top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Incident Detection and Response in Google Cloud Platform (GCP)
Incident Detection and Response in Google Cloud Platform (GCP)
abdelsyfane
Aug 24, 20204 min read
Â
Â
Â


The Current State Of Post-Quantum Cryptography
The Current State Of Post-Quantum Cryptography
abdelsyfane
Aug 17, 20209 min read
Â
Â
Â


Malware 101: Malware Explained
Malware 101: Malware Explained
abdelsyfane
Aug 10, 20202 min read
Â
Â
Â


1 Year In Cybersecurity: What I've Learned
1 year in cybersecurity: what I've learned
abdelsyfane
Aug 3, 20204 min read
Â
Â
Â


Game Theory Applications In Cyber Security
Game Theory Applications In Cyber Security
abdelsyfane
Jul 27, 20207 min read
Â
Â
Â


Zoom In Or Zoom Out: Should I Use Zoom Or Not?
Should I Use Zoom Or Not?
abdelsyfane
Jul 20, 20203 min read
Â
Â
Â


Incident Detection and Response in Amazon Web Services (AWS)
Detecting Threats In The Cloud
abdelsyfane
Jul 13, 20204 min read
Â
Â
Â


4 Tips For Securing Your Startup Or Small Business
4 tips to help you secure your startup/small business
abdelsyfane
Jul 6, 20202 min read
Â
Â
Â


What You Need To Know About Vetting
Simple and practical advice on how to vet apps and cloud services.
abdelsyfane
Jun 29, 20202 min read
Â
Â
Â


Certs vs. Degrees. vs. Experience
Certs vs. Degrees vs. Experience - which route should you take in your cybersecurity career?
abdelsyfane
Jun 22, 20203 min read
Â
Â
Â


Charity Fraud - Don't Send Crooks Your COVID-19 Donations
Author Debra R Richardson COVID-19 has created a legitimate need for the community to donate their time, resources, and money to those...
Emily Stamm
Jun 15, 20203 min read
Â
Â
Â


Reducing Sensitive Data Exposure Through Secrets Management
How to reduce sensitive data exposure through secrets management
abdelsyfane
Jun 8, 20203 min read
Â
Â
Â


The Most Common Types Of Identity Theft
These are the six most common types of identity theft and what you can do to protect your identity from being compromised
abdelsyfane
Jun 1, 20202 min read
Â
Â
Â


Protect Yourself From An E-Mail Scam Today
How to protect yourself from BEC (Business Email Compromise)
abdelsyfane
May 25, 20203 min read
Â
Â
Â


Your Info Is On The Dark Web - What Does That Mean For You?
Your data is on the Dark Web, but there are steps you can take to limit the damage.
abdelsyfane
May 18, 20202 min read
Â
Â
Â


COVID-19 Cyber Safety
How threat actors are utilizing COVID-19 for scams.
Emily Stamm
Apr 1, 20203 min read
Â
Â
Â
bottom of page
