Living Authentically at Work: Why Personal Identity Matters in Cybersecurity Pride Month is here — a time to celebrate LGBTQ+ identities, honor our collective history, and push forward toward true inclusion. For me, Pride is a moment of reflection, authenticity,...
Cybersecurity is a battlefield. Every day, security teams fight against threats that are increasingly sophisticated, fast-moving, and relentless. Whether it’s a phishing campaign, a zero-day exploit, or an insider threat, the pressure never lets up. It’s easy to think that...
Why Empathy Matters More Than Ever in Cybersecurity In a field dominated by technical complexity, rapid response cycles, and constant threat evolution, it’s easy to overlook the human side of cybersecurity. But as someone who has spent years leading Security...
Trigger Warning – Abuse, Stalking, Death She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why would he? How could he have known? How did he access her information? Her text...
Clubhouse and its exponential growth during COVID-19 Clubhouse is an invite-only audio-chat iPhone app founded by Paul Davison and Rohan Seth. It allows users to create groups for conversations, including podcasts, audio conferences, etc. Launched in April 2020, the application...
Last night a colleague showed us an email which seemingly looked like a Phishing email. Best thing was the Threat Source had done a proper recon to identify individuals working in the company. The redacted portion was the name of...
Security is one domain, where you need to be constantly on your toes. There is always some new technology or attack happening. The internet is an awesome place with tons of sites and videos to help you learn. Below is...
What? .LNK is the extension used by Shortcut Files in Windows. We normally place a ton of shortcuts on our desktop and sometimes in other folders as well. These shortcuts (LNK) files are binary files that contain information needed...
ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible for processing incoming data. It takes input from different sources, executes different transformations and stores the results in Elasticsearch or other...