
CYBER & INFOSEC
"blogger, InfoSec specialist, super hero ... and all round good guy"
DISCUSSIONS, CONCEPTS & TECHNOLOGIES FOR THE WORLD OF
JOIN THE DISCUSSION
Running Kali Linux on Docker
Docker is a great way of running an isolated environment for testing. A few people have been asking me is it possible to run Kali Linux...
Distributing malware inside Adobe PDF documents
Distributing malware inside Adobe PDF documents is a popular method for attackers to compromise systems. Within the latest versions of...
The Main Cyber Security Threats That You Need to Be Concerned About
Whenever there is a technological development, a cyber-security threat usually isn’t far behind. So, considering the current state of the...
Understanding and Preventing Cyber Fraud and Cyber Attacks with Advanced Big Data Cyber Security
Cyber Fraud Affects 5 Percent of the Planet’s GDP The Association of Certified Fraud Examiners (ACFE) estimates typical organizations...
5 Tips to Start a Lucrative Career in Cyber Security
Information Security professionals are akin to our policemen. They are equipped with advanced firewalls and porn filters, secure email...
Getting started with a career in Cyber Security and Information Security
The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get...
Cybersecurity and Big Data trends in Retail Industries
The retail and service industry is costly in terms of demands due to the difficulty of managing inventory and precious shelf space....