PinnedJason N. KubaiDemystifying DHCP: A Comprehensive Guide to Dynamic Host Configuration ProtocolIntroductionOct 19, 2023Oct 19, 2023
PinnedJason N. KubaiUnderstanding the Intricacies: Reverse Shell vs. Bind ShellIntroductionSep 26, 2023Sep 26, 2023
PinnedJason N. KubaiEnhancing Android Mobile App Security: A Guide to Penetration Testing with OWASP Top 10Mobile applications have become an integral part of our daily lives, making their security a critical concern. Android, being a popular…Jun 1, 2023Jun 1, 2023
PinnedJason N. KubaiIntroduction to PowerShell Scripting for Beginners in Cybersecurity: Automate and Enhance Your…In the ever-evolving landscape of cybersecurity, automation plays a pivotal role in strengthening defenses and responding effectively to…May 20, 2023May 20, 2023
Jason N. KubaiComprehensive Guide to ISO Standards for Cybersecurity: A Blueprint for Digital ResilienceIntroductionOct 19, 2023Oct 19, 2023
Jason N. KubaiEssential Technical Skills for SOC Analysts: Empowering Cybersecurity DefendersSecurity Operations Center (SOC) analysts are the frontline defenders of organizations’ digital assets against the ever-evolving threat…Jun 1, 2023Jun 1, 2023
Jason N. KubaiStrengthening Security: Preventing SIM Swap Fraud in the Telecommunications and Banking Industries…SIM swap fraud poses a significant threat to both the telecommunications and banking industries in Kenya, potentially leading to financial…Jun 1, 2023Jun 1, 2023
Jason N. KubaiCoping with Alert Fatigue as a SOC Analyst: Insights from Personal ExperienceAs a Security Operations Center (SOC) analyst, I understand the challenges and pressures that come with the role. Alert fatigue is a real…May 27, 2023May 27, 2023
Jason N. KubaiShadow IT in the Banking Industry: Unveiling the Cons of Uncontrolled Technology AdoptionThe banking industry, like many others, has witnessed a rapid technological transformation in recent years. While digital innovation has…May 27, 2023May 27, 2023