Time-Poor Cybersecurity Professional’s Guide: Edition IX.

Time-Poor Cybersecurity Professional’s Guide: Edition IX.

Cybersecurity Professional’s weekly review for the week starting from 2023/11/15 to 2023/11/21.

Suhith Illesinghe
Published in
3 min readNov 21, 2023

--

Introduction

Welcome to this week’s cybersecurity blog review! In this edition, we will explore thought-provoking articles that cover a range of topics, including the dynamics of the hacker community, breaking into the cybersecurity industry without a tech degree, best practices for password storage, privilege escalation risks, and Google Cloud’s predictions for the future of cybersecurity. These articles provide valuable insights and practical tips for anyone interested in understanding and enhancing their knowledge of cybersecurity. Let’s dive in!

Articles in focus

1. Siber Güvenlikte Neler Değişiyor? İşte Google Cloud’un 2024 Öngörüleri

In this article, the author discusses the changing landscape of cybersecurity and shares Google Cloud’s predictions for 2024. The article highlights the importance of staying updated with the latest security trends and technologies to protect personal and business data. It provides valuable insights into the future of cybersecurity and how Google Cloud aims to address emerging threats. Read the full article to gain a better understanding of the evolving cybersecurity landscape and how it can impact you.

2. Storing Passwords in Your Database: Level Noob to Level Boss

You will learn the best practices for storing passwords in your database, starting from the basics and progressing to advanced techniques in this article. The author explains the importance of hashing and salting passwords to enhance security. They also discuss the use of bcrypt, a popular password hashing algorithm, and provide code examples for implementation. By following the guidelines presented in this article, you can level up your password storage strategy and become a boss in database security.

3. Coming from a Small Village: How I Landed in Cybersecurity Without a Tech Degree

The author shares their personal journey of how they entered the field of cybersecurity without a tech degree, in this article. The author discusses the challenges they faced coming from a small village and not having a traditional educational background in technology. The author provides valuable insights and tips for others who may be interested in pursuing a career in cybersecurity, emphasizing the importance of self-learning, networking, and gaining practical experience. Overall, this article serves as an inspiring and informative resource for anyone looking to break into the cybersecurity industry.

4. Privilege Escalation: Unauthorized Low Privilege Users Creating Feature Bundles

In this article, the author discusses the concept of privilege escalation and how unauthorized low privilege users can exploit it by creating feature bundles. The author explains the steps involved in this process and provides examples to illustrate the potential risks. By understanding this technique, readers can better protect their systems and prevent unauthorized access. Check out the full article for a detailed explanation and practical insights.

5. Hacker Phenomenon: Against or Within the System

In this thought-provoking article, the author explores the hacker phenomenon and its relationship with the system. They delve into the different perspectives on hacking, discussing whether hackers are working against or within the system. By examining the motivations and actions of hackers, the author sheds light on the potential benefits and drawbacks of hacking. This article is a must-read for anyone interested in understanding the complex dynamics of the hacker community.

Concluding thoughts

In conclusion, this week’s cybersecurity articles cover a range of topics, from the complex dynamics of the hacker community to personal journeys in the field of cybersecurity. They also provide valuable insights into password storage strategies, privilege escalation risks, and the evolving cybersecurity landscape. By reading these articles, readers can gain a deeper understanding of the challenges and opportunities in the field of cybersecurity and stay updated with the latest trends and technologies. It is crucial for individuals and businesses to prioritize cybersecurity to protect their data and systems from potential threats.

--

--

Suhith Illesinghe

Curiosity is the first step you take to make a difference. I hope to inspire others to explore, build and champion collaborative growth. Follow me!