DannyTools Deep Dive: RegexPreviously we talked about how there are several tools of the trade when it comes to Cybersecurity.Jul 2Jul 2
DannyDeep Dive: Tools of the Trade of CybersecurityThere are several tools that we utilize in the field of Cybersecurity.Jun 10Jun 10
DannyThreat Model: SIM SwappingPreviously we discussed Vulnerabilities, Threats, and Risk and how they all tie in together.Jun 3Jun 3
DannyThinking In The Long TermWhen it comes to working to get into tech and Cybersecurity, you are faced with a plethora of new subjects in this journey.May 29May 29
DannyDetection Engineering or Threat Hunting?In a recent post I wrote about Detection Engineering, and what it entails for a practitioner.May 22May 22
DannyDetection Engineering Series: Art or Science?In our previous discussion of Detection Engineering, we talked about the foundational aspects of this brewing field within cybersecurity.Apr 25Apr 25
DannyFree Linux CourseI have previously talked about the areas that are important when it comes to learning about Security. Although there are several, here’s a…Apr 22Apr 22
DannyDetection Engineering Series: Detections -> AlertsIn the previous post, we talked about Detection Engineering as a discipline within cybersecurity, the vital role and the required skill set…Apr 22Apr 22
DannyDetection Engineering Series: Detection Engineering ExplainedDetection Engineering, what does the role entail?Apr 18Apr 18