In today episode we’re diving into something that’s been making waves in the cybersecurity community—NIST Cybersecurity Framework 2.0.The NIST Cybersecurity Framework has long been a cornerstone for building robust security practices, and with the...
In this week’s episode we will dig in exploring a critical framework that’s reshaping how organizations approach cybersecurity—especially in the energy sector—known as the Cybersecurity Capability Maturity Model. This is also refer to C2M2...
In this week’s episode, we’re unpacking a topic that’s crucial for anyone connected to the digital world: Why Hackers Target Stolen Credentials. From understanding the value behind those stolen usernames and passwords to exploring the dark web...
In this week’s episode, we’re diving into the Malware Information Sharing Platform, or MISP. We’ll explore how MISP helps organizations share and leverage threat intelligence, enhancing their defense against cyber threats. Stay...
In this week’s episode, we will dig into the risk benefit analysis of allowing kernel level access to third party application. We will look into the inherent risks this brings into the operating system and the benefit thereof.We will also...
This week’s episode needs very little introduction: The CrowdStrike IT Outage.We will delve into the unprecedented IT outage caused by a corrupt update from CrowdStrike, which led to widespread Blue Screen of Death (BSOD) errors on Windows...
180 -Unmasking Data Breaches – Understanding the Surge and Examining Recent Major Incidents – Part 2
As I said in part of this two part series episode, It’s easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one...
179 -Unmasking Data Breaches – Understanding the Surge and Examining Recent Major Incidents – Part 1
It’s easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The...
In this episode, we’re focusing on the rising trend of IT outsourcing and its implications for cybersecurity. As more businesses delegate non-core tasks to third-party providers, they inadvertently open doors to trust relationship attacks...
This week’s episode will continue with part 2 of “The Importance of Automation and Orchestration in Cyber Security.” As I said in the episode one, the need for efficient and effective security measures has never been...

