About Rafeeq Rehman
Consultant, Author, Researcher.
Whether it is opening a firewall port, relaxing a permission on an S3 bucket, or mailing a confidential document to a private email address, people often try to circumvent information security controls with a “good intention of getting things done”. … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
Six fundamental models that always fill my personal and professional life with joy, pleasure and satisfaction Do the right thing, always – This is my first model of a joyful life, explained to me by a school senior friend. If … Continue reading →
Like this:
Like Loading...
While many people and organizations have been praised for their philanthropic work and poverty alleviation, the open source movement does not get the credit it deserves. I would argue that no other work comes even close to what the open … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
There are many reasons that make Secure Access Service Edge (SASE) an appealing concept. Major among these are moving from corporate data centers to the Cloud, need to work from anywhere, reducing complexity, and use of applications delivered as SaaS. … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
NOTE: A new version of CISO MindMap (2022) is available at this URL. Most people outside the Cybersecurity profession don’t fully realize and appreciate the complexity of security professionals’ job. I have been publishing and updating this MindMap for almost … Continue reading →
Like this:
Like Loading...
What is it? Secure Access Service Edge or SASE is a relatively new concept. The goal is to connect users from anywhere to applications, data and services hosted in any place (Cloud, corporate data centers or Software-as-a-Service platforms). The basic … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
There is a lot going on with Cloud computing, containers and micro services. Following is a summary of what information security professionals need to know about one very important idea: the Service Mesh. What is it? Service Mesh controls, monitors, … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
The PDF version of my latest book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is now available for download. You can share this link, print it, and use it … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
There are few things that every architect should do but most forget. As you know, there is no shortage of technology architecture frameworks and standards. You may have come across TOGAF for enterprise architecture and SABSA (Sherwood Applied Business Security … Continue reading →
Like this:
Like Loading...
My latest book “Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is published and available on amazon.com worldwide. This is a relatively short book with 11 chapters, three sections and about … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...