top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Staying Cyber Safe with Good Password Hygiene
Author Elaine Harrison-Neukirch If you use online accounts or apps on mobile devices, you are familiar with passwords. Do you use the...
abdelsyfane
Oct 17, 20223 min read


Facial Recognition: Security & Privacy Implications
In partnership with Breezeline Author Candace Moix Although most of your interactions with facial recognition may enable simple...
abdelsyfane
Oct 3, 20224 min read


Life as a Continuous Sprinted Prototype
Author Shary J. Llanos Antonio Recently, I evaluated my medium and short-term life goals, which I established during my mentorship...
abdelsyfane
Sep 26, 20222 min read


Understanding Vulnerabilities and a Remediation Walk-Through
Author Ashlyn Matthews In an attempt to practice my blue team skills, I launched a vulnerable instance from AWS and sought out to scan...
abdelsyfane
Sep 12, 20224 min read


Online Gaming - Keep Your Children Safe
In partnership with Breezeline Author Elaine Harrison-Neukirch Online gaming has become the new “arcade” of the 80’s. Kids who game...
abdelsyfane
Sep 6, 20223 min read


Unpopular Opinions in Cybersecurity
Author Swetha Kannan Cybersecurity is the most wanted career today. As the industry evolved, so much has changed. Today there are several...
abdelsyfane
Aug 29, 20224 min read


Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
Originally published on 6/10/22 at Phishing For Answers. Co-Written by Kate Esprit & Meghan Jacquot Overview: LAPSUS$ Group What does...
abdelsyfane
Aug 22, 20225 min read


What is a Supply Chain Attack?
In partnership with Breezeline Author Elaine Harrison-Neukirch Supply chain attacks are becoming increasingly frequent. These types of...
abdelsyfane
Aug 1, 20223 min read


Wild West Hackin Fest: The Return
Author Kathy Collins Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information Security chose to hold...
abdelsyfane
Jul 25, 20225 min read


Two Factor Authentication – Another Layer of Security
In partnership with Breezeline Author Cate Garrett Early in the morning, you finally managed to get your coffee before going to your...
abdelsyfane
Jul 11, 20223 min read


Customer Support: A Non Traditional Job in Cyber Security
Author Elaine Harrison-Neukirch I have been a Blue Teamer since the beginning of my cybersecurity career. I've worked in both the finance...
abdelsyfane
Jun 27, 20225 min read


Wireshark: A Forensic Investigation
Author Ashlyn Matthews Ann is a fictitious character created for this exercise. Where is Ann? I received a packet capture and was tasked...
abdelsyfane
Jun 13, 20222 min read


Having Passion For What You Do
Author Shary J. Llanos Antonio Lately, I've been searching within myself to transform my life and follow my passion. Career-wise, it is...
abdelsyfane
Jun 6, 20223 min read


CTI Networking Report
Originally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
abdelsyfane
May 30, 20222 min read


Capture The Flag for Beginners
Author: Cate Garrett You dream of being a cyber maven who is fluent in Python and always ready with the latest Kali distro. Yet your...
abdelsyfane
May 23, 20224 min read


Have You Heard About the Google Voice Scam?
Author: Elaine Harrison-Neukirch Recently, I listed some items for sale on Facebook Marketplace. I received a message in Facebook...
abdelsyfane
May 16, 20222 min read


Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers
This was originally published on February 4, 2022 on the Scythe blog page. Author Nathali Cano https://frontporchne.com/article/tanzanias...
abdelsyfane
Apr 4, 20226 min read


NIDS: Snort - Playing Around with Snort
Author Ashlyn Matthews What is Snort Snort is an open source, signature-based Network-based Intrusion Detection System. What does that...
abdelsyfane
Mar 21, 20223 min read


Opportunities In Cybersecurity Copywriting
Author Teresa Rothaar “How do I get into cybersecurity?” It’s a perennial question. Usually, cybersecurity pros answer it by talking...
abdelsyfane
Mar 7, 20226 min read


Humanizing Cybersecurity Culture
Authors Shary Llanos Antonio and Adriana Jaramillo Pinzón The best way to reduce information security risks in an organization is to ...
abdelsyfane
Feb 21, 20223 min read
bottom of page
