Misconceptions about NIST and CISA: Clarifying Their RolesIt is a common misconception that the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure…Apr 15Apr 15
Cybersecurity ResourcesThis blog is designed to provide you with training and educational resources for cybersecurity and tech. Below is not an exhaustive list…Mar 18Mar 18
Understanding the Mentor-Mentee DynamicThe mentoring relationship is a precious bond that offers tremendous value, particularly in the realm of information security. At its core…Sep 14, 2023Sep 14, 2023
A Template for Aspiring GRC Professionals: Kickstart Your Entry-Mid Level Career Entry-Mid Level…Recently, I was asked if I had a template for an entry-mid-level GRC role. After creating one for the individual who requested it, I…Apr 8, 2023Apr 8, 2023
Active Cyber Defense vs. Hacking Back: Understanding the Key DifferencesIn the world of cybersecurity, there are two terms that often get thrown around: active cyber defense and hacking back. While these two…Mar 25, 2023Mar 25, 2023
Colombia: The Unplanned Holiday Trip I Will Remember for a Lifetime (Dec 2022 — Jan 2023)👉One evening in October of 2022, while studying one of the various cybersecurity courses I took during the last term of graduate school…Jan 5, 2023Jan 5, 2023
One Flordia Based Tech Firm Took Employee Surveillance Too Far.Corporate surveillance technology increased by 58% from 2019 to 2020 (Migliano, 2022).Oct 18, 2022Oct 18, 2022
NotPetya Spectrum Report: Threat, Vulnerability, Attack and Impact (TVAI)Waking up to phones ringing incessantly and numerous urgent emails flooding executive inboxes with paralyzed corporations seeking answers…Mar 19, 2022Mar 19, 2022
Catfishing; The Other Type of Phishing: Leverage OSINT to Protect Yourself, with an Online Dating…I love my friends so much that when they go on a first date, I research to provide them with the most up-to-date information on their…Oct 19, 20211Oct 19, 20211
The Changing Threatscape within CyberspaceThe modern battlespace is no longer merely guerrilla warfare. It’s the unknown cyber adversary that we cannot define that targets our most…Sep 10, 2021Sep 10, 2021