Nov 8, 20182 min readRunning Kali Linux on DockerDocker is a great way of running an isolated environment for testing. A few people have been asking me is it possible to run Kali Linux...
Nov 8, 20184 min readDistributing malware inside Adobe PDF documents Distributing malware inside Adobe PDF documents is a popular method for attackers to compromise systems. Within the latest versions of...
Nov 8, 20183 min readThe Main Cyber Security Threats That You Need to Be Concerned About Whenever there is a technological development, a cyber-security threat usually isn’t far behind. So, considering the current state of the...
Nov 8, 20187 min readUnderstanding and Preventing Cyber Fraud and Cyber Attacks with Advanced Big Data Cyber SecurityCyber Fraud Affects 5 Percent of the Planet’s GDP The Association of Certified Fraud Examiners (ACFE) estimates typical organizations...
Nov 8, 20184 min read 5 Tips to Start a Lucrative Career in Cyber SecurityInformation Security professionals are akin to our policemen. They are equipped with advanced firewalls and porn filters, secure email...
Nov 8, 201810 min readGetting started with a career in Cyber Security and Information SecurityThe Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get...
Nov 8, 20189 min readCybersecurity and Big Data trends in Retail IndustriesThe retail and service industry is costly in terms of demands due to the difficulty of managing inventory and precious shelf space....
Nov 8, 20186 min readBig Data Security Analytics: The Changing Face of Security Information and Event Management (SIEM)
Nov 8, 20181 min readDr. Chaos Podcast - Creating a Threat Hunting Group Aamir Lakhani and Tony G discuss how to start a threat hunting program within an organization.