PinnedWhere to start in Cybersecurity for new comersWhere to start in Cybersecurity — ContextMar 29, 2021Mar 29, 2021
PinnedCIS controls — where to start in securing a medium/big enterpriseIn this post I’ll explain the CIS controls and how they can be used to start securing an enterprise.Jan 18, 20221Jan 18, 20221
PinnedWhoamiPassionate about information security, development and technology in general, I like to share my experience with different technologies. I…Nov 20, 2020Nov 20, 2020
The Rise of Ransomware: Unveiling the Secrets Behind Their SuccessUnderstanding the origins, history, and factors contributing to ransomware’s success is essential for anyone looking to protect themselves…Mar 27, 2023Mar 27, 2023
Leveraging ChatGPT in Cybersecurity: Enhancing Protection with AIThe landscape of cybersecurity has evolved significantly in recent years. As digital threats grow in complexity and scale, organizations…Mar 25, 2023Mar 25, 2023
How to secure WordPressIn this post, I’ll explain different strategies that can be use to secure WordPress.Jun 4, 2022Jun 4, 2022
SIEM 103 — Detect Windows bruteforce part 2This post is a follow up of the post SIEM 102 — Detect Windows bruteforce where I explained how to create a detection Use Case to detect a…Jun 4, 2022Jun 4, 2022
Why I switched from Logz.io to HumioI have posted a few articles about SIEMs and I have all done them using Logz.io for my examples. I recently switched to Humio and…Jan 28, 2022Jan 28, 2022
Cybersecurity Books and References — A Good InfoSec Reading ListI have been asked a few times over the years for a good reading list of cybersecurity books and references to get to know more on the…Sep 29, 2021Sep 29, 2021