What the CloudStrike Windows IT Outage Teaches Us About Patching
Already anticipated to be the largest IT outage in history, the recent CloudStrike Windows meltdown is giving us some valuable lessons in risk mitigation strategies — particularly in the case…
Google Cybersecurity Certification: Lessons from Course 6 – Part 1
Like I mentioned in a previous blog, I’m going to share bits and pieces of the lessons I pick up along the way as I earn my certification. I figured…
How to Secure IoT Devices – A Best Practices Guide
A recent Gartner IoT security primer revealed that at least 80% of organizations already use The Internet of Things (IoT) for business purposes. The paper also reported that 20% already…
What is Lateral Movement? Dissecting a Key Tactic In Sophisticated Cyber Attacks
Appearing in 25% of all attacks encountered by respondents of the 2022 VMware Global Incident Response Threat Report, lateral movement can no longer be ignored. Unless you understand what it…
An Introductory Guide to Data Center Security For Customers
To be effective in securing your IT infrastructure, you need to be familiar with the various aspects of security in and around that infrastructure. So, if you’re hosting your infrastructure…
How to Spot a Phishing Email
A few hours ago, I received an email, allegedly from TrustWallet, requesting my immediate action on an “urgent matter”. Apparently, I had to undergo their Know Your Customer (KYC) process.…
VPN vs Firewall – Do You Need Both?
VPNs and firewalls are two of the most basic cybersecurity tools. Many organizations have at least one of these two. That said, is there any scenario when you would need…
Hello (Cybersecurity) World: My Journey towards Becoming a Security Analyst
Join me as I embark on a new career journey as an almost-50 year old woman—that of becoming a cybersecurity analyst.
Types of VPNs – An Introductory Guide
When you’re still learning about VPNs, whether for educational or buying purposes, it’s important to bear in mind that there are different types of VPNs. Some types of VPNs are…
Characteristics of Cloud Computing
In the last couple of decades, industries have been steadily migrating from traditional on-premises IT to cloud infrastructures. This gradual shift accelerated during the COVID-19 pandemic, as businesses sought secure,…