DannyThreat Model: SIM SwappingPreviously we discussed Vulnerabilities, Threats, and Risk and how they all tie in together.5 min read·4 days ago----
DannyThinking In The Long TermWhen it comes to working to get into tech and Cybersecurity, you are faced with a plethora of new subjects in this journey.3 min read·May 29, 2024----
DannyDetection Engineering or Threat Hunting?In a recent post I wrote about Detection Engineering, and what it entails for a practitioner.5 min read·May 2, 2024--1--1
DannyDetection Engineering Series: Art or Science?In our previous discussion of Detection Engineering, we talked about the foundational aspects of this brewing field within cybersecurity.5 min read·Apr 25, 2024----
DannyFree Linux CourseI have previously talked about the areas that are important when it comes to learning about Security. Although there are several, here’s a…3 min read·Apr 22, 2024----
DannyDetection Engineering Series: Detections -> AlertsIn the previous post, we talked about Detection Engineering as a discipline within cybersecurity, the vital role and the required skill set…4 min read·Apr 22, 2024----
DannyDetection Engineering Series: Detection Engineering ExplainedDetection Engineering, what does the role entail?3 min read·Apr 18, 2024----
DannyHow To Stay Current in CybersecuritySpoiler Alert: You can’t. Not fully.3 min read·Apr 15, 2024----
DannyCert Chasing: Good or Bad?Okay hear me out … I have nothing against getting certifications in Cybersecurity.4 min read·Feb 20, 2024----
DannyThe Utility of LinuxThe Linux operating system is more than just a desktop OS. It’s an adaptable and versatile toolbox of utilities and tools.4 min read·Feb 9, 2024----