An Analysis of FBI Director Chris Wray’s Briefing on January 31, 2024I’ve listened to FBI Director Wray’s briefing on the imminent threat from China several times. I wanted to share first a brief of the…Feb 31Feb 31
Five cybersecurity trends for 20242024 marks a paradigm shift in cybersecurity. Defined by the rise of generative AI and in the context of the ubiquity of technology in our…Jan 15Jan 15
How EDR solution protect an organisation’s Endpoint Devices?#EDR: An Endpoint Detection and Response (EDR) solution protects organizations by continuously monitoring and analyzing endpoints (devices…Nov 13, 2023Nov 13, 2023
Cybersecurity ToolsIP & URL Reputation 🌀1. Virus Total : https://lnkd.in/deHBqm5v 🌀2. URL Scan : https://urlscan.io/ 🌀3. AbuseIPDB…Sep 14, 2023Sep 14, 2023
Top 20 Cybersecurity Roles :1. Security Analyst: Monitors and analyzes security alerts to identify and respond to potential threats.Sep 14, 2023Sep 14, 2023
FREE resources that will help you to break into “GRC and information security”.Information Security Fundamentals 📕 ISO 27000:2018: Information technology — Security techniques — Information security management…Apr 25, 2023Apr 25, 2023
Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows…CVE-2023–29389Apr 5, 2023Apr 5, 2023