top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Did You Know? A Scrum Master Role Is A Pivot Position Into Cybersecurity
Author: Katia Dean If you have followed my blog series, I have made it my mission to let people know that Cybersecurity Is For Everyone...
Emily Stamm
Jan 4, 20213 min read


Password Managers: A Primer
Author: Kevin Kipp "People are notoriously remiss at achieving sufficient entropy to produce satisfactory passwords." - Troy Hunt...
Emily Stamm
Dec 7, 20202 min read


Inside AppSec Podcast: The Intersection Between Cloud Security and Application Security
Jimmy Xu began working in information security in the military and then with the Department of Defense. After transitioning to the...
Emily Stamm
Dec 3, 20201 min read


Using OSINT Sandboxes To Fill The Gaps
Authors: Anaïs Sidhu and Samuel Cameron In this article we will discuss what an OSINT Sandbox is, how it is used practically, and how it...
Emily Stamm
Nov 30, 202012 min read


Bringing Together Cyber Security Mentors & Mentees During a Global Pandemic
Author Elaine Harrison-Neukirch Both the pandemic and subsequent lock down influenced my determination to find a community of Cyber...
Emily Stamm
Nov 23, 20202 min read


Inside AppSec Podcast: Evolving Beyond Monolithic Application Security
Greg Sternberg—IT Strategist at EVOTEK—started out as a geophysical engineer before moving into application development. His curiosity...
Emily Stamm
Nov 19, 20201 min read


Zero Trust: A Simple Explanation
Over the last few years, Zero Trust has become something of a buzzword in in the cybersecurity field. Here is a quick primer on what this t
abdelsyfane
Nov 16, 20202 min read


BEWARE the SOCK PUPPET! An OSINT Technique in Social Engineering
Author Reynaldo Gonzalez When we go online, it provides us the opportunity to explore, learn something new, or share moments and...
Emily Stamm
Nov 9, 20202 min read


BSides Seattle 2020 Recap
Author David Lee Hey folks! Bsides Seattle 2020 is in the books, let's recap some of the highlights. If you've never attended a security...
Emily Stamm
Nov 2, 20204 min read


VLANs Are Your Friend
A Virtual Local Area Network can be simply defined as a group of devices on different LAN segments
abdelsyfane
Oct 26, 20202 min read


What You Need To Know About SIM-Jacking
A “Port-Out Scam” or “SIM-jacking” are techniques used by hackers where they trick phone carriers into transferring a consumer’s phone
abdelsyfane
Oct 19, 20202 min read


What is Two Factor Authentication?
Author: Elaine Harrison-Neukirch A best practice in Cybersecurity is asserting that there are layers of protection (defense in depth)....
Emily Stamm
Oct 12, 20203 min read


Phishing: Don't Get Hooked
Author Elaine Harrison-Neukirch Social engineering is used to trick people into divulging confidential information such as username &...
Emily Stamm
Oct 5, 20204 min read


Do Your Part During Cybersecurity Awareness Month
There’s Never Been a Better Time to #BeCyberSmart
abdelsyfane
Oct 1, 20202 min read


Diversity & Cybersecurity Careers
After years of working in the cyber field, I’ve observed several things when it comes to diversity.
abdelsyfane
Sep 28, 20202 min read


Empowering Developers To Write Secure Code Faster
This blog originally appeared on Contrast Security with the title Contrast Community Edition Empowers Developers To Write Secure Code...
abdelsyfane
Sep 23, 20205 min read


My Advice? Take All The Advice You Can Get
My Advice? Take All The Advice You Can Get
abdelsyfane
Sep 21, 20204 min read


Elastic Contributor Program
The Elastic Contributor Program
abdelsyfane
Sep 17, 20203 min read


Security vs. Privacy
Security, in its simplest form, is protection against unauthorized access.
abdelsyfane
Sep 7, 20202 min read


What Is SSO?
What is SSO?
abdelsyfane
Aug 31, 20202 min read
bottom of page
