Mekin Pesen

6 Followers | 1 Following

Follow

Mekin Pesen

35 days ago

The Lawless Realm

foreignaffairs.com

Mekin Pesen

56 days ago

Complexity In Capital: Demystifying The Hype In Cybersecurity

forbes.com

Mekin Pesen

60 days ago

SpaceX’s Starlink satellites could make US Army navigation hard to jam

technologyreview.com

Mekin Pesen

97 days ago

A world divided into “cans” and “cannots”

technologyreview.com

Mekin Pesen

116 days ago

The quest for quantum-proof encryption just made a leap forward

technologyreview.com

Mekin Pesen

158 days ago

Web skimming with Google Analytics

securelist.com

Mekin Pesen

163 days ago

Microsoft security architecture recommendations

docs.microsoft.com

Mekin Pesen

163 days ago

Extracting credentials from a remote Windows system

deloitte.com

Mekin Pesen

163 days ago

How Zero Trust Will Change Your Security Design Approach

securityintelligence.com

Mekin Pesen

163 days ago

Mobile Security Framework (MobSF)

github.com

Mekin Pesen

166 days ago

Creating Active Directory Labs for Blue and Red Teams

sec-consult.com

Mekin Pesen

166 days ago

Running dodgy programs safely with Windows Sandbox

scotthelme.co.uk

Mekin Pesen

191 days ago

A perfect laconism for tackling security...

Success in security: reining in entropy

microsoft.com

Mekin Pesen

225 days ago

Worst Recession in 150 Years

dailyreckoning.com

Mekin Pesen

229 days ago

Threat Mapper - Powerful vulnerability scanner for Kubernetes and more

reddit.com

Mekin Pesen

234 days ago

An Interview with Bruce Schneier, Renowned Security Technologist

thepolitic.org

Mekin Pesen

257 days ago

How Living Abroad Helps You Develop a Clearer Sense of Self

hbr.org

Mekin Pesen

257 days ago

200 universities just launched 600 free online courses. Here’s the full list.

qz.com

Mekin Pesen

257 days ago

Windows Server Hardening with PowerShell DSC

blog.nviso.eu

Mekin Pesen

257 days ago

Kerberosity Killed the Domain: An Offensive Kerberos Overview

posts.specterops.io

Mekin Pesen

344 days ago

Microservice Architecture at Medium

medium.engineering

Mekin Pesen

349 days ago

Elliptic curve cryptography in TLS 1.3

habr.com

Mekin Pesen

349 days ago

CIA History and Birth of Modern American Information Warfare

flyingpenguin.com

Mekin Pesen

349 days ago

The Githubification of InfoSec

medium.com

Mekin Pesen

372 days ago

3 techniques to defend your Machine Learning models against Adversarial attacks

blog.nviso.be

Mekin Pesen

378 days ago

Ghost ships, crop circles, and soft gold: A GPS mystery in Shanghai

technologyreview.com

Mekin Pesen

378 days ago

Security Engineering — The Book

cl.cam.ac.uk

Mekin Pesen

381 days ago

Chief Information Security Officer (CISO) Workshop Training

docs.microsoft.com

Mekin Pesen

386 days ago

Inside the Microsoft team tracking the world’s most dangerous hackers

technologyreview.com

Mekin Pesen

387 days ago

Getting Started with Microsoft Identity

docs.microsoft.com

Mekin Pesen

387 days ago

The Mathematics of (Hacking) Passwords

scientificamerican.com

Mekin Pesen

390 days ago

Cache Poisoned Denial of Service (CPDoS) Attacks Used Against Content Delivery Networks

cpdos.org

Mekin Pesen

396 days ago

Cybersovereignty

bloomberg.com

Mekin Pesen

401 days ago

'No such thing' as cyber warfare: Australia's head of cyber warfare

zdnet.com

Mekin Pesen

409 days ago

Planting tiny spy chips in hardware can cost as little as $200

arstechnica.com

Mekin Pesen

417 days ago

DNS-over-HTTPS causes more problems than it solves, experts say

zdnet.com

Mekin Pesen

421 days ago

I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution.

nytimes.com

Mekin Pesen

424 days ago

Cryptographic Attacks: A Guide for the Perplexed

research.checkpoint.com

Mekin Pesen

426 days ago

Implementing a blockchain from scratch: why, how, and what we learned

jis-eurasipjournals.springeropen.com

Mekin Pesen

426 days ago

Fileless threats

docs.microsoft.com

Mekin Pesen

428 days ago

How to crack billions of passwords?

medium.com

Mekin Pesen

428 days ago

Assess your data potential with ATT&CK Datamap

medium.com

Mekin Pesen

428 days ago

Exfiltration Methods

docs.google.com

Mekin Pesen

428 days ago

Statistical Analysis and Anonymity of TOR's Path Selection

eprint.iacr.org

Mekin Pesen

428 days ago

Windows 10 security configuration framework

Introducing the security configuration framework

docs.microsoft.com

Mekin Pesen

428 days ago

It's very ambitious. I am skeptical about this.

How the EverCrypt Library Creates Hacker-Proof Cryptography

quantamagazine.org

Mekin Pesen

428 days ago

I am skeptical about this.

How the EverCrypt Library Creates Hacker-Proof Cryptography

quantamagazine.org

Mekin Pesen

428 days ago

EverCrypt cryptographic provider offers developers greater security assurances

Microsoft Research Blog

microsoft.com

Mekin Pesen

428 days ago

nvlpubs.nist.gov

Mekin Pesen

428 days ago

A Top 10 Reading List if You’re Getting Started in Cyber Threat Intelligence

medium.com

Like this set of items on Pocket? Share with friends.