All posts by Melih


| Posted by , under Uncategorized

In cybersecurity history, certain events redefine the industry’s trajectory. The impending expiration of CrowdStrike’s Extended Validation (EV) code signing certificate is one such moment, reminiscent of the Y2K crisis in its potential impact and urgency. As we approach this juncture, questions about the integrity and compliance of EV code signing guidelines

ai hype
| Posted by , under Uncategorized

Touting AI as our superhero against cyber threats? Really? Newsflash: The bad guys have AI too!

Sure, AI would be a magic wand if it was only accessible by cybersecurity vendors. But this is not the case!

So, let’s get real. AI isn’t the magic wand in cybersecurity. It’s

| Posted by , under Uncategorized

In the constantly evolving landscape of cybersecurity, traditional defense strategies have focused heavily on preventing malicious payloads from entering systems. This approach emphasizes the first four stages of the Cyber Kill Chain: Reconnaissance, Weaponization, Delivery, and Exploitation. While essential, this method often falls short because attackers continually find new ways to

| Posted by , under Uncategorized

Cybersecurity has come a long way since the early days of computing, yet the foundational philosophy behind many contemporary solutions has remained surprisingly static. This philosophy, rooted in a detection-based reactive approach, originated in the nascent era of computer viruses and has led to a significant paradox in modern cybersecurity strategies. The

paradigm shift
| Posted by , under Uncategorized

In my previous blogs, I’ve consistently emphasized the risks associated with the traditional security model, which necessitates constant, unvalidated updates to the kernel. This approach, not only ineffective in preventing breaches from what it can’t detect, can lead to catastrophic outcomes, such as the incident involving CrowdStrike. The need for a