PinnedPublished inGeek CultureTo the letter: Zero Trust Architecture (ZTA) according to NIST 800-207 (#1)“To the letter” is a series around the analysis of standards, frameworks and RFQ/RFC that I find interesting — where I take the time to…Aug 15, 2022Aug 15, 2022
PinnedPublished inCloudnSecHow to detect if someone is attempting to crack your Wi-fiWi-Fi is a fundamental access medium to the internet (read: “World”) nowadays, I don’t think most people think too much about its security…Mar 12, 2022A response icon2Mar 12, 2022A response icon2
PinnedPublished inInfoSec Write-upsLeveraging MITRE tools for effective Threat Informed ArchiteThe Federally funded organization MITRE has been a godsend to CyberSecurity and Threat Hunting taxonomy. I for one am a huge fan of what.Apr 25, 2022A response icon3Apr 25, 2022A response icon3
A look at Brazil’s Largest Financial Hack: Junior Developer Sells Access for $900 over a couple of…🍻6d ago6d ago
Making real STRIDES toThreat Model a self developed application.I’ve wrote about this back in 2022 — this is an update following technological developmentsFeb 8Feb 8
Published inCloudnSecSupporting CrowdStrike Falcon Platform like a ProA few tips FWIWDec 8, 2024Dec 8, 2024
Published inCloudnSecCrowdStrike Portfolio Overview 2024 and how to skill up for itCrowdStrike has come a long way since its inception and has honestly become a bit of a powerhouse in cybersecurity — as many customers and…Nov 23, 2024Nov 23, 2024
How Industries Evolve and where’s Information Security at the moment?Being part of the Information Security industry these days means we’re getting to see a lot of great solutions — big impact and results…Nov 2, 2024Nov 2, 2024
Published inInfoSec Write-upsOperating Systems’ Types and common ArchetypesOperating Systems (OS) are crucial for controlling the hardware that you will interact with in multiple electronic device types that you…Aug 11, 2024Aug 11, 2024