An Introduction to the OSI model: How the Internet was Born

September 3, 2023

Picture it. It was the dawn of the early internet. While computer networks had been invented, computers still could not communicate with each other. Even though the first “internet” a.k.a. ARPAnet had been invented, the implementation of such a network in the real world had not been fully realized. So, computer companies, such as IBM, […]

Read More

What is an Intrusion Detection System?

August 19, 2023

Introduction What is an intrusion detection system? Well, in it’s simplest definition an Intrusion Detection System (IDS) is a cyber burglar alarm! Now, there are different types of these cyber burglar alarms. There are host based IDSs and network based IDSs. Host based IDSs are similar to a home burglar alarm. A host based IDS’s […]

Read More

Multi-Factor Authentication: The core of Defense in Depth

August 19, 2023

In today’s world, where digital threats loom large and data breaches are an unfortunate reality, safeguarding sensitive information has never been more critical. As organizations and individuals alike strive to fortify their digital defenses, the concept of “defense in depth” emerges as a fundamental strategy. At the heart of any defense in depth strategy is […]

Read More

How to Install and Configure the Snort Intrusion Detection System

June 26, 2023

Introduction Snort is a popular and powerful open-source Intrusion Detection System (IDS) that helps detect and prevent network-based attacks. Whether you are a security professional or an enthusiast, this tutorial can guide you through the process of installing and configuring Snort. By the end, you will have a functional Snort setup ready to analyze network […]

Read More

How To Configure Access Control Lists (ACLs): Securing Your Network

June 22, 2023

In today’s world, network security is critically important. An important piece of securing networks is the proper configuration of Access Control Lists (ACLs).

Read More

Need to Stay Private? Learn How a VPN Protects You!

June 15, 2023

Safeguarding your online activities has become more important than ever. One powerful method to safeguard your data is a Virtual Private Network (VPN).

Read More

The Only Article You Need to Understand Serverless Computing

June 8, 2023

Confused about serverless computing? Stop! This is the only article you need! In this article I will give you a layman’s understanding of serverless computing.

Read More

Threats to the Security of the Cloud

August 7, 2022

You may hear the term “cloud security” frequently, but what does “cloud security” mean? In this post I will discuss the security challenges facing the cloud.

Read More

Case Study: The Meteoric Crash of Terra Luna

July 31, 2022

May 7, 2022 will go down in history as one of most violent stablecoin crashes of all time. On this date the Terra (UST) algorithmic stablecoin lost its one-dollar peg.

Read More

Ethical Hacking, What’s the Deal?

June 13, 2022

Ethical hacking is the process of breaking into networks to test their security. Ethical hackers (a.k.a. white-hat hackers or penetration testers) are hired by a companies to try to break into their network.

Read More