top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Celebrating Black History Month and Black Security Pioneers
Author April Uzzle Federally recognized since 1976, Black History Month is celebrated during February as a time to honor, recognize and...
abdelsyfane
Feb 16, 20233 min read
Â
Â
Â


Crypto Cons
Author Alex Moix In partnership with Breezeline The cryptocurrency craze has piqued the interest of many, including that of scammers -...
abdelsyfane
Feb 13, 20234 min read
Â
Â
Â


The Not So Common Approach to Finding Yourself working in Cybersecurity
Author Tenesa Ellis Find your inspiration. What makes you want to enter the cyber security field? For me, I really enjoy reading and...
abdelsyfane
Feb 9, 20233 min read
Â
Â
Â


Cybersecurity Marketing: What It Is and How to Break Into It
Author Chris Spellman So you want to be a cybersecurity marketer? Or maybe you’re just curious what those crazy marketers at your...
abdelsyfane
Feb 6, 20233 min read
Â
Â
Â


Put the Brakes on Car Hacking
Author Jeremy McIntyre In partnership with Breezeline Car hacking is a growing concern as more and more vehicles are equipped with...
abdelsyfane
Jan 30, 20233 min read
Â
Â
Â


How does ChatGPT work? Tracing the evolution of AIGC
Originally published on December 31, 2022 at DTonomy Key AIGC Technology Author Peter Luo RNN Seq2Seq For a long time, AIGC has been...
abdelsyfane
Jan 23, 20239 min read
Â
Â
Â


CSNP’s Education Department and Cyber Safety Initiative - Revving up in 2023 Â
Author Elaine Harrison-Neukirch Welcome to 2023! For the past couple of years, the Education Department has had to scale back on...
abdelsyfane
Jan 16, 20232 min read
Â
Â
Â


WYA? Location Services
Author Teressa Gehrke In partnership with Breezeline WYA (Where you at?) is one of the quickest ways to ask a friend about their...
abdelsyfane
Dec 12, 20222 min read
Â
Â
Â


TryHackMe - Pyramid Of Pain Room
Author Dan Rearden Learn what is the Pyramid of Pain and how to utilize this model to determine the level of difficulty it will cause...
abdelsyfane
Dec 5, 202221 min read
Â
Â
Â


How To REMOVE Your Personal Information Online For FREE (and PAID)
This blog was originally posted on Medium, July 2022 Author: @voldimmoral ~ a guide on how to go from someone to no one online without...
abdelsyfane
Nov 28, 20226 min read
Â
Â
Â


My Learning Path to Becoming a Penetration Tester
Author Dorota Kozlowska Are you entering Cybersecurity and do not know where to start? I have followed the CompTIA A+ and CompTIA...
abdelsyfane
Nov 21, 20223 min read
Â
Â
Â


Threat Hunting Series: Using Threat Emulation for Threat Hunting
Originally published on October 10, 2022 on Medium. Author Kostas This post will demonstrate how threat emulation can be used for threat...
abdelsyfane
Nov 14, 20227 min read
Â
Â
Â


SECURITY TOOLS FOR A CYBERSECURITY PROFESSIONAL
MUST HAVE SECURITY TOOLS Previously published, May 20, 2022 on Medium Author Davies Ombasa Starting a career in cybersecurity requires...
abdelsyfane
Nov 7, 20224 min read
Â
Â
Â


Video Conferencing & Privacy
Author: Siggi Bjarnason Is Zoom Secure? In today's era of social distancing and bans on large gatherings, it seems everything has gone...
abdelsyfane
Oct 31, 20223 min read
Â
Â
Â


Sticky Fingers in the Honey Pot
\\ Author Eric Tsang Introduction A honeypot is a great tool used to detect and gain insights into hacking attempts by setting up a decoy...
abdelsyfane
Oct 24, 20226 min read
Â
Â
Â


Staying Cyber Safe with Good Password Hygiene
Author Elaine Harrison-Neukirch If you use online accounts or apps on mobile devices, you are familiar with passwords. Do you use the...
abdelsyfane
Oct 17, 20223 min read
Â
Â
Â


Encryption and the CIA Triad
Photo credit ia.acs.org.au Author: Siggi Bjarnason Introduction Encryption is a type of technology that is embedded in all online...
abdelsyfane
Oct 10, 202212 min read
Â
Â
Â


Facial Recognition: Security & Privacy Implications
In partnership with Breezeline Author Candace Moix Although most of your interactions with facial recognition may enable simple...
abdelsyfane
Oct 3, 20224 min read
Â
Â
Â


Life as a Continuous Sprinted Prototype
Author Shary J. Llanos Antonio Recently, I evaluated my medium and short-term life goals, which I established during my mentorship...
abdelsyfane
Sep 26, 20222 min read
Â
Â
Â


Threat Hunting Series: The Threat Hunting Process
Originally posted on July 17, 2022 on Medium.com Author: Kostas In the previous posts of the series, I covered the basics of threat...
abdelsyfane
Sep 19, 20228 min read
Â
Â
Â
bottom of page
