On a windy and blistering rainy day, you are expected to feel gloomy? A few lines of codes are demonstrative of statement: def weather (windy, raining): if… Read more “JEDI in the Cloud”
Category: Cybersecurity
Risk and Incident Response Management
Tomatoes and bananas are not the same as apples and oranges? This is untrue according to the Lexico online dictionary. In fact, true fruits are developed from… Read more “Risk and Incident Response Management”
I am WannaCry, the Cryptoworm!
Updated 1 May 2019 12:28AM Pet Sementary (2019)? Although Horror has many delivery methods such as visceral horror, demon possession, toy monsters or monster toys, apocalypse zombies,… Read more “I am WannaCry, the Cryptoworm!”
What’s in your ______?
Samuel L. Jackson, the melodramatic actor and sizable voice of the Atlanta Falcons “Rise Up” campaign, asks, “What’s in your wallet?” Less the boisterous voice and charismatic… Read more “What’s in your ______?”
Let’s Think About Challenges?
It is day 4 of 31 days to exam. I am planning on sitting for Cisco’s Security Fundamentals Exam (e.g., SECFND 210-250 and SECOPS 210-255) at the… Read more “Let’s Think About Challenges?”
Hidden In Plain Sight..
Hackers do not require sophisticated hacking tools or a 65-hour work week. According to an online report dated August 01, 2018, a tech savvy valedictorian from Massachusetts… Read more “Hidden In Plain Sight..”
Let’s Play a Cryptocurrency Board Game?
Although Alberto is the first hurricane or tropical cyclone of the year, it has been raining cryptocurrency constantly. Is cryptocurrency making it rain for thousands of eager… Read more “Let’s Play a Cryptocurrency Board Game?”
Harvesting of Data by Giants!
Heads are nodding, eyebrows are raised and fingers are pointed at Mark Zuckerberg, CEO of Facebook, for an implicit part in data harvesting by Cambridge Analytica. Cambridge… Read more “Harvesting of Data by Giants!”
Reconnaissance Noise
Whether an ethical hacker or unethical hacker, the threat actor seeks information for purposes only s/he understands. Threat actors are continuous learners, expanding skills to select impossible… Read more “Reconnaissance Noise”
Dark Web Lectures on Personal Freedom
How can you get lost on the Internet? No one is ever lost on the Internet; however, there is place where stealth is solace. It is called… Read more “Dark Web Lectures on Personal Freedom”