Safeguarding Children Online
How easy is it to pick up a phone and contact your friends and family through multiple different platforms?
How easy is it to pick up a phone and contact your friends and family through multiple different platforms?
Comfortably Dumb sat down with Chris Dunning-Walton, Managing Director and Head of Search at InfoSec People to talk about his journey in.
As a Recruiter, I choose to go to a lot of events and meetups. Here are some tips I used personally to network.
Ever noticed that almost every piece of software wants you to subscribe to it these days, rather than owning it?
There has been a rise in the cases of criminals using hidden micro-cameras to make illicit recordings of people. From public bathroom...
If you're reading this site - I'm gonna go out on a limb and say that you're pretty smart. Learn to spot and help manage "impostor syndrome"
I suffered intense bullying because of my geeky personality, my tribe and my brains. Cyberbullying is a whole other kettle of fish!
A massive problem in cyber security is isolation. The feeling of isolation and being alone. It can impact on careers and people.
For this article I thought I would do something different; I figured I would combine two of my loves – video games and pentesting!
Offensive Security Certified Professional's entirely practical structure/learning curve has given it a fearsome reputation - we can help!
Trust in Western democracy is not at its highest, it is safe to say. Check out this tour of how voting machines work!
Recruiters get a bad rep, but a lot of them will happily share knowledge with you. Sean Hendon is a great guy recruiting at CBSButler.
Hacking - The Art Of Exploitation by Jon Erickson is under the spotlight in this article - this is not for the faint of heart!
Network Security Assessment by Chris McNab is what we're looking at today - this is just a handy book period for anyone in cybersecurity.
The Web Application Hacker's Handbook, 2nd Edition by Dafydd Stuttard and Marcus Pinto is under the spotlight today! Check it out here.
Recommended Reading are quick posts highlighting those books, courses and software that are true force-multipliers.
Children are being failed by this generation of parents in regards to their #onlineprotection; regularly.
Courtney Evans is an aspiring penetration tester and exploit developer, and somewhat of a buffer overflow connosieur.
In response to a question DM'd to me by a connection from #SierraLeone, these are the basics of DMARC.
What were you doing before you decided to go into cybersecurity? "I decided to go into cybersecurity in high school.."