Cybersecurity Career and Certification Advice
I see many posts on social media asking for advice on how to get started in cybersecurity, what certifications to get, etc., so I figured…
I see many posts on social media asking for advice on how to get started in cybersecurity, what certifications to get, etc., so I figured…
Definitions Before we dive into the world of online security, let’s start with some definitions. Online Security basics The first thing we need to realize…
If there is one magic silver bullet that will help you maintain your online security, it is critical thinking skills. If you read my previous…
In this blog post, I want to talk about risk management and the concept of threat modeling. Let’s start with some basic math, then dive…
Ransomware is type of self-propagating malware that encrypts your files so that you cannot read or use them until you pay a ransom. Yeah, I…
HOW TO PROTECT YOURSELF FROM RANSOMWARE Protecting yourself from ransomware falls into two main buckets, first is steps to take to avoid getting infected, second…
This article was written with companies in mind; most of this applies to individuals as well. Most security incidents happen due to phishing, and I…
In this installment, we’re going to look at different ways you could be separated from your money, which you may later regret. Let’s call these…
In this article I talk about benefits of managing all the secrets you use in your dev efforts and how to do it efficiently and securely. I also provide a sample script to play with.
This is a second installment on tools that will help you manage your secrets. This time I’m diving into a solution called AKEYLESS which looks like a great option for those needing a more fully fledged Secret and key management solution.