Security Forem

Posts

Shai Hulud has resurfaced.
Cover image for Shai Hulud has resurfaced.

Shai Hulud has resurfaced.

2
Comments 1
2 min read
Shadow Routes: Threading Yourself Through The Cracks In A City

Shadow Routes: Threading Yourself Through The Cracks In A City

Comments
7 min read
What Really Happens When You Join Public Wi-Fi (And How To Stay Safe Anyway)

What Really Happens When You Join Public Wi-Fi (And How To Stay Safe Anyway)

21
Comments
4 min read
✉️ December: Email Security — Your Strongest Defense Against Everyday Cyber Threats ✉️

✉️ December: Email Security — Your Strongest Defense Against Everyday Cyber Threats ✉️

1
Comments 2
3 min read
Cleanup of Inactive AD Accounts (User & Computer) – Over 1 Year Old

Cleanup of Inactive AD Accounts (User & Computer) – Over 1 Year Old

Comments 1
2 min read
My First Post on Security Forem

My First Post on Security Forem

Comments 1
1 min read
Why The Festive Season is a Goldmine for Cybercriminals

Why The Festive Season is a Goldmine for Cybercriminals

Comments
3 min read
Steps to get certificate from Internal CA server

Steps to get certificate from Internal CA server

Comments
1 min read
Tor or Onion Browser: Which One Truly Protects Your Privacy in 2025

Tor or Onion Browser: Which One Truly Protects Your Privacy in 2025

Comments
3 min read
How To Drill OT Operators For Cognitive Overload-Training Under Fire

How To Drill OT Operators For Cognitive Overload-Training Under Fire

Comments
6 min read
instagram.com/p/DR-DvM...

instagram.com/p/DR-DvM...

Instagram

0 likes, 0 comments - itsec.alikhan on December 7, 2025: "Most OT training prepares people for calm classrooms, not the chaotic reality of live operations where alerts stack up, information conflicts, and production pressure never stops. Real capability comes from realistic drills that use actual tools, time pressure, conflicting data, and distractions to build habits under cognitive overload. Effective drills measure how operators notice, prioritize, adapt, and act, then improve alerts, procedures, roles, and interfaces based on what went wrong. Frequent, small, realistic exercises create confidence, expose design flaws, and build muscle memory, turning training from a checkbox into a real defense. You cannot remove overload, but you can train people to think clearly inside it Read Full blog here: https://itsecalikhan.substack.com/p/training-under-fire-how-to-drill #otsecurity #industrialcybersecurity #icssecurity #cybertraining #incidentresponse #cognitiveload #humanfactors #operationaltechnology #securityengineering #socoperations #riskmanagement #criticalinfrastructure #operationalresilience".

favicon instagram.com
Comments
1 min read
Measuring Cognitive Overload - Turning Human Limits Into a Security Metric

Measuring Cognitive Overload - Turning Human Limits Into a Security Metric

Comments
5 min read
A recent Cloudflare outage caused widespread website downtime and disrupted online services across the world.

A recent Cloudflare outage caused widespread website downtime and disrupted online services across the world.

5
Comments
1 min read
Cloudflare Outage: When the Internet Hit a Breaking Point

Cloudflare Outage: When the Internet Hit a Breaking Point

5
Comments
1 min read
How to set up Multi-Factor Authentication on your Microsoft 365 account

How to set up Multi-Factor Authentication on your Microsoft 365 account

Comments
2 min read
On-Boarding Devices on Defender for Endpoint

On-Boarding Devices on Defender for Endpoint

Comments
7 min read
Microsoft Fixes 57 Vulnerabilities in Latest Patch Tuesday

Microsoft Fixes 57 Vulnerabilities in Latest Patch Tuesday

Comments
3 min read
Anatomy of an Instagram Phishing Attack: A Security Analysis

Anatomy of an Instagram Phishing Attack: A Security Analysis

1
Comments
1 min read
loading...