Blog Posts
Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too
Published on 7/2/2025
🔒Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk TooEver Wonder How Websites Know Where to Take You?You type www.netflix.com, hit Enter… and in a blink, t...
Read on Medium
Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…
Published on 4/30/2025
🔒Cybersecurity Basics Refresher Series — Part 3: TLS/SSL Explained — How Secure Communication Actually WorksEver wonder what actually happens when you click “Login,” “Checkout,” or “Send” on a websit...
Read on Medium
IAM Roles vs IAM Policies — Understanding Access Control in AWS
Published on 4/28/2025
🔐 Cybersecurity Basics Refresher — Part 2 : IAM Roles vs IAM PoliciesCybersecurity Basics Refresher Series: Part 2Cloud security starts with knowing who can access what — and how much they can do onc...
Read on Medium
Cybersecurity Basics Refresher: Part 1
Published on 4/24/2025
🔐 Cybersecurity Basics Refresher - Part 1 : Encryption VS EncodingEncryption vs Encoding — Know the Difference (It Matters)Welcome to the Cybersecurity Basics Refresher Series — a back-to-basics jour...
Read on Medium
Building My First ELK Stack Lab: A Detailed Journey
Published on 3/26/2025
As a cybersecurity enthusiast, I’ve always been drawn to tools and technologies that enable better log management, monitoring, and analysis. The ELK stack — ElasticSearch, Logstash, and Kibana — is on...
Read on Medium
Understanding Cloud Security Posture Management (CSPM) and Its Importance
Published on 1/24/2025
In today’s rapidly evolving digital landscape, businesses are increasingly migrating to the cloud to reap the benefits of scalability, cost-effectiveness, and flexibility. But with these advantages co...
Read on Medium
Data Breaches That Shook the World: Lessons We Can Learn
Published on 1/20/2025
In today’s interconnected digital world, data breaches are a stark reminder of the vulnerabilities that exist within our systems. These breaches not only expose sensitive information but also erode tr...
Read on Medium
AI in Cybersecurity: Friend or Foe?
Published on 12/25/2024
Artificial Intelligence (AI) has become a cornerstone of innovation across industries, and cybersecurity is no exception. As the digital landscape continues to expand, AI’s potential to bolster defens...
Read on Medium
The Evolution of Ransomware-as-a-Service (RaaS): A Deep Dive into the Cybercrime Revolution
Published on 12/21/2024
In the ever-evolving world of cybersecurity, few threats have transformed as dramatically as ransomware. Once the domain of highly skilled hackers, ransomware has now become a commodified service, acc...
Read on Medium
Clickbait and Chaos: Why Phishing Tops the Charts of Cyber Threats
Published on 12/18/2024
In today’s digital age, phishing remains a leading cyber threat, exploiting human psychology to deceive individuals into divulging sensitive information. Despite advancements in security technologies,...
Read on Medium