Zen Chan

Cybersecurity | Technology

Why It is More Like a Mindset Than An Architecture

Zero Trust Is a Concept, Not A Product Part I- Introduction to Zero Trust Security Architecture… | by Zen Chan | Technology Hits | Medium
Image by mohamed_hassan from pixabay.com

The concept of "Zero Trust" has been around for years. Unfortunately, this concept becomes a cybersecurity catchphrase with cyberattacks like spear-phishing, ransomware, and business email compromise (BEC) at all-time highs. Even the notoriously slow government cybersecurity planning is going all-in on this matter.

However, a crucial obstacle to widely adopting…

Cybersecurity | Technology

Why “Free” Is The Most Expensive Price and What is “Zero-Knowledge Proof”

How To Be Anonymous Online — Part II | by Zen Chan | Medium
Image by Johnny Silvercloud from Flickr | CC2.0

“Real integrity is doing the right thing, knowing that nobody’s going to know whether you did it or not.”
― Oprah Winfrey

After I published Part I of “How To Be Anonymous Online,” apart from people saying, “I have nothing to hide!” people strive to protect their data. …

Cybersecurity | Technology

It’s Time To Protect Yourself; Even You Have Nothing To Hide

How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
Image by Tony Webster from Wikimedia | Creative Commons

“All human beings have three lives: public, private, and secret.” ― Gabriel García Márquez

A while back, I met an old friend who I hadn’t seen since I graduated. We went for a cup of coffee to catch up for the past decades. He told me he was watching “Breaking…

From top stories to practical guides

List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
“Miracles do happen” in Central, Hong Kong | Copyright by the author

I wrote on Medium in November 2019. I still remember the first story was written at the Suvarnabhumi Airport (BKK) in Thailand. I typed on my Pixel 2XL, using the on-screen keyboard when I was waiting for my girlfriend's arrival.

Not many people use Medium in Hong Kong, but I…

Technology | Cybersecurity

Importance of API Security

Image by Geralt from Pixabay.com

“The pandemic placed immense urgency on businesses to get all kinds of digital transformation projects live as quickly as possible, and that is almost certainly a driving factor behind this surge in attacks,”

Peter Klimek, Director of Technology at Imperva.

Don’t you know that APIs have been around for…

Cybersecurity | Technology

2021 is the Year of Ransomware, So What's Next?

Ransomware Evolution: From WannaCry to DarkSide | by Zen Chan | Medium
Image by Christiaan Colen from Flickr

2021 is coming to an end. And for cybersecurity, this is a busy year (which wasn't?). Ransomware attacks are steep upward, and the gradient isn't softening its progression. Individuals and organizations continue to fall victim to this age-old cybercrime — and it's far from a new phenomenon.

If you are…

Cybersecurity | Technology

Why Today's Cybersecurity Threats Are More Threatening and How They May Differ From the Hurdles We Met in the Past

0-Day Log4Shell Is Serious, But It’s Just the Tip of The Iceberg | by Zen Chan | Technology Hits | Dec, 2021 | Medium
Image by the author

“If an attacker was able to infiltrate a popular library like log4j, they would very quickly be running with privilege inside most data centers in the world.”

— Jeff Williams, Contrast Security (2018)

Over the past two years, the rise of ransomware that goes It's the Tip of The Iceberg…

Cybersecurity | Ransomware

The Best Ransomware Response When Under Attack, According to Research Data

Ransomware Econ 101: What to Do if You Get Hit by Ransomware Without Backups | by Zen Chan | Technology Hits | Dec, 2021 | Medium
Photo by rawpixel.com from PxHere

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.”

—Sun Tzu, The Art of War

To pay or not to pay? Unfortunately, organizations often find themselves in trouble when facing "digital extortion" —in the form of ransomware attacks. Spoiler Alert: Once…

Cybersecurity | Networking

The Need to Knows About Gartner’s New Security Service Edge

SASE vs. SSE: Same Same But Different? | by Zen Chan | Technology Hits | Dec, 2021 | Medium
Image from www.piqsels.com | Public Domain

Despite your role in cybersecurity or IT, if you’re reading this article, there is a high possibility you may already have heard vendors and tech companies promoting a security trend called SASE — Secure Access Service Edge.

SASE is a somewhat cumbersome collection of English words added up by Gartner

Zen Chan

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running. Top Writer in Privacy. Editor of Technology Hits.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store