Skip to content

Shaheen N Abdul Jabbar

Thoughts on Cyber Security

  • Home
  • About Me
  • Contact Me
  • LinkedIn
  • Terms of Use
    • Privacy Statement
    • Trademarks Notice
    • Copyright Notice

Critical Security Controls

What are the Critical Security Controls per US federal organizations? Important points and thoughts.

Published July 13, 2009
Categorized as Risk Management Tagged Architecture, Information Security, Privacy, Regulations

Vulnerability During City Strike

Toronto is on a strike. Dumpster diver may have access to public garbage dump sites.

Published July 12, 2009
Categorized as Between The Lines Tagged Credit Card, Identity Theft, Privacy

Vacation Time Phishing Time

June 2009 marks the highest rate of phishing attack to date. Why is this happening? What could we do? What is the trend?

Published July 11, 2009
Categorized as Between The Lines Tagged Malware, News

Paranoid on Facebook

Shaheen’s thoughts on using Facebook

Published July 10, 2009
Categorized as Between The Lines Tagged Identity Theft, News, Privacy

Protect Medical Records

Do we trust our medical history with our physicians and hospitals? Such information need to be encrypted or obfuscated.

Published July 9, 2009
Categorized as Risk Management Tagged Encryption, Identity Theft, Medical Records, Privacy, Regulations

Chrome OS, Cloud Computing and Privacy

Shaheen’s thoughts on upcoming Google Chrome OS; how does it relate to Cloud Computing and Privacy concerns.

Published July 8, 2009
Categorized as Applications & SDLC Tagged Cloud Computing, Information Security, Open Source, Operating System, Privacy

Open Source Software in Corporate world

Pros and cons of using opensource software in the corporate world.

Published June 8, 2009
Categorized as Applications & SDLC Tagged Architecture, Open Source, Software

MythBusters Beat Fingerprint Security System

See how the MythBusters beat fingerprint security system!

Published June 4, 2009
Categorized as Access Control Tagged Biometrics, Information Security, Physical Security, Video

IANA Port Numbers

Here is a list of IANA port number – http://www.iana.org/assignments/port-numbers

Published April 9, 2009
Categorized as Infrastructure Tagged Architecture, Connect With Me, IANA

.Net Security, Java Security and Webservers

Looking for a comparison of security between .Net and Java? Need to know if .Net application is supported in webservers other than IIS?

Published February 12, 2009
Categorized as Applications & SDLC Tagged .Net, Information Security, Java

Posts pagination

Newer posts Page 1 … Page 5 … Page 7 Older posts

Recent Posts

  • Security in Agile Methodology
  • Career in Cybersecurity
  • MX Records on Amazon Lightsail
  • Best of Breed or Best Suite of Products
  • Hardware or Host Based Firewalls

Recent Comments

  • mikk0j on Intrusion Prevention System To Detect BotNet
  • Haider on Face Recognition Systems For Facility Access
  • Derek Douville on Prevent Reverse SSH
  • Tony Pham on Authentication – Level of Assurance
  • Ramesh Nagappan on Authentication – Level of Assurance
Shaheen N Abdul Jabbar
Proudly powered by WordPress.