2024 - wrapped up

2024 - wrapped up

This is what I have produced for everyone's consumption this year.

There is a bet below at the next section.

Is Cybersecurity supposed to be expensive - https://www.dhirubhai.net/pulse/cybersecurity-supposed-expensive-ts-dr-suresh-zsacc

Handling Passwords - 2024 and beyond - https://www.dhirubhai.net/pulse/handling-passwords-2024-beyond-nist-approach-ts-dr-suresh-1av5c

Addendum 1 - Lebanon Pager Attack - https://www.dhirubhai.net/pulse/addendum-1-lebanon-attack-case-study-ts-dr-suresh-i4tyc/

Case Study - Lebanon Pager Attack - https://www.dhirubhai.net/pulse/case-study-lebanon-pager-attack-ts-dr-suresh-qcdzc/

Malaysian Internet - Issue of DNS blocking - https://www.dhirubhai.net/pulse/malaysian-internet-issue-dns-blocking-ts-dr-suresh-ic4oe/

Managing Professional Relationships - Bank Balance Approach - https://www.dhirubhai.net/pulse/managing-professional-relationships-bank-balance-ts-dr-suresh-nolyc/

Human Relationships - Part 1 - https://www.dhirubhai.net/pulse/human-relationships-part-1-ramasamy-cissp-cism-gcti-gnfa-gcda-cipm-gicic/

Adopting Zero Trust Architectures - Building A Security Fortress in Today’s Digital Landscape - https://www.dhirubhai.net/pulse/adopting-zero-trust-architectures-building-security-ts-dr-suresh-1ow6c/

APT - Detection and Response Strategies - https://www.dhirubhai.net/pulse/advanced-persistent-threat-detection-response-ts-dr-suresh-vqafc/

Cybersecurity as a Business Enabler - Beyond Risk Management - https://www.dhirubhai.net/pulse/cybersecurity-business-enabler-beyond-risk-management-ts-dr-suresh-e4fvc

Balancing Cost and Safety for Cybersecurity - https://www.dhirubhai.net/pulse/balancing-cost-safety-cybersecurity-ts-dr-suresh-cf00c/

Unveiling Blockchain Security - Myths, Realities and Future Applications - https://www.dhirubhai.net/pulse/unveiling-blockchain-security-myths-realities-future-ts-dr-suresh-eas8c/

Understanding the Global Cybersecurity Regulations and Compliance Landscape - https://www.dhirubhai.net/pulse/understanding-global-cybersecurity-regulations-ts-dr-suresh-sj00c

Navigating Recent Challenges with Ivanti Pulse Secure - https://www.dhirubhai.net/pulse/navigating-recent-challenges-ivanti-pulse-secure-deep-ts-dr-suresh-tkv0c

Exploits Development and Vulnerability Research - https://www.dhirubhai.net/pulse/exploit-development-vulnerability-research-ethics-ts-dr-suresh-vhunc

Cybersecurity Metrics and KPI - https://www.dhirubhai.net/pulse/cybersecurity-metrics-kpis-effective-management-ts-dr-suresh-fl53c

The Day the network cracked - A Red Teamer’s Tale of Tactics and Triumph? - https://www.dhirubhai.net/pulse/day-network-cracked-red-teamers-tale-tactics-triumph-ts-dr-suresh-rjpac

The Merger and Acquisition Tightrope Walk - Why Cybersecurity is your invisible safety net - https://www.dhirubhai.net/pulse/mergers-acquisitions-tightrope-walk-why-cybersecurity-ts-dr-suresh-s1ysc

The bet

This section is purely based on a kopitiam talk with a few good friends. We were talking about LinkedIn and I was talking about writing articles. This argument came about.

Would people actually appreciate the articles?

So, the bet was, if I were to put out means for people, as part of the year end Christmas, seasons of giving and all that, I would (or would not) even make enough to afford a glass of teh tarik (around RM2.50/USD0.55 where I am from). Got this idea from "buymeacoffee" - well if i get some funding I might speak to Paynet and ask them access to API to build something simiple.

Please remember there is no compulsion. Its entirely up to you. In name of transparency, all donors will be featured in a special tribute in February 2025. However, if you choose to remain anonymous, please specify "NOMENTION" on the transaction description.

So, if you have found my work to be useful to you, feel free to contribute (amount of your choice) , the DuitNow QR code is down there. This post will be open until Jan 7, 2025.

That said, I was also told, and asked to tell, that if you feel more generous, you can always contribute more. One lad, proposed single malt teh o' (IYKYK). For international folks who has no access to Malaysian payment infrastructure, I created a simple Amazon Wishlist, available here (or drop me a note if you want to send cash, i'll find a way for you) - https://www.amazon.com/hz/wishlist/ls/3V7L35EJCK2SG?ref_=wl_share (in full disclosure, I haven't actually had time to build up the wishlist).



Suraj Narayanan Kutty

Country Managing Director EDOTCO Philippines

2 个月

Good insights as usual. I enjoyed the pager attack article

回复
Kumaran Perianan

Group Information Technology Manager @ Silverlake Axis | Head of IT for Silverlake Axis Group

2 个月

Thank you Ts. Dr. Suresh Ramasamy CISSP,CISM,GCTI,GNFA,GCDA,CIPM,for the insightful write-ups! They are truly a joy to read, and I’ve gained a wealth of knowledge from them!

回复
Raj Kanthan

| CISSP | CISM | Manager of IT Security & Compliance - British Telecom

2 个月

Thank you for your valuable contribution to the cybersecurity community! Your insights and expertise are greatly appreciated Dr

回复

要查看或添加评论,请登录

Ts. Dr. Suresh Ramasamy CISSP,CISM,GCTI,GNFA,GCDA,CIPM的更多文章

  • Is digitalisation lost?

    Is digitalisation lost?

    Whether you're at a CxO seminar or speaking to CIO/CTO/CDO, you'll find digitalization being a key focus, in fact KPI…

  • Holidays and BYOE

    Holidays and BYOE

    This was an article I wanted to write last year while on vacation, but unfortunately got delayed and I forgot about it!…

  • Is CyberSecurity supposed to be expensive?

    Is CyberSecurity supposed to be expensive?

    Credits – This article is the result of an adhoc discussion between Vinod Ramachandran , Sivanathan Subramaniam and…

    1 条评论
  • Handling passwords in 2024 and beyond - NIST approach

    Handling passwords in 2024 and beyond - NIST approach

    Note: I previously wrote about passwords and how some changes in the industry had occured here -…

  • Addendum 1 - Lebanon Attack Case Study

    Addendum 1 - Lebanon Attack Case Study

    NOTE: This article is a continuation of Case Study on the Lebanon Pager Attack Today, I decided to continue on the case…

  • Case Study - Lebanon Pager attack

    Case Study - Lebanon Pager attack

    Trigger Warning: Explosive and Casualties Shocking news came out of Lebanon on reports of people experiencing explosion…

    7 条评论
  • Malaysian Internet - Issue of DNS Blocking

    Malaysian Internet - Issue of DNS Blocking

    Note; The author (me) was the person (for the longest time, since the beginning of DNS blocking in Malaysia) was the…

    9 条评论
  • Managing Professional Relationships - Bank Balance Approach

    Managing Professional Relationships - Bank Balance Approach

    In the previous article, we looked at how relationships can be categorised, taking clue from nature. in this article…

  • Human Relationships - Part 1

    Human Relationships - Part 1

    This set of article is a break from my usual cyber security based contents. I decided to write on this topic, observing…

  • Adopting Zero Trust Architectures: Building a Security Fortress in Today's Digital Landscape

    Adopting Zero Trust Architectures: Building a Security Fortress in Today's Digital Landscape

    In the ever-evolving realm of cybersecurity, traditional perimeter-based security models are increasingly proving…

社区洞察

其他会员也浏览了