top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Post-Quantum Cryptography: An Executive Briefing on Securing the Future of Digital Communication
Executive Summary Post-Quantum Cryptography (PQC) is a critical field addressing the security threats posed by quantum computers to...
CyberSecurity NonProfit
Oct 8, 20248 min read
139 views
0 comments


Rediscovering Our Soul: CSNP's Journey to Redefine Cybersecurity Education
In the heart of West Africa, where the ancient city of Timbuktu stands as a testament to human knowledge and resilience, my story begins....
abdelsyfane
Sep 29, 20246 min read
113 views
0 comments


The CrowdStrike Incident: A $10 Billion Wake-Up Call for Cybersecurity Insurance
Discover why Cybersecurity Insurance is essential in the wake of the CrowdStrike outage, covering vendor liability & cyber risk management.
abdelsyfane
Jul 28, 20243 min read
178 views
0 comments

Storytelling Adventures: Dive into Cybersecurity Careers
Author Nicole Hoffman You may know me as your friendly neighborhood cyber threat intelligence (CTI) analyst, but I am also the author of...
abdelsyfane
Apr 23, 20246 min read
177 views
0 comments


How to Become a Penetration Tester with Zero Experience In Five Steps
Author Charles Chibueze CISSP CISM PNPT In the recent past, I‘ve had quite a number of cybersecurity enthusiasts reach out for guidance...
abdelsyfane
Mar 25, 20243 min read
575 views
2 comments


Empowering Narratives: A Young Black Woman pivots from TV Producer to Cybersecurity Marketer
Author Naki Carter As I type these words today, I revel in the journey from network TV producer to cybersecurity marketer. As the...
abdelsyfane
Mar 11, 20242 min read
141 views
1 comment

Security-First Compliance for Small Businesses
Author Karen Walsh Purchase the book from Amazon. The year is 2017. A green-haired, tattooed, pierced mom sits in the back of an...
abdelsyfane
Mar 4, 20246 min read
153 views
7 comments


Unmasking QR Code Scams: Protecting Yourself in the Digital Age
Presented by CSNP's Cyber Safety Dept. Introduction In the era of digital connectivity, QR codes have become ubiquitous, offering a...
abdelsyfane
Feb 19, 20243 min read
103 views
0 comments

Empowering the Next Generation in Cybersecurity
Author Zinet Kemal Purchase books here Welcome to my world, where cybersecurity and children’s literature intertwine to create something...
abdelsyfane
Feb 5, 20242 min read
161 views
1 comment


What is Threat Modeling?
Author Mike McPhee As Sun Tzu might advise, “If know the enemy and know yourself, you need not fear the result of a hundred battles.”...
elainehn
Jan 29, 20243 min read
47 views
1 comment


The SIEM Playbook: Strategies for Preventing Brute Force Cybersecurity Breaches
Author Gabrielle Hempel In the ever-evolving landscape of cybersecurity, brute force attacks remain a persistent threat to organizations...
abdelsyfane
Jan 22, 202410 min read
296 views
0 comments


The Rise of Spoofed Calls and How to Protect Yourself
Author George Reeves Welcome to the digital jungle, where the convenience of modern communication also brings forth its own share of...
abdelsyfane
Jan 15, 20246 min read
142 views
0 comments


CSNP's Exciting Plans for 2024: New Events, Partnerships, and More!
As we step into 2024, the Cyber Security Non Pro fit(CSNP) team is back from our break and buzzing with energy. We've been planning some...
abdelsyfane
Jan 8, 20242 min read
23 views
0 comments


Safeguarding the Digital Realm: The Vital Role of Language in Cybersecurity
Author April Uzzle Introduction In the interconnected landscape of today's world, where digital footprints weave intricate patterns...
abdelsyfane
Dec 4, 20234 min read
91 views
0 comments


The Complex Interplay of Humanitarianism and Cybersecurity: Navigating the Digital Age Challenges
Author April Uzzle In today's interconnected world, the realms of humanitarianism and cybersecurity are becoming increasingly...
abdelsyfane
Nov 27, 20234 min read
45 views
0 comments


Online Shopping Scams: Protect Yourself
CSNP Cyber Safety Dept. The holidays are coming. Many of us will be online shopping. Online shopping is both convenient and efficient....
abdelsyfane
Nov 20, 20232 min read
44 views
0 comments


Juice Jacking
Author Chris Thomas Juice jacking is an exploit used to compromise a charging station to infiltrate devices that connect to it. Hackers...
abdelsyfane
Nov 13, 20234 min read
49 views
0 comments


Let’s build a Cloud Network - 02: Internet Gateway and Route Tables
Author Jinali Pabasara Welcome to the second article in our series, where we explore fundamental networking concepts in AWS. So far,...
abdelsyfane
Nov 9, 20237 min read
95 views
0 comments


Cyberbullying: How to identify and handle online harassment
Author Ari Howard Almost half of U.S. students report they were bullied in some way online during the pandemic lock down. Similar to how...
abdelsyfane
Oct 30, 20237 min read
398 views
0 comments


The Unsung Hero in Cybersecurity: Unveiling the Importance of Emotional Intelligence
Author April Uzzle In the ever-evolving landscape of digital warfare, where the battleground has shifted from physical realms to the...
abdelsyfane
Oct 23, 20234 min read
119 views
1 comment
bottom of page