top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Summiting the Pyramid of Pain
Author Christopher Peacock The TTP Pyramid This blog was originally published on 3/16/22 by Scythe. A Special Thanks The TTP Pyramid...
abdelsyfane
Jul 18, 20224 min read
148 views
0 comments


CTI Networking Report
Originally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
abdelsyfane
May 30, 20222 min read
54 views
0 comments


What is Zero Trust?
Author: Siggi Bjarnason Overview Let us go over what zero trust is. This is the latest buzzword in the infosec/cybersecurity industry...
abdelsyfane
Apr 18, 20226 min read
52 views
0 comments


Let’s Talk About Windows Drivers
Author John Neff Another day, another Windows driver vulnerability. Cyber Security professionals found their Windows networks...
abdelsyfane
Aug 9, 20216 min read
209 views
0 comments


Getting Started with Table Top Exercises for Incident Response
Author Elaine Harrison-Neukirch In the past year, many organizations have moved to a remote workforce. Team sizes and resources are...
Emily Stamm
Feb 22, 20213 min read
563 views
0 comments


Using OSINT Reconnaissance to Protect Your Organization
Author Britton White Open Source Intelligence (OSINT) reconnaissance involves using publicly available resources to passively gather...
Emily Stamm
Feb 15, 20213 min read
1,670 views
0 comments


Digital Document Signing Laws: an Overview
This article originally appeared on SSL.com with the title Digital Document Signing Laws: A Global View Author: Connor Wilson If the...
Emily Stamm
Feb 4, 20215 min read
19 views
0 comments


Why You Should Embrace Purple Team Today
Introducing Purple Teaming Author Jorge Orchilles Wait, wait, wait, are you introducing us to another color in information security? Yes...
Emily Stamm
Feb 1, 20213 min read
152 views
0 comments


“Raccoon Attack” Targets TLS 1.2 and Earlier, but Is Difficult to Exploit
This blog originally appeared on SSL.com with the title "Racoon Attack" Targets TLS 1.2 and Earlier, but is Difficult to Exploit Author:...
Emily Stamm
Jan 7, 20212 min read
162 views
0 comments


Zero Trust: A Simple Explanation
Over the last few years, Zero Trust has become something of a buzzword in in the cybersecurity field. Here is a quick primer on what this t
abdelsyfane
Nov 16, 20202 min read
334 views
0 comments
bottom of page