Jithu Josephjithu-joseph.hashnode.dev·Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...Discuss·41 likes·127 readsAI
Neviar Rawlinsonneviarrawlinson.hashnode.dev·Nov 15, 2024From Military Discipline to IT Leadership: Lessons for Developers and ManagersLeadership is a universal skill, but its application often varies depending on the environment. Having transitioned from a military background to IT leadership, I’ve seen firsthand how the principles of discipline, resilience, and adaptability—core t...Discussleadership
Merbin Russelblog.merb.in·Nov 13, 2024Distroless: Balancing Security with PracticalityDistroless images are a type of Docker image designed to be as minimal as possible, containing only the essential components required to run a specific application. Advocates of Distroless claim that this minimalism enhances security by reducing the ...Discuss·89 readsdistroless
Mohammad Ariful Islamthe-arif-cipher.hashnode.dev·Nov 11, 2024Understanding Randomized MAC Addresses for Better PrivacyIn today’s hyper-connected world, privacy is more important than ever. Devices we carry and connect with other networks leave digital traces wherever we go, making our privacy increasingly elusive. One way that our privacy can be protected is by empl...Discuss·41 readsprivacy
Aboelhamd Abdellatifaboelhmd.com·Oct 27, 2024Essential Tips for Personal Cyber HygieneIn today’s digital world, protecting personal information isn’t just a concern for large corporations—it’s something every individual should prioritize. Cyber hygiene, much like personal hygiene, consists of regular practices that keep you safe onlin...Discuss·1 likePublic Wi-Fi Security
Aboelhamd Abdellatifaboelhmd.com·Oct 23, 2024An In-Depth Look at the Verizon 2024 Data Breach Investigations ReportThe 2024 Data Breach Investigations Report (DBIR) by Verizon is a crucial document that outlines the latest trends and patterns in cybersecurity breaches. As organizations increasingly rely on digital infrastructures, understanding the landscape of c...DiscussCybersecurity Strategies
Chama JennaneforfreeCodeCampfreecodecamp.org·Oct 9, 2024How to Strengthen Your Code: Essential Secure Design Principles for DevelopersSecure design principles have long been the foundation for building secure systems. And they remain a crucial aspect of modern cybersecurity. Introduced in 1975 by Saltzer and Schroeder in their landmark paper The Protection of Information in Compute...Discusssecure coding
Akbar KhanforBreachForcebreachforce.net·Oct 6, 2024TryHackMe: ConvertMyVideoLink to Lab - https://tryhackme.com/room/convertmyvideo Lab Overview - My script to convert videos to MP3 is super secure. A perfect room to understand from basic enumeration to limiting findings abusing a single found web application functionality t...Discuss·28 readstryhackme-lab
Aboelhamd Abdellatifaboelhmd.com·Sep 30, 2024Introduction to Cybersecurity: Why It MattersIn today’s interconnected world, cybersecurity has become more critical than ever. As our lives become increasingly digital, the risks associated with cyber threats grow exponentially. This article explores the importance of cybersecurity, recent sta...DiscussSecurityInsights
Akbar Khanakbarkhan.hashnode.dev·Sep 25, 2024Extracting NTLM Hashes with Mimikatz: A Step-by-Step Approach.Mimikatz is a powerful post-exploitation tool used by penetration testers, security researchers, and cyber attackers to interact with the Windows security model. Developed by Benjamin Delpy, it's widely known for its ability to extract plaintext pass...Discuss·1 like·194 readsmimikatz