PinnedCybersecurity: The Starting LineAs I move towards my goals of becoming a CISO, I realize the path that I have taken to become a Sr. Cyber Security Specialist is not like…Nov 25, 20203Nov 25, 20203
Cybersecurity: The Path to Your Beginning (THM)Back in November 2020, I wrote a blog titled, “Cybersecurity: The Starting line”, and focused on where an individual should start when…Jul 6, 20212Jul 6, 20212
To Pay or Not to Pay — That is the Ransomware QuestionIt has become one of the most active and profound threats that an organization can face today…May 21, 2021May 21, 2021
Digital Forensics Course Development — Phase 2By now you should have a clear idea on how your course will flow, but it’s a good idea to write it down and present it in a way that your…Apr 22, 20211Apr 22, 20211
Digital Forensics Course Development — Phase 1The first phase of developing a course is creating the course outline; the purpose is to document the curriculum at the course level and…Feb 6, 20211Feb 6, 20211
Digital Forensics Course Development — Phase 0At the beginning of this new year, January 2021, I was asked to help develop the Digital Forensics course for my local college’s newest…Feb 3, 2021Feb 3, 2021
SOC Analyst: The ExperienceWhen I ask people how they feel about the idea of working in a SOC, I get a lot of mixed feelings. Depending on what kind of SOC they…Jan 20, 20212Jan 20, 20212
Cyber Security: End of Year, 2021 Predictions, and What Have YouJust like an employee performance review, its tradition that we sit and review the year; we take note of the ups and downs, the lessons…Dec 30, 2020Dec 30, 2020
The Technical Path: FundamentalsI have been working in the Information Technology field for the past 12 years, discovering new things everyday. The world of IT is…Dec 14, 2020Dec 14, 2020
Whonix, and Tails, and Qubes, Oh my!The demand for user privacy and anonymity is at its highest than ever, and appears to be here to stay. In my last blog, I talked about the…Dec 4, 2020Dec 4, 2020