PinnedQuick Start Guide to Cloud Application Security — Part OneIntroductionDec 10, 20231Dec 10, 20231
PinnedHello World: Unraveling the Mysteries of Application Security and CybersecurityWelcome to My BlogDec 10, 20231Dec 10, 20231
Transforming Critical Infrastructure with Zero Trust ArchitectureIn today’s rapidly evolving threat landscape, traditional perimeter-based security is no longer enough. In a recent episode of Beating the…2d ago2d ago
Cyber War Stories with Alex AquinoWhen Doing the Right Thing Goes Wrong: A War Story in Information SecurityMar 21Mar 21
DeepSeek AI: Revolution or Risk? What You Need to Know + How to Install It LocallyDeepSeek AI has quickly risen to prominence, becoming the most downloaded AI model in the U.S. and U.K. Its free, open-source nature has…Feb 11Feb 11
How The Internet (Web) WorksEver wondered what happens when you type a web address into your browser? Discover the magic of DNS, TCP, TLS, and how your browser…Jul 20, 2024Jul 20, 2024
The Dark WebThe dark web is a mysterious and often misunderstood part of the internet. Unlike the surface web, which is indexed by search engines, and…Jul 18, 2024Jul 18, 2024
CVSS Score — Understanding CVSS in Vulnerability ManagementJust released a new guide on the Common Vulnerability Scoring System (CVSS)! Learn how CVSS helps standardize the assessment of security…Jun 30, 2024Jun 30, 2024
Strengthening Application Security: A Practical Guide to Secure CodingIntroductionJun 16, 2024Jun 16, 2024