Skip to content
FennSec
  • Home
  • @Tenable
  • @IriusRisk
  • HackTheBox
    • Travel – 10.10.10.189
    • Unbalanced – 10.10.10.200
    • Laser – 10.10.10.201
    • Worker – 10.10.10.203
    • Feline – 10.10.10.205
    • Compromised – 10.10.10.207
  • About

‘Data-driven’ does not mean ‘reliable’ nor ‘objective’

Posted by By Lamine Aouad December 9, 2021Posted inData scienceNo Comments
It is absurd when people use "data-driven" and it sounds like they meant "reliable" or "this is it, we've figured it all out". In reality, we've been slowly waking up…
Read More

In cybersecurity, get the foundation right, the details will always be a moving target

Posted by By Lamine Aouad October 19, 2021Posted inCybersecurityNo Comments
I've always had an interest in humanities and social sciences, and how they affect other domain areas, through us, people. Science nowadays says that making mistakes is not only an…
Read More

Machine learning in offensive security

Posted by By Lamine Aouad September 4, 2021Posted inCybersecurity, Data scienceNo Comments
At Symantec, I worked on implementing machine learning techniques to strengthen defenses capabilities and enhance the ATP product with advanced detections and protections. It certainly has increased the cost and…
Read More

Wrong priorities, increased risk

Posted by By Lamine Aouad May 11, 2021Posted inCybersecurityNo Comments
Setting up priorities can be hard and challenging, and cybersecurity (like almost everything else in life) is a prioritization issue. Beyond treating cybersecurity as a business priority and setting up…
Read More

Beyond compliance – Good governance and frameworks can make a huge difference in solving the cyber risk puzzle

Posted by By Lamine Aouad April 8, 2021Posted inCybersecurityNo Comments
Compliance with regulations is part of doing business and probably merely seen as a way to avoid the legal, financial, or reputational damage that might result from non-compliance. While poor…
Read More

Cybersecurity – a supply chain issue

Posted by By Lamine Aouad January 13, 2021Posted inCybersecurityNo Comments
How on earth can you ensure your supply chain is secured? On average, a large enterprise uses up to 15 security vendors, according to 451Research. In reality, the supply chains…
Read More

The attack landscape is evolving – risk metrics and assessment aren’t

Posted by By Lamine Aouad November 25, 2020Posted inCybersecurityNo Comments
If you've read some of my previous posts, this might sound a bit familiar. This is part of a recurring theme about measuring security, which, let's face it, we don't…
Read More

Is cybersecurity doomed to playing catch-up to bad actors?

Posted by By Lamine Aouad November 2, 2020Posted inCybersecurityNo Comments
I was recently listening to a podcast that started with stories about hacking into poker players' machines and ended up with an interview with Mikko Hypponen of F-Secure about the…
Read More

The information overload is destined to result in bad security

Posted by By Lamine Aouad October 9, 2020Posted inCybersecurityNo Comments
I've always been interested in arguments from the field of psychology that study how we make decisions, react, and are affected by a number of aspects, including biases (which I've…
Read More

Is risk assessment any different from risk perception?

Posted by By Lamine Aouad September 3, 2020Posted inCybersecurityNo Comments
I had already mentioned our tendency of self-deception in a previous post. And I was recently reading an article where the Dunning-Kruger effect was mentioned and I thought, here is…
Read More

Posts pagination

Previous page 1 2 3 Next page
Recent Posts
  • Implementing security requirements: examples from the NIST 1800 series
  • The masks fell off!
  • Banging on the door of freedom
  • How do you navigate the cyber framework landscape?
  • The Tip of the Iceberg
Copyright 2025 — FennSec. All rights reserved.
Scroll to Top