Mallika Gautamvbnm.hashnode.dev·Jul 23, 2024Cybersecurity Skills: Day 23 of the 100-Day Learning JourneyOpen source intelligence Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding we...Discussday23
Tanusha Rainatechshetalks.hashnode.dev·Jul 20, 2024In Tech, It's Her Turn Now!Remember the days when the tech industry felt like a scene from a 90s sitcom? All-guys, endless pizza boxes, and arguments about the best way to code while sporting some impressive facial hair? Back then, coding was seen as a mental maze, only for th...Discuss·20 likeswomenwhocode
Mallika Gautamvbnm.hashnode.dev·Jul 18, 2024Cybersecurity Skills: Day 21 of the 100-Day Learning JourneyCore Understanding of risks, threats, and vulnerabilities Security risk Security plans are all about how an organization defines risk. However, this definition can vary widely by organization. As you may recall, a risk is anything that can impact the...Discussday21
Carol Dsilvacaroldsillva.hashnode.dev·Jul 4, 2024My Journey as a Woman in TechMy journey into the world of technology began when my family got a Windows computer back in the day. I remember playing games like Road Rash and exploring educational software my mother had installed. I spent countless hours on that computer, captiva...DiscussWomenWhoTech
Mallika Gautamvbnm.hashnode.dev·Jul 4, 2024Mastering Cybersecurity: Day 11 of the 100-Day ChallengeVirtual Network And Privacy Common network protocols Network protocols are used to direct traffic to the correct device and service depending on the kind of communication being performed by the devices on the network. Protocols are the rules used by ...Discuss#cybersecurity
Mallika Gautamvbnm.hashnode.dev·Jul 2, 2024Mastering Cybersecurity: Day 9 of the 100-Day ChallengeIntroduction to Network Communication Networks help organizations communicate and connect. But communication makes network attacks more likely because it gives a malicious actor an opportunity to take advantage of vulnerable devices and unprotected n...Discuss#Igooglecybersecuritycourse
Mallika Gautamvbnm.hashnode.dev·Jun 30, 2024Mastering Cybersecurity: Day 7 of the 100-Day ChallengePhases of an incident response playbook An incident response is an organization's quick attempt to identify an attack, contain the damage, and correct the effects of a security breach. An incident response playbook is a guide with six phases used to ...Discuss·1 liketechnology
Mallika Gautamvbnm.hashnode.dev·Jun 29, 2024Mastering Cybersecurity: Day 6 of the 100-Day ChallengeAbout cybersecurity tools Open-source tools Open-source tools are often free to use and can be user friendly. The objective of open-source tools is to provide users with software that is built by the public in a collaborative way, which can result in...Discuss#cybersecurity
Mallika Gautamvbnm.hashnode.dev·Jun 27, 2024Mastering Cybersecurity: Day 5 of the 100-Day ChallengeOWASP: Security Principles The first OWASP principle is to minimize the attack surface area. An attack surface refers to all the potential vulnerabilities that a threat actor could exploit. Examples of common attack vectors are phishing emails and w...Discuss#cybersecurity
Adanna Nnajioforadanna-nnajiofor.hashnode.dev·Jun 27, 2024Frontend TechnologiesIn the fast-paced world of web development, selecting the right front-end technology can significantly affect your applications' efficiency, scalability, and maintainability. Two frontrunners in this arena are ReactJS, developed by Facebook, and VueJ...DiscussFrontend Development