Mekin Pesen

6 Followers | 1 Following

Follow

Mekin Pesen

2 days ago

Chief Information Security Officer (CISO) Workshop Training

docs.microsoft.com

Mekin Pesen

7 days ago

Inside the Microsoft team tracking the world’s most dangerous hackers

technologyreview.com

Mekin Pesen

8 days ago

Getting Started with Microsoft Identity

docs.microsoft.com

Mekin Pesen

8 days ago

The Mathematics of (Hacking) Passwords

scientificamerican.com

Mekin Pesen

11 days ago

Cache Poisoned Denial of Service

cpdos.org

Mekin Pesen

17 days ago

Cybersovereignty

bloomberg.com

Mekin Pesen

22 days ago

'No such thing' as cyber warfare: Australia's head of cyber warfare

zdnet.com

Mekin Pesen

29 days ago

Planting tiny spy chips in hardware can cost as little as $200

arstechnica.com

Mekin Pesen

38 days ago

DNS-over-HTTPS causes more problems than it solves, experts say

zdnet.com

Mekin Pesen

42 days ago

I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution.

nytimes.com

Mekin Pesen

45 days ago

Cryptographic Attacks: A Guide for the Perplexed

research.checkpoint.com

Mekin Pesen

47 days ago

Implementing a blockchain from scratch: why, how, and what we learned

jis-eurasipjournals.springeropen.com

Mekin Pesen

47 days ago

Fileless threats

docs.microsoft.com

Mekin Pesen

49 days ago

How to crack billions of passwords?

medium.com

Mekin Pesen

49 days ago

Assess your data potential with ATT&CK Datamap

medium.com

Mekin Pesen

49 days ago

Exfiltration Methods

docs.google.com

Mekin Pesen

49 days ago

Statistical Analysis and Anonymity of TOR's Path Selection

eprint.iacr.org

Mekin Pesen

49 days ago

Windows 10 security configuration framework

Introducing the security configuration framework

docs.microsoft.com

Mekin Pesen

49 days ago

It's very ambitious. I am skeptical about this.

How the EverCrypt Library Creates Hacker-Proof Cryptography

quantamagazine.org

Mekin Pesen

49 days ago

I am skeptical about this.

How the EverCrypt Library Creates Hacker-Proof Cryptography

quantamagazine.org

Mekin Pesen

49 days ago

EverCrypt cryptographic provider offers developers greater security assurances

Microsoft Research Blog

microsoft.com

Mekin Pesen

49 days ago

nvlpubs.nist.gov

Mekin Pesen

49 days ago

A Top 10 Reading List if You’re Getting Started in Cyber Threat Intelligence

medium.com

Mekin Pesen

49 days ago

Blackhat SSLVPN - Infiltrating Corporate Intranet Like NSA

reddit.com

Mekin Pesen

49 days ago

How to Subvert Backdoored Encryption:Security Against Adversaries that Decrypt All Ciphertexts

eprint.iacr.org

Mekin Pesen

50 days ago

Facebook's role in Brexit -- and the threat to democracy

ted.com

Mekin Pesen

50 days ago

Google’s ‘Quantum Supremacy’ Isn’t the End of Encryption

wired.com

Mekin Pesen

74 days ago

The Middle East is already a cyberwar hotbed. Things just got worse.

technologyreview.com

Mekin Pesen

74 days ago

The WIRED Guide to Cyberwar

wired.com

Mekin Pesen

104 days ago

Apple, Google: We've stopped listening to your private Siri, Assistant chat, for now

zdnet.com

Mekin Pesen

109 days ago

The Improbable Rise of Huawei

foreignpolicy.com

Mekin Pesen

109 days ago

Open-Source Tool Lets Anyone Experiment With Cryptocurrency Blockchains

spectrum.ieee.org

Mekin Pesen

110 days ago

The PGP Problem

latacora.micro.blog

Mekin Pesen

110 days ago

Many Strategies Fail Because They’re Not Actually Strategies

hbr.org

Mekin Pesen

110 days ago

Take your positions: Is the dollar's "exorbitant privilege" coming to an end?

Is the dollar's "exorbitant privilege" coming to an end?

privatebank.jpmorgan.com

Mekin Pesen

122 days ago

Why algorithms are called algorithms

bbc.com

Mekin Pesen

141 days ago

Hacking Hardware Security Modules

schneier.com

Mekin Pesen

141 days ago

Helping organizations do more without collecting more data

security.googleblog.com

Mekin Pesen

141 days ago

Google Open-Sources Cryptographic Protocol

securityweek.com

Mekin Pesen

141 days ago

RDP Security Explained

securingtomorrow.mcafee.com

Mekin Pesen

156 days ago

The Clever Cryptography Behind Apple's 'Find My' Feature

wired.com

Mekin Pesen

156 days ago

Overlooked No More: Alan Turing, Condemned Code Breaker and Computer Visionary

nytimes.com

Mekin Pesen

173 days ago

Fully Homomorphic Encryption: Cryptography’s Holy Grail [PDF]

cs.virginia.edu

Mekin Pesen

173 days ago

Cloud Programming Simplified: A Berkeley View on Serverless Computing [PDF]

arxiv.org

Mekin Pesen

197 days ago

DNS based threat hunting and DoH (DNS over HTTPS)

blog.redteam.pl

Mekin Pesen

201 days ago

Encryption Pioneer Aims to End Our Data Dilemma With Cryptography’s Holy Grail

medium.com

Mekin Pesen

203 days ago

Cybersecurity: This free tool lets you test your hacker defences

zdnet.com

Mekin Pesen

210 days ago

The wave of domain hijackings besetting the Internet is worse than we thought

arstechnica.com

Mekin Pesen

262 days ago

Android Is Helping Kill Passwords on a Billion Devices

wired.com

Mekin Pesen

266 days ago

Standards for Information Security Professionals

blog.securityevaluators.com

Like this set of items on Pocket? Share with friends.