Blog Posts

Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too

Published on 7/2/2025

🔒Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk TooEver Wonder How Websites Know Where to Take You?You type www.netflix.com, hit Enter… and in a blink, t...
Read on Medium
Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too

Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…

Published on 4/30/2025

🔒Cybersecurity Basics Refresher Series — Part 3: TLS/SSL Explained — How Secure Communication Actually WorksEver wonder what actually happens when you click “Login,” “Checkout,” or “Send” on a websit...
Read on Medium
Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…

IAM Roles vs IAM Policies — Understanding Access Control in AWS

Published on 4/28/2025

🔐 Cybersecurity Basics Refresher — Part 2 : IAM Roles vs IAM PoliciesCybersecurity Basics Refresher Series: Part 2Cloud security starts with knowing who can access what — and how much they can do onc...
Read on Medium
IAM Roles vs IAM Policies — Understanding Access Control in AWS

Cybersecurity Basics Refresher: Part 1

Published on 4/24/2025

🔐 Cybersecurity Basics Refresher - Part 1 : Encryption VS EncodingEncryption vs Encoding — Know the Difference (It Matters)Welcome to the Cybersecurity Basics Refresher Series — a back-to-basics jour...
Read on Medium
 Cybersecurity Basics Refresher: Part 1

Building My First ELK Stack Lab: A Detailed Journey

Published on 3/26/2025

As a cybersecurity enthusiast, I’ve always been drawn to tools and technologies that enable better log management, monitoring, and analysis. The ELK stack — ElasticSearch, Logstash, and Kibana — is on...
Read on Medium
Building My First ELK Stack Lab: A Detailed Journey

Understanding Cloud Security Posture Management (CSPM) and Its Importance

Published on 1/24/2025

In today’s rapidly evolving digital landscape, businesses are increasingly migrating to the cloud to reap the benefits of scalability, cost-effectiveness, and flexibility. But with these advantages co...
Read on Medium
Understanding Cloud Security Posture Management (CSPM) and Its Importance

Data Breaches That Shook the World: Lessons We Can Learn

Published on 1/20/2025

In today’s interconnected digital world, data breaches are a stark reminder of the vulnerabilities that exist within our systems. These breaches not only expose sensitive information but also erode tr...
Read on Medium
Data Breaches That Shook the World: Lessons We Can Learn

AI in Cybersecurity: Friend or Foe?

Published on 12/25/2024

Artificial Intelligence (AI) has become a cornerstone of innovation across industries, and cybersecurity is no exception. As the digital landscape continues to expand, AI’s potential to bolster defens...
Read on Medium
AI in Cybersecurity: Friend or Foe?

The Evolution of Ransomware-as-a-Service (RaaS): A Deep Dive into the Cybercrime Revolution

Published on 12/21/2024

In the ever-evolving world of cybersecurity, few threats have transformed as dramatically as ransomware. Once the domain of highly skilled hackers, ransomware has now become a commodified service, acc...
Read on Medium
The Evolution of Ransomware-as-a-Service (RaaS): A Deep Dive into the Cybercrime Revolution

Clickbait and Chaos: Why Phishing Tops the Charts of Cyber Threats

Published on 12/18/2024

In today’s digital age, phishing remains a leading cyber threat, exploiting human psychology to deceive individuals into divulging sensitive information. Despite advancements in security technologies,...
Read on Medium
Clickbait and Chaos: Why Phishing Tops the Charts of Cyber Threats