vbnm.hashnode.devCybersecurity Skills: Day 25 of the 100-Day Learning JourneyOverview of detection tools In this reading, you’ll compare and contrast these tools and learn about endpoint detection and response (EDR). As a security analyst, you'll likely work with these different tools, so it's important to understand their fu...Jul 26, 2024·4 min read
vbnm.hashnode.devCybersecurity Skills: Day 24 of the 100-Day Learning JourneyTraits of an effective threat model Threat modeling is the process of identifying assets, their vulnerabilities, and how each is exposed to threats. It is a strategic approach that combines various security activities, such as vulnerability managemen...Jul 26, 2024·4 min read
vbnm.hashnode.devCybersecurity Skills: Day 23 of the 100-Day Learning JourneyOpen source intelligence Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding we...Jul 23, 2024·3 min read
vbnm.hashnode.devCybersecurity Skills: Day 22 of the 100-Day Learning JourneyThe rise of SSO and MFA Most companies keep their data safely locked up behind authentication systems. Usernames and passwords are the keys that unlock information for most organizations. But are those credentials enough? Information security often ...Jul 19, 2024·4 min read
vbnm.hashnode.devCybersecurity Skills: Day 21 of the 100-Day Learning JourneyCore Understanding of risks, threats, and vulnerabilities Security risk Security plans are all about how an organization defines risk. However, this definition can vary widely by organization. As you may recall, a risk is anything that can impact the...Jul 18, 2024·3 min read