Iftiaj Alom The Attack Didn’t Start on-Chain. It Started on a Laptop. A few months ago, a Web3 startup shared a painful story. One of their developers lost access to his laptop during a trip. Nothing dramatic. Just a misplaced bag at an airport. At first, the team wasn’... Cybersecurity
Iftiaj Alom How Attackers Learn About You Without Hacking One afternoon, a tech lead from a growing company received an email from a stranger. The message was short: “Nice test environment at test-admin.yourcompany.com. You might want to fix those outdated s... Cybersecurity
Iftiaj Alom The Hidden Cost That Quietly Kills Profit in Government Projects Today, I spoke with a vendor who had just won a government tender in Singapore. He sounded excited at first. Then his tone shifted. They had discovered a long list of cybersecurity compliance requirem... Cybersecurity
Iftiaj Alom So… You Got a Tender and Saw: DAST, SAST, VAPT, SSAT, SSCT. Now What? A few weeks ago, a vendor messaged me in a mild panic. They had just won a government project in Singapore for a Learning Management System setup. Everything looked fine. Hardware was sorted. Document... Cybersecurity
Iftiaj Alom Your Browser Is the Weak Link: How Crypto Gets Stolen Without Hacking the Blockchain You did everything right. You used two-factor authentication. You avoided shady exchanges. You stored your crypto in a hardware wallet. Not once did you share your seed phrase. Yet one morning, you op... Cybersecurity
Iftiaj Alom When the Factory Went Quiet: A Lesson in OT Security The alarm didn’t go off. No flames. No broken machines. Just silence. One moment, the production line was moving smoothly. The next, everything froze. Screens flashed errors. Operators stood confused.... Cybersecurity
Iftiaj Alom Why Operational Technology Needs More Than Firewalls When U.S. President Donald Trump arrived at the United Nations, everything seemed prepared. Security was tight. Cameras were rolling. The schedule was exact. Then the escalator stopped. Not slowed. No... Cybersecurity