CuriosityTech Cyber Training

Day 16 – Identity & Access Management (IAM) Explained

When I began consulting nearly two decades ago, companies handled identity and access with just passwords and role-lists. In today’s 2025 landscape of hybrid cloud, remote work, and IoT, that old approach is obsolete. Attackers no longer just target your firewall—they target identities. If they steal an admin login or trick a user into approving […]

Day 16 – Identity & Access Management (IAM) Explained Read More »

, , ,

Day 17 – Mobile Security: Protecting Apps & Devices

When I started working in security nearly two decades ago, mobile phones were mostly about SMS scams and Bluetooth worms. In 2025, it’s a whole new battlefield. Your smartphone is now a wallet, office, social identity, and medical hub—making it an irresistible target. Today, mobile security isn’t just app developers’ responsibility—it’s a frontline concern for

Day 17 – Mobile Security: Protecting Apps & Devices Read More »

, , ,