Skip to content
FennSec
  • Home
  • @Tenable
  • @IriusRisk
  • HackTheBox
    • Travel – 10.10.10.189
    • Unbalanced – 10.10.10.200
    • Laser – 10.10.10.201
    • Worker – 10.10.10.203
    • Feline – 10.10.10.205
    • Compromised – 10.10.10.207
  • About

cyber risk

  • Home
  • cyber risk

Wrong priorities, increased risk

Posted by By Lamine Aouad May 11, 2021Posted inCybersecurityNo Comments
Setting up priorities can be hard and challenging, and cybersecurity (like almost everything else in life) is a prioritization issue. Beyond treating cybersecurity as a business priority and setting up…
Read More

Is risk assessment any different from risk perception?

Posted by By Lamine Aouad September 3, 2020Posted inCybersecurityNo Comments
I had already mentioned our tendency of self-deception in a previous post. And I was recently reading an article where the Dunning-Kruger effect was mentioned and I thought, here is…
Read More
Recent Posts
  • Implementing security requirements: examples from the NIST 1800 series
  • The masks fell off!
  • Banging on the door of freedom
  • How do you navigate the cyber framework landscape?
  • The Tip of the Iceberg
Copyright 2025 — FennSec. All rights reserved.
Scroll to Top