PinnedNoelinPurple Team2024 Cloud Armor: Strengthening your business against data breaches and erosion of customer trustPrevent data corruption because of wrong cloud policy with this control. You don’t want to allow your customer personal data to get public…Apr 23Apr 23
NoelinInfoSec Write-upsSecuring HP Printers: How to Safeguard Departmental Printing with Encryption and Access ControlsHere is a simple version of how you would securely set up HP printers in several company departments:1d ago1d ago
NoelinPurple TeamHow a Vulnerable Printer Led to a Major Cybersecurity Breach: Lessons from the 2023 IncidentCase Study:Jul 24Jul 24
NoelinPurple TeamCybersecurity Roadmap for Autonomous Vehicles: Safeguarding Control Systems Against HackersScenario:Jul 11Jul 11
NoelinInfoSec Write-upsFrom Packages to Protocols: Revealing the Surprising Skills Delivery Drivers Bring to CybersecurityThe idea that cybersecurity professionals are excellent deliverers may not be immediately obvious, but there are certain skills and…Jul 3Jul 3
NoelinPurple TeamCode Red: Safeguarding Pharmaceutical Breakthroughs from Cyber Threats (2024)In the year 2024, a major cybersecurity story affects a leading global pharmaceutical company, involving a sophisticated attack on their…Jul 3Jul 3
NoelinPurple Team2024 Vision: Navigating the Deepfake Minefield in CybersecurityIn 2024, the main cybersecurity concern for large companies is the threat of Deepfake Attacks Targeting Executives or Key Personnel.Jul 1Jul 1
NoelinPurple Team2024 Cybersecurity Issue: Hacktivists Hijack Smart Building Systems in Protest of Financial Giant’s…Overview:Jun 20Jun 20
NoelinPurple TeamFortifying Your Defenses: Examples of Effective Strategies to Ward Off SQL Injection AttacksMay 27May 27
NoelinPurple TeamDetect & Defend: Mastering Malware Screening for Safe Software InstallsReal- World Example:May 25May 25