Introduction To Digital Privacy

Introduction To Digital Privacy

This article contains actionable steps and resources to help you take control of your digital privacy, stop sneaky data brokers from collecting your information, and restore a sense of freedom and peace of mind. I aim to provide even more depth on this subject in...
How Often Should You Have A Pentest?

How Often Should You Have A Pentest?

One of the most common questions that can directly impact an organization’s cybersecurity posture is “How often should we do a pentest?” It’s a fair question because managing cybersecurity isn’t just about checking boxes – it’s also about protecting your business in a...
OWASP Top 10 Prediction | 2025

OWASP Top 10 Prediction | 2025

Every four years, the Open Web Application Security Project (OWASP) publishes a top ten list of the most critical security risks that web applications are prone to. This list was last published in 2021, marking 2025 as the year for an update. OWASP utilizes a plethora...
SOC Tools Every Analyst Should Know

SOC Tools Every Analyst Should Know

While each SOC may have its own unique structure and technology stack, there remains a core set of tools and methodologies that analysts should be familiar with to effectively handle a variety of investigations and evidence sources in the field. Rather than focusing...
How to Learn Assembly: Beginner Project

How to Learn Assembly: Beginner Project

In this blog post, I’ll guide you through a project to start learning assembly, showing you all the steps and breaking the code down into manageable sections. For the project, we’ll code a number guessing game for a retro processor using an emulator that makes...