Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Nihad A. Hassan

Latest blogs

Topic : Nihad A. Hassan
  • --Any--

AI as an insider threat: threat points and mitigation strategies

Explore the different security risks associated with using AI technologies in a business context and the various mitigation strategies that…

Integrating threat intelligence into SOC operations

Explore the different benefits acquired from integrating threat data into SOC operations.

Understanding cyber threat hunting methodologies

Explore methodologies to help uncover stealthy attackers like advanced persistent threats (APTs) that bypass traditional security defenses…

OSINT in crises: how real-time intelligence saves lives

Explore how OSINT is used during crises — whether fires, earthquakes, hurricanes, volcanic eruptions or geopolitical tensions — and list…

The future of SOC: trends and innovations

Explore the emerging trends and innovations reshaping the future of Security Operations Centers, as they evolve to counter modern cyber…

OSINT for proactive risk management: a guide for employee and event safety

Learn how organizations can leverage OSINT to detect early warning signs of both physical and cyber threats, enhancing employee and event…

OSINT for law enforcement and crime prevention

As cybercrime costs continue to soar, law enforcement agencies are increasingly turning to OSINT to proactively detect threats, investigate…

Understanding Telegram for OSINT research

Learn to extract data from the worldwide popular messaging app Telegram, a must-have social media intelligence (SOCMINT) platform.

Unlocking adversary cyber infrastructure with OSINT techniques

As phishing attacks gain steam and become more sophisticated, learn the simple open-source toolkits available to investigate adversary…

Blog updates

Stay updated with the latest posts from the blog
Close
Close