All Blogs & Articles

Stay updated with Dr. Mushfiq's latest thoughts, research insights, and academic contributions.

Securing the Digital Perimeter: A Holistic Approach Through the CISA and CRISC Certifications

30 Dec, 2025

Securing the Digital Perimeter: A Holistic Approach Through the CISA and CRISC Certifications

In today’s connected digital world, network security stands as the foundation of organizational resilience. As businesses move deeper into digital transformation, securing the underlying network infrastructure is no longer optional—it is a strategic...

Read more
Emerging Technology: Key Challenges and Opportunities

03 Sep, 2024

Emerging Technology: Key Challenges and Opportunities

In this article, I will explore the multifaceted influence of emerging technologies on diverse aspects of human experience, encompassing personal, societal, organizational and national levels. These technological advancements are fundamentally reshap...

Read more
āĻļāĻŋāĻļ⧁ āĻ“ āύāĻžāϰ⧀āĻĻ⧇āϰ āĻŦāĻŋāϰ⧁āĻĻā§āϧ⧇ āϏāĻžāχāĻŦāĻžāϰ āĻ…āĻĒāϰāĻžāϧ āĻŦāĻ¨ā§āϧ⧇ āĻ•āĻžāĻ°ā§āϝāĻ•āϰ āωāĻĻā§āϝ⧋āĻ— āύāĻŋāύ

02 Sep, 2024

āĻļāĻŋāĻļ⧁ āĻ“ āύāĻžāϰ⧀āĻĻ⧇āϰ āĻŦāĻŋāϰ⧁āĻĻā§āϧ⧇ āϏāĻžāχāĻŦāĻžāϰ āĻ…āĻĒāϰāĻžāϧ āĻŦāĻ¨ā§āϧ⧇ āĻ•āĻžāĻ°ā§āϝāĻ•āϰ āωāĻĻā§āϝ⧋āĻ— āύāĻŋāύ

āϏāĻžāχāĻŦāĻžāϰ āφāĻ•ā§āϰāĻŽāĻŖ āϏāĻŽāĻžāĻœā§‡āϰ āωāĻĒāϰ āĻ—āĻ­ā§€āϰ āĻĒā§āϰāĻ­āĻžāĻŦ āĻĢ⧇āϞāϛ⧇, āϝāĻžāϰ āĻĢāϞ⧇ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āύ āϧāϰāύ⧇āϰ āĻĄāĻŋāϜāĻŋāϟāĻžāϞ āφāĻ•ā§āϰāĻŽāϪ⧇āϰ āĻšā§āĻŽāĻ•āĻŋ āĻĨ⧇āϕ⧇ āύāĻžāĻ—āϰāĻŋāĻ•āĻĻ⧇āϰ āϏ⧁āϰāĻ•ā§āώāĻž āĻĻ⧇āĻ“ā§ŸāĻžāϰ āϜāĻ¨ā§āϝ āĻĻā§ƒā§ āĻĒā§āϰāϤāĻŋāĻ•āĻžāϰ⧇āϰ āĻĒā§āĻ°ā§Ÿā§‹āϜāύāĨ¤ āĻļāĻŋāĻļ⧁ āĻāĻŦāĻ‚ āύāĻžāϰ⧀āĻĻ⧇āϰ āĻĒā§āϰāĻ­āĻžāĻŦāĻŋāϤ āĻ•āϰ⧇ āĻāĻŽāύ āύāĻŋāĻ°ā§āĻĻāĻŋāĻˇā§āϟ āϏāĻžāχāĻŦāĻžāϰ āφāĻ•ā§āϰāĻŽāĻŖ āĻāĻŦāĻ‚ āĻāχ āφāĻ•ā§āϰāĻŽāϪ⧇āϰ āĻā§āρāĻ•āĻŋāϗ⧁āϞāĻŋ āĻšā§āϰāĻžāϏ āĻ•āϰāϤ⧇ āĻ•āĻžāĻ°ā§āϝāĻ•āϰ...

Read more
āϏāĻŽāĻžāĻœā§‡āϰ āωāĻ¨ā§āύ⧟āύ⧇ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϰ āĻŦā§āϝāĻŦāĻšāĻžāϰ⧇ āĻĒā§āĻ°ā§Ÿā§‹āϜāύ āĻĒ⧇āĻļāĻžāĻœā§€āĻŦā§€āĻĻ⧇āϰ āĻ…āĻ—ā§āϰāĻŖā§€ āĻ­ā§‚āĻŽāĻŋāĻ•āĻž

15 Aug, 2024

āϏāĻŽāĻžāĻœā§‡āϰ āωāĻ¨ā§āύ⧟āύ⧇ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϰ āĻŦā§āϝāĻŦāĻšāĻžāϰ⧇ āĻĒā§āĻ°ā§Ÿā§‹āϜāύ āĻĒ⧇āĻļāĻžāĻœā§€āĻŦā§€āĻĻ⧇āϰ āĻ…āĻ—ā§āϰāĻŖā§€ āĻ­ā§‚āĻŽāĻŋāĻ•āĻž

āĻŦāĻžāĻ‚āϞāĻžāĻĻ⧇āĻļ āĻŦāĻ°ā§āϤāĻŽāĻžāύ⧇ āĻŦā§āϞāĻ•āĻšā§‡āχāύ, āφāχāĻ“āϟāĻŋ, āĻ•ā§āϞāĻžāωāĻĄ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻŋāĻ‚ āĻ“ āĻ•ā§ƒāĻ¤ā§āϰāĻŋāĻŽ āĻŦ⧁āĻĻā§āϧāĻŋāĻŽāĻ¤ā§āϤāĻžāϰ āĻŽāϤ⧋ āωāĻĻā§€ā§ŸāĻŽāĻžāύ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϗ⧁āϞāĻŋāϕ⧇ āĻ—ā§āϰāĻšāϪ⧇āϰ āĻĻāĻŋāϕ⧇ āĻŽāύ⧋āύāĻŋāĻŦ⧇āĻļ āĻ•āϰ⧇āϛ⧇āĨ¤ āĻāχ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāĻ—āϤ āĻ…āĻ—ā§āϰāĻ—āϤāĻŋ āĻĻ⧇āĻļāϕ⧇ āϚāϤ⧁āĻ°ā§āĻĨ āĻ“ āĻĒāĻžā§āϚāĻŽ āĻļāĻŋāĻ˛ā§āĻĒ āĻŦāĻŋāĻĒā§āϞāĻŦ⧇āϰ āĻĻāĻŋāϕ⧇ āĻāĻ—āĻŋā§Ÿā§‡ āύ⧇āĻ“ā§ŸāĻžāϰ āϞāĻ•ā§āĻˇā§āϝ⧇āĨ¤ āĻāχ āύāϤ⧁āύ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϗ⧁āϞāĻŋ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āύ āĻ•ā§...

Read more
āĻŸā§‡āĻ•āϏāχ āωāĻ¨ā§āύ⧟āύ āĻ“ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻžāϰ āϜāĻ¨ā§āϝ āĻĻ⧇āĻļā§€ā§Ÿ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϰ āωāĻĻā§āĻ­āĻžāĻŦāύ āĻ“ āĻŦā§āϝāĻŦāĻšāĻžāϰ āϜāϰ⧁āϰāĻŋ

13 Jul, 2024

āĻŸā§‡āĻ•āϏāχ āωāĻ¨ā§āύ⧟āύ āĻ“ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻžāϰ āϜāĻ¨ā§āϝ āĻĻ⧇āĻļā§€ā§Ÿ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϰ āωāĻĻā§āĻ­āĻžāĻŦāύ āĻ“ āĻŦā§āϝāĻŦāĻšāĻžāϰ āϜāϰ⧁āϰāĻŋ

⧍ā§Ļā§Ēā§§ āϏāĻžāϞ⧇ āĻŦāĻžāĻ‚āϞāĻžāĻĻ⧇āĻļāϕ⧇ āĻāĻ•āϟāĻŋ āωāĻ¨ā§āύāϤ āĻ“ āĻ¸ā§āĻŽāĻžāĻ°ā§āϟ āĻĻ⧇āĻļ⧇ āĻĒāϰāĻŋāĻŖāϤ āĻ•āϰāĻžāϰ āϞāĻ•ā§āĻˇā§āϝ⧇ āϏāϰāĻ•āĻžāϰ "āϰ⧂āĻĒāĻ•āĻ˛ā§āĻĒ ā§¨ā§Ļā§Ēā§§" āύāĻžāĻŽā§‡ āĻāĻ•āϟāĻŋ āĻĻā§€āĻ°ā§āϘāĻŽā§‡ā§ŸāĻžāĻĻā§€ āĻĒāϰāĻŋāĻ•āĻ˛ā§āĻĒāύāĻž āĻ—ā§āϰāĻšāĻŖ āĻ•āϰ⧇āϛ⧇āĨ¤ āĻāχ āĻĒāϰāĻŋāĻ•āĻ˛ā§āĻĒāύāĻžāϰ āĻāĻ•āϟāĻŋ āϗ⧁āϰ⧁āĻ¤ā§āĻŦāĻĒā§‚āĻ°ā§āĻŖ āĻĻāĻŋāĻ• āĻšāϞ⧋ āĻĻ⧇āĻļā§€ā§Ÿ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāϰ āωāĻĻā§āĻ­āĻžāĻŦāύ āĻ“ āĻŦā§āϝāĻŦāĻšāĻžāϰāĨ¤ āĻŸā§‡āĻ•āϏāχ āωāĻ¨ā§āύ⧟āύ āĻ“ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻž āĻ…āĻ°ā§āϜāύ⧇ āĻāϰ āĻ­ā§‚āĻŽāĻŋāĻ•āĻž...

Read more
āĻŽāĻžāĻĨāĻžāϚāĻžā§œāĻž āĻĻāĻŋāĻšā§āϛ⧇ āύāĻŋāĻ¤ā§āϝāύāϤ⧁āύ āϏāĻžāχāĻŦāĻžāϰ āĻ…āĻĒāϰāĻžāϧ: āϏāĻŋāĻ•ā§āϝāĻžāĻĢ⧇āϰ āĻ—āĻŦ⧇āώāĻŖāĻž

29 Jun, 2024

āĻŽāĻžāĻĨāĻžāϚāĻžā§œāĻž āĻĻāĻŋāĻšā§āϛ⧇ āύāĻŋāĻ¤ā§āϝāύāϤ⧁āύ āϏāĻžāχāĻŦāĻžāϰ āĻ…āĻĒāϰāĻžāϧ: āϏāĻŋāĻ•ā§āϝāĻžāĻĢ⧇āϰ āĻ—āĻŦ⧇āώāĻŖāĻž

āĻĻ⧇āĻļ⧇ āĻĻā§āĻŦāĻŋāϗ⧁āĻŖ āĻšāĻžāϰ⧇ āĻŦāĻžā§œāϛ⧇ āϏāĻžāχāĻŦāĻžāϰ āĻ…āĻĒāϰāĻžāϧ⧇āϰ āύāϤ⧁āύ āĻŽāĻžāĻ¤ā§āϰāĻžāĨ¤ āĻŦā§āϝāĻ•ā§āϤāĻŋāĻ—āϤ āĻ•ā§āώāϤāĻŋāϰ āĻĒāĻžāĻļāĻžāĻĒāĻžāĻļāĻŋ āφāĻ°ā§āĻĨāĻŋāĻ• āĻ•ā§āώāϤāĻŋ āĻāĻŦāĻ‚ āĻĒā§āϰāϞ⧋āĻ­āύ⧇ āĻĒā§āϰāĻ•āϟ āϏāĻžāχāĻŦāĻžāϰ āĻ…āĻĒāϰāĻžāϧāĨ¤ āϤāĻŦ⧇ āϏāĻžāĻŽāĻžāϜāĻŋāĻ• āϞ⧋āĻ•āϞāĻœā§āϜāĻžāϰ āĻŸā§āϝāĻžāĻŦ⧁āϤ⧇ āϤāĻž āĻĨāĻžāĻ•āϛ⧇ āĻ…āĻ¨ā§āϤāϰāĻžāϞ⧇āχāĨ¤ āϤāĻžāχ āĻ—āĻŖ-āϏāĻžāχāĻŦāĻžāϰ āϏāĻžāĻ•ā§āώāϰāϤāĻžāϰ āĻĒāĻžāĻļāĻžāĻĒāĻžāĻļāĻŋ āĻĻ⧇āĻļ⧇āϰ āϏāĻžāχāĻŦāĻžāϰ āϏāĻžāĻ°ā§āĻŦāϭ⧌āĻŽāĻ¤ā§āĻŦ āĻ…āĻ•ā§āώ⧁āĻŖā§āĻŖ āϰāĻžāĻ–āϤ⧇ āϏāϰ...

Read more
āĻ…āĻ•ā§āĻŸā§‹āĻŦāϰāϕ⧇ āϜāĻžāĻ¤ā§€ā§Ÿ āϏāĻžāχāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻž āϏāĻšā§‡āϤāύāϤāĻž āĻŽāĻžāϏ āĻ˜ā§‹āώāĻŖāĻžāϰ āĻĻāĻžāĻŦāĻŋ, āĻļ⧁āϰ⧁ āĻšāĻšā§āϛ⧇ āĻŽāĻžāϏāĻŦā§āϝāĻžāĻĒā§€ āĻ•āĻ°ā§āĻŽāϏ⧂āϚāĻŋ

23 Sep, 2023

āĻ…āĻ•ā§āĻŸā§‹āĻŦāϰāϕ⧇ āϜāĻžāĻ¤ā§€ā§Ÿ āϏāĻžāχāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻž āϏāĻšā§‡āϤāύāϤāĻž āĻŽāĻžāϏ āĻ˜ā§‹āώāĻŖāĻžāϰ āĻĻāĻžāĻŦāĻŋ, āĻļ⧁āϰ⧁ āĻšāĻšā§āϛ⧇ āĻŽāĻžāϏāĻŦā§āϝāĻžāĻĒā§€ āĻ•āĻ°ā§āĻŽāϏ⧂āϚāĻŋ

‘āφāĻŽāĻžāĻĻ⧇āϰ āĻŦāĻŋāĻļā§āĻŦāϕ⧇ āϏ⧁āϰāĻ•ā§āώāĻŋāϤ āĻ•āϰāĻŋ’- āĻāχ āĻĒā§āϰāϤāĻŋāĻĒāĻžāĻĻā§āϝ⧇ āĻŽāĻžāϏāĻœā§ā§œā§‡ āϏāĻžāϰāĻžāĻĻ⧇āĻļ⧇ āĻļ⧁āϰ⧁ āĻšāϤ⧇ āϝāĻžāĻšā§āϛ⧇ āĻ…āĻˇā§āϟāĻŽ āϏāĻžāχāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻž āϏāĻšā§‡āϤāύāϤāĻž āĻŽāĻžāϏ (āĻ•ā§āϝāĻžāĻŽ) āĻ…āĻ•ā§āĻŸā§‹āĻŦāϰ⧇āϰ āĻ•āĻ°ā§āĻŽāϏ⧂āϚāĻŋāĨ¤ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āύ āĻĻ⧇āĻļ⧇āϰ āĻŽāϤ⧋ āĻŦāĻžāĻ‚āϞāĻžāĻĻ⧇āĻļ⧇āĻ“ āĻ…āĻ•ā§āĻŸā§‹āĻŦāϰāϕ⧇ ‘āϜāĻžāĻ¤ā§€ā§Ÿ āϏāĻžāχāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻž āϏāĻšā§‡āϤāύāϤāĻž āĻŽāĻžāĻ¸â€™ āĻ˜ā§‹āώāĻŖāĻž āĻ•āϰāϤ⧇ āϏāϰāĻ•āĻžāϰ⧇āϰ āĻĒā§āϰāϤāĻŋ āĻĻāĻžāĻŦāĻŋ āϜāĻž...

Read more
āĻĄāĻžāϟāĻž āĻĒā§āϰāĻžāχāϭ⧇āϏāĻŋ āφāχāύ āĻĒā§āϰāϪ⧟āύ āĻ“ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāĻ—āϤ āϏāĻ•ā§āώāĻŽāϤāĻž āĻŦāĻžā§œāĻžāύ⧋āϰ āĻĒāϰāĻžāĻŽāĻ°ā§āĻļ āĻŦāĻŋāĻļ⧇āώāĻœā§āĻžāĻĻ⧇āϰ

30 Jul, 2023

āĻĄāĻžāϟāĻž āĻĒā§āϰāĻžāχāϭ⧇āϏāĻŋ āφāχāύ āĻĒā§āϰāϪ⧟āύ āĻ“ āĻĒā§āϰāϝ⧁āĻ•ā§āϤāĻŋāĻ—āϤ āϏāĻ•ā§āώāĻŽāϤāĻž āĻŦāĻžā§œāĻžāύ⧋āϰ āĻĒāϰāĻžāĻŽāĻ°ā§āĻļ āĻŦāĻŋāĻļ⧇āώāĻœā§āĻžāĻĻ⧇āϰ

'āĻĻ⧇āĻļ⧇ āĻĄāĻžāϟāĻž āĻĒā§āϰāĻžāχāϭ⧇āϏāĻŋ āĻāĻŦāĻ‚ āĻĄāĻžāϟāĻž āϏāĻŋāĻ•āĻŋāωāϰāĻŋāϟāĻŋ āφāχāύ āύ⧇āχ⧎ āĻĄāĻžāϟāĻž āĻ—āĻ°ā§āĻ­āύ⧇āĻ¨ā§āϏ āϖ⧁āĻŦāχ āϗ⧁āϰ⧁āĻ¤ā§āĻŦāĻĒā§‚āĻ°ā§āĻŖāĨ¤ āĻĄāĻžāϟāĻž āĻĒāϞāĻŋāϏāĻŋāϤ⧇ āϕ⧇ āĻĄāĻžāϟāĻž āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻ•āϰāĻŦ⧇, āϕ⧀āĻ­āĻžāĻŦ⧇ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻ•āϰāĻŦ⧇ āĻāĻŦāĻ‚ āĻ•āϤāϟ⧁āϕ⧁ āĻĄāĻžāϟāĻž āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻ•āϰāĻŦ⧇ āϤāĻž āϏ⧁āύāĻŋāĻļā§āϚāĻŋāϤ āϏāϰāĻ•āĻžāϰāϕ⧇āχ āĻ•āϰāϤ⧇ āĻšā§Ÿā§ˇ āĻĢāϞ⧇ āĻĻ⧇āĻļ⧇ āĻĄāĻžāϟāĻž āĻĒā§āϰāĻžāχāϭ⧇āϏāĻŋ āĻāĻŦāĻ‚ āĻĒā§āϰāĻŸā§‡āĻ•āĻļāύ āφāχāύ āĻ•āϰāĻž āϜāϰ⧁āϰāĻŋāĨ¤â€™...

Read more
Essential Cybersecurity Components: Continuous Monitoring, Human Intelligence and Commitment

09 Feb, 2021

Essential Cybersecurity Components: Continuous Monitoring, Human Intelligence and Commitment

Continuous monitoring is essential in the cybersecurity ecosystem of an organization. Proper design, implementation and continuous monitoring provide just-in-time reflection of users, devices, networks, data, workloads activities and status in the or...

Read more
Threat Hunting and Cyberrisk Assessment Using Cyber Kill Chain

07 Jan, 2021

Threat Hunting and Cyberrisk Assessment Using Cyber Kill Chain

Virtually every organization needs to provide digital services to its clients. However, digitization creates enormous threats for an organization, its customers and its employees. To address these threats, organizations must implement cybersecurity s...

Read more
Security and Risk Assessment of IT Defense Strategies Considering the Cyber Kill Chain

06 Jan, 2021

Security and Risk Assessment of IT Defense Strategies Considering the Cyber Kill Chain

Defensive IT architecture helps to deploy defense-in-depth concepts in an organization’s IT architecture, which helps to prevent, identify, detect, contain, respond to and recover from cyberincidents in a timely manner. Defensive architecture in info...

Read more
#IamISACA: Overcoming Challenges By Always Learning New Things

30 Jul, 2020

#IamISACA: Overcoming Challenges By Always Learning New Things

I have faced many challenges in my career in project management when implementing technology projects, including the last couple of years working on implementations of cybersecurity frameworks, standards and regulatory requirements to achieve good IT...

Read more
Auditing Linux/Unix Server Operating Systems

01 Jul, 2015

Auditing Linux/Unix Server Operating Systems

Server auditing is an important task to ensure platform-level security in an IT infrastructure and to ensure the proper configuration of Linux server security. The Linux system has its own security configuration and management system to address the s...

Read more
Auditing Oracle Database

01 Nov, 2014

Auditing Oracle Database

Database auditing is the activity of monitoring and recording configured database actions from database users and nondatabase users, to ensure the security of the databases. An administrator can perform auditing on individual actions, such as the ty...

Read more