tl:dr – different types of encryption exist and not all will be applicable for your project so it is important to know the differences Symmetric…
Security information and event management Alerts ELK Stack
What is the differences between a Threat ,Vulnerability or Risk? RISK = (Probability) x (Impact) Asset+(vulnerability x threat)=RISK
A short rundown of security-related items that have caught my attention the past month. Social Engineering Rockstar, Uber Ransomware Ransomware remains a massive ongoing threat…
Azure Networking can be quite complex- but you won’t always need to implement every single component to complete a project. Covering the basics is important…
Here’s a list of the core storage services: Azure Blobs Azure Files Azure Queues Azure Tables Azure Disks https://docs.microsoft.com/en-us/azure/storage/common/storage-introduction
Incident Reponse Plan (IRP) “Everyone has a Plan Until They Get Punched in the Face” – Mike Tyson Questions to consider: What data is most…
This is by no means an exhaustive list but I hope someone can find it helpful: CIA Confidentiality, Integrity, Availability A B C D E…