All posts by Ahmed Hesham AbdElHalim

Experienced cybersecurity senior consultant with a dedicated focus on Identity and Access Management, proficient in Sailpoint and PasswordSafe. Backed by extensive expertise in Governance, Risk Management, and Compliance (GRC).
session attacks

7 Session Attacks and Defense Methods in IAM

Introduction In today’s interconnected digital landscape, identity and access management (IAM) plays a very important role in securing user interactions with applications, systems, and data. However, as organizations adopting cloud technologies, remote work, and diverse user populations, the landscape of identity security has become increasingly complex. In this article, we will explore the various session attacks that…

Read More

Session Management in IAM - Identity Security

Session Management in IAM – Identity Security

Introduction to User Session Management A user’s interaction with an application over a period of time is known as a session. Applications need a way to track users that have been authenticated and the session may contain data about the authenticated user so session management is very important. Sessions usually has start and end time…

Read More

Ransomware protection using IAM – identity and access management controls

Introduction Ransomware has emerged as one of the most damaging cybersecurity threats in recent years. This malicious software encrypts a victim’s data, so it is inaccessible until a ransom is paid to the attackers. As a cybersecurity consultant, it is crucial to understand the various types of ransomware and implement effective strategies to prevent these…

Read More

Identity and access management

Identity and Access Management Challenges in Modern Applications

Intro In today’s digital landscape, users demand a seamless and thoughtfully designed experience when interacting with applications. Identity and access management (IAM) should serve the purpose of facilitating application access for users, and avoiding unnecessary obstacles. However, achieving this goal introduces many questions and options for developers venturing into the realm of Identity and Access…

Read More

Adaptable and Resilient Mindset - Fixed vs Growth Mindset

Adaptable and Resilient Mindset – Fixed vs Growth Mindset

Shifting your mindset can lead to extraordinary change to your life aspects on the personal and career levels. An Adaptable and Resilient Mindset can change your way of thinking and improve yourself, so let’s explore the following questions following: resilient mindsets, such as growth and creativity, can help improve individuals in their job performance, academic…

Read More

What is Privileged Access Management (PAM) Software?

What is Privileged Access Management (PAM) Software? A privileged access means elevated permissions for users (“Super users or System Administrators”) who are performing critical changes in critical systems in the IT environment. Normally, system admins are usually have full control over these accounts and it’s almost impossible to monitor and audit privileged access specially in…

Read More