Author: Usama Amin

Usama Amin is a Security blogger focusing on Cyber Security, Cloud Security, and IoT. He has worked as SR. Security Consultant for more than 10 years for industry-leading IT companies. Usama's experience also includes working as a legal expert witness for Cyber management. He writes about industry technology trends and best practices. He incorporates his views and his many years of experience to provide unique technology advice for people that manage and support Cyber solutions.

The management of privileged accounts (PAM) is an increasingly important issue within companies. But why is it so important? Privileged Access Management: DEFINITION Privileged Access Management (PAM) solutions are solutions aimed at managing and protecting user accounts with high privileges (internal administrators and service providers) and managing administrative access to IS equipment. Privileged access thus makes it possible to modify the configurations of a system, create and delete user accounts, or access certain sensitive data. Privileged access must be controlled and supervised, because of its importance. What is the difference between user accounts and privileged accounts? There are two main categories of IT accounts: User accounts –  A…

Read More

A whaling attack refers to a spear phishing attack in which cybercriminals pose as C-suite executives or other business leaders. The attack involves a sophisticated phishing email and can have severe consequences for victims and their organizations. How does a whaling-type attack work? Whaling attacks involve the use of phishing emails. However, these emails tend to be more advanced than standard phishing messages. This is since whaling emails typically: They contain personalized information. Whaling type emails usually include information about the recipient and the organization of it. They seem urgent. A whaling email may include terms and phrases that indicate…

Read More