CIS Ubuntu Benchmark Summary
Due to some recent activity discovered while investigating an incident with a company I collaborate with, It was time for […]
CIS Ubuntu Benchmark Summary Read Post »
Due to some recent activity discovered while investigating an incident with a company I collaborate with, It was time for […]
CIS Ubuntu Benchmark Summary Read Post »
Choosing the right web browser has never been more critical in a world where every click, search, and scroll can
What’s the Safest Browsers of 2025 Read Post »
The need for cryptography that can withstand quantum attacks has never been greater as quantum computing develops. In response, most
(post-quantum encryption) PQC is now accessible to everyone Read Post »
In Cybersecurity, you will find several well-known, market-established frameworks. The most popular ones are ISO27001, NIST CSF, and SOC2. But
CTEM – the new Threat Exposure Management Framework Read Post »
A recently discovered flaw in the popular 7-Zip file archiver tool (CVE-2025-0411) has been actively exploited by cybercriminals to deliver
7-Zip MoTW protection defeated Read Post »
DevOps is a transformative software development and IT operations methodology that combines development (Dev) and operations (Ops) teams to work
Key Concepts of DevOps Read Post »
Threat actors have been trying to steal credit cards for decades. And they are still thriving! How do they do
Westend Dental LLC was breached back in October 2020. Nevertheless, instead of following HIPAA procedures to disclose a data breach,
Lessons learned from Western Dental data breach Read Post »