DNS Anycast Deployment: A Case Study of Resilient DNS Infrastructure for a Nationwide ISPEnhancing DNS Performance and Reliability with Open-Source Solutions: A Case Study of Nationwide DNS Anycast Deployment.Oct 17, 2024Oct 17, 2024
Published inTheTeamPhoenix.orgSecuring DNS: My 12-Year Journey in DNS ResilienceThis article is inspired by my 2023 keynote address at the btNOG conference in Bhutan, where I shared insights from my experience securing…Oct 10, 2024Oct 10, 2024
Published inTheTeamPhoenix.orgA Comprehensive Guide to Achieving ISO/IEC 27001:2022 CertificationISO/IEC 27001:2022 is the latest revision of the internationally recognized Information Security Management Systems (ISMS) standard. It…Aug 29, 2024Aug 29, 2024
Published inTheTeamPhoenix.orgEndpoint Controls: Navigating the Cybersecurity Battlefield | Cybersecurity Tactics (Module Three)Explore endpoint controls in our latest cybersecurity series, diving into strategies and real-world applications.Apr 13, 2024Apr 13, 2024
Published inTheTeamPhoenix.orgMastering Application Security: Fundamental Strategies to Advanced Techniques (Module 2.1)Explore AppSec from basics to advanced in our guide, ensuring robust application security.Apr 7, 2024Apr 7, 2024
Published inTheTeamPhoenix.orgMastering Data Control in Cybersecurity: A Comprehensive Guide (Module Two)Dive into data security: From app protection to compliance, balancing defense and offense.Apr 6, 2024Apr 6, 2024
Published inTheTeamPhoenix.orgEnhancing Network Security with DSAT: Your Tool for DNS AnalysisThe DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations.Mar 29, 2024Mar 29, 2024
Published inTheTeamPhoenix.orgMastering Network Security: Balancing defense and offense (Module One)Dive into network security with our comprehensive guide on balancing offensive and defensive strategies.Feb 24, 2024Feb 24, 2024
Published inTheTeamPhoenix.orgNavigating the Cybersecurity Battlefield: Beyond One-Dimensional TacticsWelcome to the complex world of cyber security, a realm where the battle against digital threats demands both a shield and a sword. In our…Jan 27, 2024Jan 27, 2024
Published inTheTeamPhoenix.orgThree key roles in Defensive Security: Safeguarding Systems and Mitigating Threats“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.” ― Stephane NappoJul 14, 2023Jul 14, 2023