Finding the Cracks in the Wall – How Modern Scams Bypass MFA

In my previous blog, I discussed the important role multi-factor authentication (MFA) plays in further securing access to enterprise and consumer services. We also established the fact that although MFA increases authentication security and decreases t… Continue reading Finding the Cracks in the Wall – How Modern Scams Bypass MFA

When Destiny is Knocking on Your Door Again – Data Mining CDN Logs to Refine and Optimize Web Attack Detection

A few years ago, I wrote a blog post trying to explain, with humor, why choosing application security as a career path is destiny derived by my parents calling me “Or”, and why a personal name that is a conditional word can sometimes be challenging in … Continue reading When Destiny is Knocking on Your Door Again – Data Mining CDN Logs to Refine and Optimize Web Attack Detection

Posted in Uncategorized

Evaluating Our Core Principles

Reflecting on the past year led me to put together this post about how I believe this incredibly challenging year has had an irreversible effect on the way the workforce will collaborate, innovate, and do business in the future. In this blog, I will try to address what I believe are the core principles that can help us overcome these challenging times, put some balance and stability into our lives, and improve our organizations for the better. Continue reading Evaluating Our Core Principles