DannyDeep Dive: Tools of the Trade of CybersecurityThere are several tools that we utilize in the field of Cybersecurity.5d ago5d ago
DannyThreat Model: SIM SwappingPreviously we discussed Vulnerabilities, Threats, and Risk and how they all tie in together.Jun 3Jun 3
DannyThinking In The Long TermWhen it comes to working to get into tech and Cybersecurity, you are faced with a plethora of new subjects in this journey.May 29May 29
DannyDetection Engineering or Threat Hunting?In a recent post I wrote about Detection Engineering, and what it entails for a practitioner.May 22May 22
DannyDetection Engineering Series: Art or Science?In our previous discussion of Detection Engineering, we talked about the foundational aspects of this brewing field within cybersecurity.Apr 25Apr 25
DannyFree Linux CourseI have previously talked about the areas that are important when it comes to learning about Security. Although there are several, here’s a…Apr 22Apr 22
DannyDetection Engineering Series: Detections -> AlertsIn the previous post, we talked about Detection Engineering as a discipline within cybersecurity, the vital role and the required skill set…Apr 22Apr 22
DannyDetection Engineering Series: Detection Engineering ExplainedDetection Engineering, what does the role entail?Apr 18Apr 18
DannyCert Chasing: Good or Bad?Okay hear me out … I have nothing against getting certifications in Cybersecurity.Feb 20Feb 20