Quantcast
Channel: MELIH ABDULHAYOGLU – Internet Security and Trust
Browsing latest articles
Browse All 40 View Live

Antivirus Problems: Does Your Antivirus Software Give Full Protection?

One of the first things the average person thinks about when a topic like cybersecurity comes up are anti-virus programs. And usually, their thoughts will default to some of the more widely known and...

View Article



Home Automation

You’ve probably encountered some form of home automation already, whether it’s a “hub” like Amazon’s Alexa or just a smart thermostat. But what exactly is home automation? What does it do? And why...

View Article

Fake News – Oh dear! We have to think now!

As human beings, how do we determine if information given to us is good or not? We as the human race “Trust” or “Not Trust” the messenger (channel) of the information. Its more efficient and easier to...

View Article

Endpoint Protection, Endpoint Telemetry….explained

  EndPoint Protection: (AV, NGAV, EPP etc) Is like your doors, windows, gates that protect your property. It stops unwanted people from coming into your home. What to look for in Endpoint Protection:...

View Article

How to continually improve – Structured approach to Deming Cycle

As a tech incubator and a CEO one of the most important tasks I have is to train, educate and arm people with the ability to continually improve their tasks. How do I teach this to them? Is there a...

View Article


Software Code vs Business Process – No Difference!

A Software is made up of instruction set, that we call a piece of “Code”. A programmer writes this code and once compiled and packaged becomes,  Software/Application.   When you launch this...

View Article

Guilty Until Proven Innocent – New Standard in Cybersecurity posture

Its 10pm night time…..someone knocks on your door…you answer the door….a total stranger……you invite this stranger in…….ask him to sit on your sofa……he is sitting there……it now has been 24 hours….this...

View Article

Three CyberSecurity Postures – But only one is practical!

There are, in the main, two security postures in Cyber Security: 1-Allow ALL, deny BAD 2-Allow Good, deny REST   Today the vast majority of cybersecurity world works with: (1) Allow ALL, deny BAD They...

View Article


What is Malware/Ransomware & What is Malware/Ransomware Problem?

What is Malware/Ransomware? Malware/Ransomware is a legitimate code (within context of the CPU instructions) doing illegitimate things. So Code is legit because CPU understands and executes the...

View Article


3 Steps to Software Development

The post 3 Steps to Software Development appeared first on MELIH ABDULHAYOGLU - Internet Security and Trust.

View Article
Browsing latest articles
Browse All 40 View Live




Latest Images