Post
DIY SOC v MDR Solution

Do It Yourself (DIYSOC) v Managed Detection and Response Provider

With the current cybersecurity climate and increased cybercrime year over year, regulatory requirements are getting more stringent. Many require already 24x7 network security monitoring, at the very least. Most require a defined cybersecurity framework for monitoring, detection, mitigation, and remediation. These requirements are cumbersome and do not lighten based on the organization's size.

Post
DNS: Types of DNS Records, DNS Servers and DNS Query Types

DNS: Types of DNS Records, DNS Servers and DNS Query Types

DNS is a global system for translating IP addresses to human-readable domain names. When a user tries to access a web address like “example.com,” their web browser or application performs a DNS Query against a DNS server, supplying the hostname. The DNS server takes the hostname and resolves it into a numeric IP address to which the web browser can connect.

Post
The Top 6 DNS Attack Vectors per ChatGPT

The Top 6 DNS Attack Vectors per ChatGPT

The Domain Name System (DNS) is a critical infrastructure that is used to translate domain names into IP addresses, and it plays a key role in the functioning of the internet. As such, DNS is a common target for cyber-attacks, and there are several different types of threat vectors that are commonly associated with it.

Post
The 10 Domains of Cybersecurity

The 10 Domains of Cybersecurity

What, you might ask, are industries and domains within cybersecurity?  Simply put, industries are groups of related companies based on their primary business activities. Fields are specified spheres of knowledge and action within a discipline. Why is it essential for those interested in a cybersecurity career to know the top industries and domains? Well, one reason is when you seek a cybersecurity job, it’s always good to know which industries are hiring the most professionals. Fields within cybersecurity are also crucial to know what knowledge is expected of you if you enter cybersecurity.

Post
How Network Traffic Can Mask A Serious Cyber Threat

How Network Traffic Can Mask A Serious Cyber Threat

our network is always moving. Data flows from place to place, between all the endpoints that require rapid internet access. But like any traffic, this data can become congested – and some of it can be dangerous.  You never quite know what is hidden in your network traffic until it strikes your device with a...

Post
Can Cybersecurity be Automated?

Can Cybersecurity be Automated?

Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center (SOC) teams say that they are drowning in alerts, and 55% are not confident that they can prioritize alerts or respond effectively. Effective cybersecurity requires organizations to have the people,...

Post
2019: The Rise of the Government Data Breach

2019: The Rise of the Government Data Breach

Data breaches are forever becoming more a part of everyday life in the United States. Hardly a day goes by when you can’t watch the news, read on the internet about another company having their networks breached by cybercriminals. Billions of records are exposed to hackers every year, 2019 was no exception. Though many Americans...

Post
Hacking WordPress: Building the Lab

Hacking WordPress: Building the Lab

Hello all and welcome to the first episode of the Hacking WordPress series. With this series, I will be putting together a series of videos and articles that will comprise a set of tutorials to show you the ins and outs of building a home lab that will give you the flexibility to test, hack,...

  • 1
  • 2