Dragan IlievskiSecurity Incidents Handling — Swim in the logs!Stop data breaches and cyber attacks with good incident response strategy, and learn to swim in your technical logs!Feb 19, 2019Feb 19, 2019
Dragan IlievskiThe perfect candidate for every open-minded companyHi folks! As always, I would like to say “Thank you” to all my loyal readers and supporters. I am really eager to see that in my inbox…Feb 4, 2019Feb 4, 2019
Dragan IlievskiDeliver yourself — Cos’ you are the best product for your clientHello folks, I am back with another article because I was really inspired from a student that contacted me recently and asked me a really…Sep 24, 2018Sep 24, 2018
Dragan IlievskiWhy You Should Always Work With HTTPS Instead of HTTP?Behind the scenes with HTTPSJul 26, 2017Jul 26, 2017
Dragan IlievskiAre you scared from the Fileless Ransomware? You should be.I see that many global companies, banks and even some gov. organizations are struggling to protect everything from the newest type of…Jun 18, 2017Jun 18, 2017
Dragan IlievskiXSS Explained from Theory to PracticeI was recently asked to explain how XSS attacks work in depth. That’s why I want to show you what XSS is, how an attacker might use it, and…May 8, 2017May 8, 2017