Youssef ElmaltyPlace your bet, Security or Compliance?Many believes that security is binary game that will lead you to win or lose. Well, this is not true. You might want to refresh your…2 min read·Jan 22, 2021----
Youssef ElmaltyWhy do we keep getting hacked?“Why organizations keep getting hacked despite deploying state of the art technologies and hiring the best people?” — I always answer it…2 min read·Jan 12, 2021----
Youssef ElmaltyWhat is Cyber Stamina?A few months ago I delivered a keynote on “Threat Adaptation,” a topic that has been ignored by many organizations, and I thought it might…3 min read·Jan 12, 2021----
Youssef ElmaltyWhy Compliance does not equal security?Security is a journey; being compliant is just the beginning.2 min read·Jan 12, 2021----
Youssef ElmaltyBug Bounty Programs: Will Asian Companies Take the Leap?Bug bounty programs are crowdsourcing initiatives developed by organizations that invite the public to aggressively hunt for and report on…6 min read·Jan 11, 2021----
Youssef ElmaltyHow to specialize in cybersecurity?Starting your cybersecurity career and not sure which specialization is best for you? This article for you3 min read·Jan 10, 2021----
Youssef ElmaltyThe art of Hunting — Exposed!Oftentimes, people presume that cyber threat hunting is a process that is highly dependent on tooling. While tooling is an important…3 min read·Jan 10, 2021----