Skip to content
FennSec
  • Home
  • @Tenable
  • @IriusRisk
  • HackTheBox
    • Travel – 10.10.10.189
    • Unbalanced – 10.10.10.200
    • Laser – 10.10.10.201
    • Worker – 10.10.10.203
    • Feline – 10.10.10.205
    • Compromised – 10.10.10.207
  • About

cybersecurity

  • Home
  • cybersecurity

Implementing security requirements: examples from the NIST 1800 series

Posted by By Lamine Aouad June 11, 2024Posted inCybersecurityNo Comments
I have recently developed a newfound appreciation for reading cybersecurity standards and guidelines. Their lack of practical examples and real-world scenarios, however, is a bit of a disappointment. There is…
Read More

The convergence of compliance and good security. Will it happen?

Posted by By Lamine Aouad March 9, 2022Posted inCybersecurityNo Comments
I am genuinely interested in how can compliance efforts translate into effective cyber security programs that actually result in improved postures. Most cyber security professionals consider standards and regulations only…
Read More

In cybersecurity, get the foundation right, the details will always be a moving target

Posted by By Lamine Aouad October 19, 2021Posted inCybersecurityNo Comments
I've always had an interest in humanities and social sciences, and how they affect other domain areas, through us, people. Science nowadays says that making mistakes is not only an…
Read More

Is machine learning really changing cybersecurity?

Posted by By Lamine Aouad August 26, 2020Posted inCybersecurityNo Comments
There is an interesting quote from George Box, a British statistician, who said: "All models are wrong, but some are useful". He was obviously spot on there, and it doesn't…
Read More

Why is cybersecurity broken?

Posted by By Lamine Aouad June 8, 2020Posted inCybersecurityNo Comments
I have worked in cybersecurity for about a decade now, both in academia and industry, and I started asking myself this question back in 2015. I was then at Symantec,…
Read More
Recent Posts
  • Implementing security requirements: examples from the NIST 1800 series
  • The masks fell off!
  • Banging on the door of freedom
  • How do you navigate the cyber framework landscape?
  • The Tip of the Iceberg
Copyright 2025 — FennSec. All rights reserved.
Scroll to Top