Author: Usama Amin

Usama Amin is a Security blogger focusing on Cyber Security, Cloud Security, and IoT. He has worked as SR. Security Consultant for more than 10 years for industry-leading IT companies. Usama's experience also includes working as a legal expert witness for Cyber management. He writes about industry technology trends and best practices. He incorporates his views and his many years of experience to provide unique technology advice for people that manage and support Cyber solutions.

Since at least 2017, the number of ransomware attacks against industrial companies and Operators of Vital Importance (OVI) has increased significantly. WannaCry, LockerGoga, MegaCortex, Ryuk, Maze, and SNAKEHOSE (also known as Snake / Ekans): these ransomware names are only too well known and have cost victims from many sectors millions in ransoms and collateral damage. These incidents have also greatly disrupted and slowed down the physical processes that allow these companies to produce and deliver goods and services. Much has been said about the victims and the immediate consequences of ransomware campaigns launched against manufacturers. But the public debate misses…

Read More

Internet security is a generic term to describe the multitude of tactics used to protect a consumer and safeguard their activities and transactions over the Internet. What do you need to know about Internet Security? When you browse the Internet, you are exposed to all cyber threats. Gone are the days when attackers only targeted businesses and corporations. As an individual home user, you are equally vulnerable to attack. And if your kids use your computer to play or work, you’re just “upping the ante.” Cybercriminals can outwit even the best of us, and kids don’t stand a chance against…

Read More

The management of privileged accounts (PAM) is an increasingly important issue within companies. But why is it so important? Privileged Access Management: DEFINITION Privileged Access Management (PAM) solutions are solutions aimed at managing and protecting user accounts with high privileges (internal administrators and service providers) and managing administrative access to IS equipment. Privileged access thus makes it possible to modify the configurations of a system, create and delete user accounts, or access certain sensitive data. Privileged access must be controlled and supervised, because of its importance. What is the difference between user accounts and privileged accounts? There are two main categories of IT accounts: User accounts –  A…

Read More

A whaling attack refers to a spear phishing attack in which cybercriminals pose as C-suite executives or other business leaders. The attack involves a sophisticated phishing email and can have severe consequences for victims and their organizations. How does a whaling-type attack work? Whaling attacks involve the use of phishing emails. However, these emails tend to be more advanced than standard phishing messages. This is since whaling emails typically: They contain personalized information. Whaling type emails usually include information about the recipient and the organization of it. They seem urgent. A whaling email may include terms and phrases that indicate…

Read More