

The post Antivirus Problems: Does Your Antivirus Software Give Full Protection? appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.


Home Automation

Fake News – Oh dear! We have to think now!

$
0
0

As human beings, how do we determine if information given to us is good or not? We as the human race “Trust” or “Not Trust” the messenger (channel) of the information. Its more efficient and easier to trust the messenger than analyzing the content. Human brain does not (in the main) analyze the content to … Continue reading Fake News – Oh dear! We have to think now!

The post Fake News – Oh dear! We have to think now! appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

Endpoint Protection, Endpoint Telemetry….explained

$
0
0

  EndPoint Protection: (AV, NGAV, EPP etc) Is like your doors, windows, gates that protect your property. It stops unwanted people from coming into your home. What to look for in Endpoint Protection: There are two main types of methods Detection based: These kind of systems have to be able to “identify” bad behaviour to … Continue reading Endpoint Protection, Endpoint Telemetry….explained

The post Endpoint Protection, Endpoint Telemetry….explained appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

How to continually improve – Structured approach to Deming Cycle

$
0
0

As a tech incubator and a CEO one of the most important tasks I have is to train, educate and arm people with the ability to continually improve their tasks. How do I teach this to them? Is there a structure, process or formula for this? Over the years, I had to create one. Here … Continue reading How to continually improve – Structured approach to Deming Cycle

The post How to continually improve – Structured approach to Deming Cycle appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

Software Code vs Business Process – No Difference!

$
0
0

A Software is made up of instruction set, that we call a piece of “Code”. A programmer writes this code and once compiled and packaged becomes,  Software/Application.   When you launch this Application/Software, the code is sent to CPU for those instructions to execute. For example this piece of Code could be instructing the CPU … Continue reading Software Code vs Business Process – No Difference!

The post Software Code vs Business Process – No Difference! appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

Guilty Until Proven Innocent – New Standard in Cybersecurity posture

$
0
0

Its 10pm night time…..someone knocks on your door…you answer the door….a total stranger……you invite this stranger in…….ask him to sit on your sofa……he is sitting there……it now has been 24 hours….this stranger is still sitting on your sofa… Can you say he is a good guy? Of course not! Absence of bad behavior does NOT … Continue reading Guilty Until Proven Innocent – New Standard in Cybersecurity posture

The post Guilty Until Proven Innocent – New Standard in Cybersecurity posture appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

Three CyberSecurity Postures – But only one is practical!

$
0
0

There are, in the main, two security postures in Cyber Security: 1-Allow ALL, deny BAD 2-Allow Good, deny REST   Today the vast majority of cybersecurity world works with: (1) Allow ALL, deny BAD They try to Deny BAD by trying to detect it by using AI,ML, Heuristic, Behavior Analysis, EDR.  I must say, the … Continue reading Three CyberSecurity Postures – But only one is practical!

The post Three CyberSecurity Postures – But only one is practical! appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.


What is Malware/Ransomware & What is Malware/Ransomware Problem?

$
0
0

What is Malware/Ransomware? Malware/Ransomware is a legitimate code (within context of the CPU instructions) doing illegitimate things. So Code is legit because CPU understands and executes the code/instructions in this executable file that we call malware/ransomware. However what this code/instructions do is bad stuff for us… What is Malware/Ransomware Problem? You executing/running this malware/ransomware! If … Continue reading What is Malware/Ransomware & What is Malware/Ransomware Problem?

The post What is Malware/Ransomware & What is Malware/Ransomware Problem? appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

3 Steps to Software Development





Latest Images