There are several public sources that provide downloadable security artifacts, such as: NIST National Vulnerability Database (NVD) offers a comprehensive database of vulnerabilities, including de...
How organizations can prepare for, mitigate, and respond to common threats
Introduction Types of Malware Introduction With the advent of Internet and the progressive increase of its usage, users face increasingly sophisticated security threats. Leveraging AWS Cl...
The Internet and Personal Information: A Double-Edged Sword
The internet has revolutionized the way we live, work, and communicate. It has made many aspects of our lives easier, connecting us to a wealth of information and allowing us to conduct business a...
How Threat Modeling can help organizations
Threat modeling is a process that helps organizations identify and prioritize potential security risks in their systems and applications. By thoroughly analyzing and understanding the potential th...
10 tips to secure yourself online
Bonus Tips A Final Word The internet has become woven into nearly every part of our daily routines—from staying in touch with friends and family to shopping, banking, and man...
Common threat vectors in 2022 and how to mitigate them
Phishing Ransomware Distributed Denial of Service (DDoS) attacks Social engineering Malware Threat vectors refer to the various methods that cybercriminals use to gain unauthorized acc...
Embed security in as early as possible using devsecops
Introduction Conclusion Introduction Organizations and individuals are increasingly being encouraged to embed security into the software development lifecycle (SDLC) as early as possible to...
Social engineering and how organizations can prepare for, mitigate, and respond to these threats
Introduction What is Social Engineering? How to Prepare for and Mitigate Social Engineering Attacks? 1. Educate users 2. Install antivirus software 3. Implement strong ...
optimize your CI/CD pipeline for cloud and containerized workloads
Introduction Conclusion Introduction Continuous Integration/Continuous Delivery (CI/CD) is a software development methodology that enables developers to rapidly and reliably deploy applicat...
Phishing and how organizations can prepare for, mitigate, and respond to these threats
A ramble Introduction Preparing for Phishing Attacks Mitigating Phishing Attacks Conclusion A ramble Phishing attacks are one of the most prevalent cyber threats organizations of all ...