Pinned10 Best OSINT Research Tools for Threat IntelligenceOSINT (Open Source Intelligence) refers to the practice of gathering, analyzing, and using publicly available information for intelligence…Dec 26, 2022Dec 26, 2022
OT/IACS Industries and Your RoleThis article is Part 3 of the article: Why Industrial and OT Cyber security Should Be Your Next Career MoveMar 17Mar 17
Why Choose Industrial and OT Cyber security?This article is Part 2 of the article: Why Industrial and OT Cyber security Should Be Your Next Career MoveMar 17Mar 17
Why Industrial and OT Cyber security Should Be Your Next Career MoveIn today’s cyber security landscape, protecting digital assets and data within the field of information technology (IT) requires…Mar 17Mar 17
BAU Risk Assessment: An OverviewBAU stands for “business as usual”. It refers to the day-to-day operations and routines of a company or organization. It is used to…Jan 25, 2023Jan 25, 2023
Password Attacks: Types and PreventionIn this blog, I will discuss the different types of password attacks that can be used to gain unauthorized access to sensitive information.Jan 19, 2023Jan 19, 2023
SQL Injection: Exploitation, Detection and PreventionSQL injection is a type of cyber attack in which an attacker injects malicious code into a website’s Structured Query Language (SQL)…Jan 2, 2023Jan 2, 2023