CSNP5 days ago4 minCapture The Flag for BeginnersAuthor: Allison C. Dugas You dream of being a cyber maven who is fluent in Python and always ready with the latest Kali distro. Yet your...
CSNPMay 162 minHave You Heard About the Google Voice Scam? Recently, I listed some items for sale on Facebook Marketplace. I received a message in Facebook messenger asking if the item was still...
CSNPMay 25 minIf You Use the Same Passwords for Every Thing, CHANGE THEM NOW!Author Eric Tsang After analyzing password attacks using my honeypot, one easy thing you can do to protect yourself is to have strong...
CSNPApr 186 minWhat is Zero Trust?Author: Siggi Bjarnason Overview Let us go over what zero trust is. This is the latest buzzword in the infosec/cybersecurity industry...
CSNPApr 46 minBreaking Down LOLBAS Attacks With The Help Of Hunter-gatherersThis was originally published on February 4, 2022 on the Scythe blog page. Author Nathali Cano https://frontporchne.com/article/tanzanias...
CSNPMar 213 minNIDS: Snort - Playing Around with SnortAuthor Ashlyn Matthews What is Snort Snort is an open source, signature-based Network-based Intrusion Detection System. What does that...
CSNPMar 76 minOpportunities In Cybersecurity CopywritingAuthor Teresa Rothaar “How do I get into cybersecurity?” It’s a perennial question. Usually, cybersecurity pros answer it by talking...
CSNPFeb 213 minHumanizing Cybersecurity Culture Authors Shary Llanos Antonio and Adriana Jaramillo Pinzón The best way to reduce information security risks in an organization is to ...
CSNPFeb 73 minA Basic Introduction to Firewall Rule ManagementAuthor Angeline Williams This is a quick read for anyone interested in a brief overview of firewall rules and the importance of managing...
CSNPJan 317 minHow I Passed the CISSP in 2021Author David Lee Pursuing cybersecurity as a career is a daunting mountain to climb. This highly competitive job market is riding a wave...
CSNPJan 175 minGovernance, Risk Management and Compliance Author Swetha Kannan Note: This article was compiled by Swetha Kannan with significant research from various Security Training...
CSNPJan 36 minSimplifying the MITRE ATT&CK FrameworkThis blog was originally published on 11/3/21 on Scythe's blog site. Author Nathali Cano Introduction Before we get into the nitty gritty...
CSNPNov 29, 20215 minA Career in Defensive Security (Blue Team) Author Swetha Kannan What is the Blue team or Defensive Security? A Blue Team carries out analysis of information systems or the IT...
CSNPNov 15, 20215 minKicking Imposter Syndrome to the CurbAuthor Elaine Harrison-Neukirch Overcoming the doubts and fears of “Imposter Syndrome” can be a challenge, but it’s not one we have to...
CSNPNov 1, 20218 min A Career in Offensive Security (Penetration testing/Red teaming) Author Swetha Kannan A Penetration Tester is a security professional hired by a company to assess their information security defenses and...
CSNPOct 18, 20215 minOSINT for BeginnersOriginally published October 4, 2021 on Teressa's website, Dark Shiny Unicorn Author Teressa Gehrke This blog is originally taken from a...
CSNPOct 4, 20213 minSecurity Awareness Month - Resources For EveryoneAuthor Elaine Harrison-Neukirch In October of 2004, the National Security Alliance and the Department of Homeland Security launched...
CSNPSep 20, 20213 minHow I passed CompTIA Linux+ (XK0–004)This blog was origonally published on Cyberteach.medium.com. Author David Lee I recently passed the CompTIA Linux+ XK0–004 certification...
CSNPSep 6, 20215 minFree Training and Conferences - Discovered During the Pandemic Author Elaine Harrison-Neukirch In 2020, during the pandemic lock down, I decided to work on expanding my Cyber Security knowledge. I...
CSNPAug 23, 20212 minI am but I’m not: Dealing with Imposter Syndrome in Cybersecurity Author: Charles Chibueze My ex-colleagues and I had a chat a while back. The topic was imposter syndrome. Some mentioned how they never...