I am not the first one writing about red and blue teams. And I, for sure, will not be the last. Before going further, let me explain the reason for writing this post. The topic has been turning in my head for quite some time now. Still, I recently watched […]
Security
Sometimes management is not seeing how vital is a cybersecurity program. A penetration test might help you to make them understand.
This post talks about the basic things you either must do or have to improve your security posture.
This is the second and final part.
This post talks about the basic things you either must do or have to improve your security posture.
This is the first part.
When talking about DNS filtering, one name that comes up is Pi-Hole. In this post, I explain how to install this great piece of software.
Virtual Private Networks, another essential item in our lives that without taking some considerations, can become a living hell. Ok, maybe I am exagerating…
A quick checklist to use when receiving suspicious emails that will help us ascertain whether or not it is phishing.
Domain names serve as memorizable names for websites and other services on the Internet. However, computers access Internet devices by their IP addresses. And it is a good idea to try to filtering them in order to prevent phishing.
With this unprecedented situation, here are some alternatives to Zoom for online meetings.