A Book Review of “Pentesting Azure Applications” by Matt Burrough

/
In this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment.

How-to Display a Warning Banner Before the Login Prompt

/
It is best to have a warning banner displayed before a user is logged in. Below is how you will implement this task.

Is Digital Privacy A Right Or A Privilege?

/
There are many dimensions to our digital worlds. We buy everything online. We entertain ourselves with endless piles of digital content.

National Cyber Security Awareness Month – Week 1: Make Your Home a Haven for Online Security

/
National Cyber Security Awareness Month Week 1: Make Your…

A Book Review of “Learning Malware Analysis” by Monnappa KA

/
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless.

Cyberwar Season 1 – Episode 3: Cyber Mercenaries

/
Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.

Ex-Facebook security boss: U.S. elections risk becoming ‘World Cup of information warfare’

/
Ex-Facebook security boss: U.S. elections risk becoming 'World Cup of information warfare'

Book Review of “Practical Cyber Intelligence” by Wilson Bautista Jr

/
Bautista’s approach of the book “Practical Cyber Intelligence” was comprehensive for both the beginner and seasoned security practitioner regardless of their role. I do think seasoned professional in leadership will find more value in the text as compared to a Jr. Security Analyst. In addition, as an educator, this text definitely has a role in the academic realm especially in the graduate level.

Cyberwar Season 1 – Episode 2: The Sony Hack

/
At that time (2014) the Sony Hack was one of the worst attacks against a corporation. Not only were embarrassing emails released, personal health records of employees and their family and social security numbers to name a few were dumped.

Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?

/
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” which has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups.