Cybersecurity — by Topic
Posts on cyber security topics by Teri Radichel
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.
💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
What cybersecurity information are you seeking? I might have covered it in one of my prior blog posts. Here’s a list of posts arranged by cybersecurity topic.
Have a Cybersecurity Question?
Cybersecurity Certifications, Careers and Jobs
No paywall on these stories. If you’re looking to get into cybersecurity as a profession, want to get certified, or are trying to hire cybersecurity professionals, these stories might help.
Automating Cybersecurity Metrics
I started building out a full, automated cloud infrastructure on AWS with code you can use on GitHub.
Network Security
Network Security, Cloud Networking, and Home Networking. Firewalls, WiFi and Packets
Abstraction in Cybersecurity
Cloud Governance And Cloud Security
AWS Organizations
OKTA and IDPs
AWS Security
Cloud Security Architecture
Ubuntu, Ubuntu on AWS EC2
CloudFormation
IoT (Internet of Things) Security
Some of my networking topics above also cover IoT security
Small Business and Startup Cybersecurity
I cover a lot of topics that will be beneficial to anyone setting up security for a small business in my posts above on networks security. Also anyone operating in a cloud environment may want to read my posts on cloud security. Small business and startup executives and venture capitalists or angel investors may want to read my book at the bottom of this post.
Supply Chain Security
AWS Lambda
AWS S3
Azure Security
GCP and Google Security
DNS Security
Penetration Testing, Security Assessments and Bug Bounties
IAM
GitHub and Git Security
Cybersecurity for Executives and Cybersecurity Strategy
I wrote a book on this topic linked at the bottom. Here are a few of the posts.
Application Security and Secure Code
Data Security and Data Governance
MFA and Passwords
Data breaches — cloud breaches, data breaches, blast radius, credentials, misconfiguration, and more
Encryption and Key Management
WiFi and wireless security
Cloud Governance, Cybersecurity Governance, Risk Management
DevOps and DevSecOps, SDLC, and Deployment Systems
Batch Job Security
Security Products
Cybersecurity book reviews and book recommendations
Video Conferencing and AWS Workspaces
AWS Workspaces: “auth code invalid”
Fixing the registration code in the configuration files
medium.com
Machine Learning and AI in CyberSecurity
Golang
AWS
AWS Lambda
Mac Security
Avoid getting scammed
Cybersecurity Investments
Cyberlaw and Geopolitical Risks
Industry specific cybersecurity issues and guidance
Travel Industry
Mortgage and Real Estate Industries
Oil Industry
Personal
Follow for updates.
Teri Radichel | © 2nd Sight Lab 2023
About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
⭐️ Author: Cybersecurity Books
⭐️ Presentations: Presentations by Teri Radichel
⭐️ Recognition: SANS Award, AWS Security Hero, IANS Faculty
⭐️ Certifications: SANS ~ GSE 240
⭐️ Education: BA Business, Master of Software Engineering, Master of Infosec
⭐️ Company: Penetration Tests, Assessments, Phone Consulting ~ 2nd Sight Lab
Need Help With Cybersecurity, Cloud, or Application Security?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Request a penetration test or security assessment
🔒 Schedule a consulting call
🔒 Cybersecurity Speaker for Presentation
Follow for more stories like this:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
❤️ Sign Up my Medium Email List
❤️ Twitter: @teriradichel
❤️ LinkedIn: https://www.linkedin.com/in/teriradichel
❤️ Mastodon: @teriradichel@infosec.exchange
❤️ Facebook: 2nd Sight Lab
❤️ YouTube: @2ndsightlab