Reading Time: 4minutesIn this article I’m replicating what I did with python with PHP and demonstrating how to send automated emails via PHP using he PHPMailer module.
Reading Time: 4minutesThird and final installment on secret management. In this article I give an overview of all the solutions I found that met my criteria.
Reading Time: 10minutesThis is a second installment on tools that will help you manage your secrets. This time I’m diving into a solution called AKEYLESS which looks like a great option for those needing a more fully fledged Secret and key management solution.
Reading Time: 8minutesIn this article I deviate again from cybersecurity to continue with topic of how to send notifications from python, this time by sending fully functional email
Reading Time: 6minutesIn this article I deviate slightly from the infosec related topics and explain how one can add slack messaging capabilities to their python scripting..
Reading Time: 3minutesMy latest project has been to get more comfortable with Docker, how it works, how to set it up, etc. During that I started learning how to integrate Doppler into Docker. This article explains my findings.
Reading Time: 14minutesIn this article I talk about benefits of managing all the secrets you use in your dev efforts and how to do it efficiently and securely. I also provide a sample script to play with.
Reading Time: 3minutesI am not planning on waxing philosophy in this post, but I do want to discuss ideology or mindset of a successful cybersecurity professional. In my Vulnerability Management post I went over how to structure your vulnerability management program. Here I plan to take a slightly wider angle at an even higher level. Cybersecurity should… Read more: Cybersecurity philosophy
Reading Time: 4minutesRansomware is type of self-propagating malware that encrypts your files so that you cannot read or use them until you pay a ransom. Yeah, I know, I can feel how you are rolling your eyes at that unhelpful explanation full of incomprehensible technical jargon. So let me explain these terms in more detail. Table of… Read more: WHAT IS RANSOMWARE
Reading Time: 4minutesTable of Contents HOW TO PROTECT YOURSELF FROM RANSOMWARE Protecting yourself from ransomware falls into two main buckets, first is steps to take to avoid getting infected, second is being prepared to recover should you be so unlucky to get infected despite defensive measures. In this article I will touch on defensive measures while deferring… Read more: Ransomware Protection and Importance of Backups
Reading Time: 6minutesI see many posts on social media asking for advice on how to get started in cybersecurity, what certifications to get, etc., so I figured I would write an article with my perspective on those topics. Cybersecurity as a career You do not need any formal education, nor any specific certification, to be successful in… Read more: Cybersecurity Career and Certification Advice
Reading Time: 3minutesI am a very sharing kind of guy and firmly believe that sharing is caring. I am happy to share absolutely anything and everything, with literally only two exceptions. I am not big on sharing my toothbrush, and I absolutely do not share my passwords under any circumstances. There are two kinds of password sharing… Read more: Password Management
Reading Time: 3minutesThis article was written with companies in mind; most of this applies to individuals as well. Most security incidents happen due to phishing, and I have a sure-fire way to avoid becoming a phishing victim. Just do not click on links in email or open attachments. Yes, I do realize that this advice is about… Read more: Let’s go phishing
Reading Time: 3minutesThis post is going to be more applicable to companies than individuals as it is going over how to manage vulnerabilities across all your computer systems. At a super high-level, the concept of vulnerability management is pretty simple. It is all about managing your vulnerabilities. When you dive deeper, then questions start to surface. Questions… Read more: Vulnerability Management
Reading Time: 5minutesIn this blog post, I want to talk about risk management and the concept of threat modeling. Let’s start with some basic math, then dive into definitions and some examples. Table of Contents Definition of Risk Risk is the multiplication of vulnerability and threat. As with all multiplications, to lower the product (risk in this… Read more: Risk and threat management
Reading Time: 4minutesToday I want to talk about online privacy concerns. When it comes to online privacy, I tend to take a slightly different road than many of my cybersecurity colleagues. Many in my industry tend to preach that you should never ever under any circumstances share anything personal online. I understand where they are coming from… Read more: Online Privacy concerns
Reading Time: 6minutesIn this installment, we’re going to look at different ways you could be separated from your money, which you may later regret. Let’s call these all Scams or Fraud, even though some don’t meet the legal or the conventional definition of those terms. Before I start, I want to mention that to many, these may… Read more: Scams, Frauds and other ways to loose your money