Posts From Shah Sheikh

Studying and planning safeguards for essential services in the MENA region.

Here’s what systems administrators and others in IT will love (and hate) about Microsoft’s Windows 10 patch and upgrade strategy. “Windows 10 isn’t for all of us, but for each of us.” That’s the tagline Microsoft is using to convey

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn’t prevent hacking but it reduces the likelihood that the hacker will be able

On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process against pedo’s on Tor. The suspects are accused in

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal Farm APT. Security experts at ESET have analyzed Dino, a sophisticated platform used by the Animal Farm ATP group. Earlier

New Ponemon Report reveals just how hot healthcare data is for hackers. Cybercriminals and nation-state actors are indeed targeting healthcare organizations for their valuable data: cyberattacks and physical criminal activity now have officially surpassed insider negligence as the main cause

Breaking the enigma of InfoSec into smaller bites is a proven method for building up an organization’s security capabilities. Here are six steps to get you started. After many years as a niche profession, security has recently emerged as a

After the 2014 conference that drew record attendance, the conference is back for its 6th iteration.