top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Build Your Own Home Cyber Range: Part 2
This article was previously published on Code Fellows with the title "Build Your Own Home Cyber Range: Part 2" Author David Lee In part 1...
elainehn
May 17, 20214 min read


Build Your Own Home Cyber Range: Part 1
This article originally appeared on Code Fellows with the title "Build Your Own Home Cyber Range: Part 1" Author David Lee Ever wondered...
Emily Stamm
May 3, 20215 min read


Malware Analysis: Your Options to Understanding Their Behavior
Author Reynaldo Gonzalez Photo Source: InfoSec Insights via https://sectigostore.com/blog/malware-analysis-what-it-is-how-it-works/ Ever...
Emily Stamm
Apr 26, 20213 min read


Making My Transition Into Cybersecurity A REALITY
This article originally appeared on Aime Digital with the title “I am Making My Transition Into Cybersecurity A REALITY” Author Nadia...
Emily Stamm
Apr 19, 20214 min read


7 Sure-Fire Ways to Make it Big in Information Security
Author Charles Chibueze The Information Security career space is a hot one right now and is slowly becoming competitive. Despite the...
Emily Stamm
Apr 12, 20214 min read


Cyberbullying
This blog originally appeared on Dark Shiny Unicorn with the title of “Cyberbullying" (The Love Club: Picture still from a behind the...
Emily Stamm
Apr 5, 20215 min read


An Analyst’s Dilemmas
This article originally appeared on AttackIQ Informed Defenders with the title "An Analyst's Dilemmas" Author Sai Molige Have you ever...
Emily Stamm
Mar 29, 20214 min read


Why Should You Pursue a Position With a Red Team?
Author David McHale With the current climate in IT, and business in general, a lot of people are starting to look at a career in...
Emily Stamm
Mar 22, 20213 min read


Leaning on Our Cybersecurity Network
Author Sarah Bartsch What got you into Cybersecurity? It’s a question that you get a lot if you are interviewing or even meeting a new...
Emily Stamm
Mar 15, 20212 min read


A Beginners Guide to OSINT
OSINT - Open Source Intelligence that refers to a collection of data/information by exploiting publicly available resources. It is used...
Emily Stamm
Mar 8, 20215 min read


Creating a Culture of Caring Through Awareness
Author: Teressa Gehrke Over the last few weeks, I was gathering intel from the SANS Cyber Threat Intelligence Summit; attended the...
Emily Stamm
Mar 1, 20214 min read


Getting Started with Table Top Exercises for Incident Response
Author Elaine Harrison-Neukirch In the past year, many organizations have moved to a remote workforce. Team sizes and resources are...
Emily Stamm
Feb 22, 20213 min read


Using OSINT Reconnaissance to Protect Your Organization
Author Britton White Open Source Intelligence (OSINT) reconnaissance involves using publicly available resources to passively gather...
Emily Stamm
Feb 15, 20213 min read


Learning Cloud for Non-Technical Roles
Author Angeline Williams Several months ago I was given the incredible opportunity to work for a Cloud Engineering PMO. My background is...
Emily Stamm
Feb 8, 20212 min read


Digital Document Signing Laws: an Overview
This article originally appeared on SSL.com with the title Digital Document Signing Laws: A Global View Author: Connor Wilson If the...
Emily Stamm
Feb 4, 20215 min read


Why You Should Embrace Purple Team Today
Introducing Purple Teaming Author Jorge Orchilles Wait, wait, wait, are you introducing us to another color in information security? Yes...
Emily Stamm
Feb 1, 20213 min read


Skim Hacks: What They Are and How to Defend Against Them
Author: Jen Stone With so much critical information available online, malicious actors have found increasingly insidious (and automated)...
Emily Stamm
Jan 25, 20214 min read


Starting a Career in Cybersecurity
Author: Charles Karanja A career in cybersecurity is what many desire today. We frequently see adverts telling of the many vacancies and...
Emily Stamm
Jan 18, 20213 min read


Cybersecurity Assessor Career Path
Author: Jen Stone I love working as a cybersecurity assessor and recommend it to anyone who thinks in terms of big picture systems, who...
Emily Stamm
Jan 11, 20214 min read


“Raccoon Attack” Targets TLS 1.2 and Earlier, but Is Difficult to Exploit
This blog originally appeared on SSL.com with the title "Racoon Attack" Targets TLS 1.2 and Earlier, but is Difficult to Exploit Author:...
Emily Stamm
Jan 7, 20212 min read
bottom of page
