• Home
  • Biography
      • Back
      • Introduction
      • Education and Trainings
      • Certificates and Awards
      • Professional Experience
      • Managed Projects
      • Qualifications' Summary
      • About ME
  • Blogs
      • Back
      • خيال علمي
      • أحلام يقظه
  • Articles
      • Back
      • Cyber Security Articles
      • Business Articles
      • Technical Articles
      • Open Source Articles
      • Courses - Certificates
      • Global Articles
  • Photos
  • Travel
      • Back
      • Road Trips
      • Business Trips
      • Trips
  • Contact
  • Home
  • Articles
  • Cyber Security Articles
All Content is under CCC License, Read MORE

Cyber Security Articles

  • Articles
  • Cyber Security

This section includes all my articles' writings about Cyber Security starting from 1998 till present and where my key expertise technically, and commercially is.

I have done thousands of engagements technical wise and business wise when it comes to Cyber Security, that involved all stages of work like technical, presales, sales, business development, technology comparisons, deployments, project management and providing support as well, I also have thousands of text files that include everything I learnt. I usually write down all the stuff that I do, starting from a small tip, specific experience, fast study till my professional work experiences and learnings and I am sharing all that articles here, I hope that stuff be useful to other people instead of just locking them in my desk.

Your can contribute to this section and your contribution is highly welcomed and appreciated. Just pick a topic, write it in the preferred way, send it and let's share it under your name. Although all my writings in this section are in English but I am going to add Arabic content to enrich the Arabic content on the internet when it comes to Cyber Security, so no specific language for this section, you can write in العربية, English, Frankoarab or/and any MIX of them. simply write in the language you prefer and express your/my writings in the best way.

All content in this section published under Creative Commons License, the main categories in this section as the following, please click on category link below to list all articles in specific category or use the side/main menu to navigate as well.

Filters
List of articles in category Cyber Security Articles
Title Author Hits
ATT&CK MITRE Best Practices Written by Ashraf Abdelazim Hits: 3261
The SOC Visibility Triad Written by Ashraf Abdelazim Hits: 3400
NTA and NDR: What's the difference? how it works? Written by Ashraf Abdelazim Hits: 3981
AI, Machine Learning and Cognitive in CyberSecurity Written by Ashraf Abdelazim Hits: 3401
The SOAR Bedtime Story - Part 2 Written by Ashraf Abdelazim Hits: 3380
The Evolution of SOAR - The SOAR Bedtime Story Written by Ashraf Abdelazim Hits: 4178

Articles

  • Cyber Security Articles
  • Open Source Articles
  • Business Articles
  • Technical Articles
  • Courses - Certificates
  • Global Articles

Cyber Security Articles

The Evolution of SOAR - The SOAR Bedtime Story

The SOAR Bedtime Story - Part 2

AI, Machine Learning and Cognitive in CyberSecurity

NTA and NDR: What's the difference? how it works?

The SOC Visibility Triad

ATT&CK MITRE Best Practices

Login Form

  • Create an account
  • Forgot your username?
  • Forgot your password?

Biography

  • Introduction
  • Education and Training
  • Certificates and Awards
  • Professional Experience
  • Managed Projects
  • Qualifications Summary

Articles

  • Cyber Security Articles
  • Business Articles
  • Technical Articles
  • Open Source Articles
  • Courses - Certificates

Personal

  • About ME
  • Blogs
  • خيال علمي
  • آحلام يقظه
  • Contact ME

Travel and Photos

  • Photos
  • Travel
  • Road Trips
  • Business Trips
  • Trips

Connect

Ashraf.co Newsletter

Developed by Ashraf.co. Photos by Ashraf Abdelazim.