top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Staying Cyber Safe with Good Password Hygiene
Author Elaine Harrison-Neukirch If you use online accounts or apps on mobile devices, you are familiar with passwords. Do you use the...
abdelsyfane
Oct 17, 20223 min read
76 views
0 comments


Facial Recognition: Security & Privacy Implications
In partnership with Breezeline Author Candace Moix Although most of your interactions with facial recognition may enable simple...
abdelsyfane
Oct 3, 20224 min read
253 views
0 comments


Life as a Continuous Sprinted Prototype
Author Shary J. Llanos Antonio Recently, I evaluated my medium and short-term life goals, which I established during my mentorship...
abdelsyfane
Sep 26, 20222 min read
20 views
0 comments


Understanding Vulnerabilities and a Remediation Walk-Through
Author Ashlyn Matthews In an attempt to practice my blue team skills, I launched a vulnerable instance from AWS and sought out to scan...
abdelsyfane
Sep 12, 20224 min read
60 views
0 comments


Online Gaming - Keep Your Children Safe
In partnership with Breezeline Author Elaine Harrison-Neukirch Online gaming has become the new “arcade” of the 80’s. Kids who game...
abdelsyfane
Sep 6, 20223 min read
51 views
0 comments


Unpopular Opinions in Cybersecurity
Author Swetha Kannan Cybersecurity is the most wanted career today. As the industry evolved, so much has changed. Today there are several...
abdelsyfane
Aug 29, 20224 min read
546 views
0 comments

Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
Originally published on 6/10/22 at Phishing For Answers. Co-Written by Kate Esprit & Meghan Jacquot Overview: LAPSUS$ Group What does...
abdelsyfane
Aug 22, 20225 min read
481 views
1 comment


What is a Supply Chain Attack?
In partnership with Breezeline Author Elaine Harrison-Neukirch Supply chain attacks are becoming increasingly frequent. These types of...
abdelsyfane
Aug 1, 20223 min read
36 views
0 comments


Wild West Hackin Fest: The Return
Author Kathy Collins Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information Security chose to hold...
abdelsyfane
Jul 25, 20225 min read
73 views
0 comments


Two Factor Authentication – Another Layer of Security
In partnership with Breezeline Author Cate Garrett Early in the morning, you finally managed to get your coffee before going to your...
abdelsyfane
Jul 11, 20223 min read
172 views
0 comments

Customer Support: A Non Traditional Job in Cyber Security
Author Elaine Harrison-Neukirch I have been a Blue Teamer since the beginning of my cybersecurity career. I've worked in both the finance...
abdelsyfane
Jun 27, 20225 min read
204 views
2 comments


Wireshark: A Forensic Investigation
Author Ashlyn Matthews Ann is a fictitious character created for this exercise. Where is Ann? I received a packet capture and was tasked...
abdelsyfane
Jun 13, 20222 min read
1,012 views
0 comments


Having Passion For What You Do
Author Shary J. Llanos Antonio Lately, I've been searching within myself to transform my life and follow my passion. Career-wise, it is...
abdelsyfane
Jun 6, 20223 min read
35 views
0 comments


CTI Networking Report
Originally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
abdelsyfane
May 30, 20222 min read
54 views
0 comments


Capture The Flag for Beginners
Author: Cate Garrett You dream of being a cyber maven who is fluent in Python and always ready with the latest Kali distro. Yet your...
abdelsyfane
May 23, 20224 min read
63,972 views
14 comments

Have You Heard About the Google Voice Scam?
Author: Elaine Harrison-Neukirch Recently, I listed some items for sale on Facebook Marketplace. I received a message in Facebook...
abdelsyfane
May 16, 20222 min read
282 views
0 comments


Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers
This was originally published on February 4, 2022 on the Scythe blog page. Author Nathali Cano https://frontporchne.com/article/tanzanias...
abdelsyfane
Apr 4, 20226 min read
184 views
0 comments


NIDS: Snort - Playing Around with Snort
Author Ashlyn Matthews What is Snort Snort is an open source, signature-based Network-based Intrusion Detection System. What does that...
abdelsyfane
Mar 21, 20223 min read
298 views
0 comments


Opportunities In Cybersecurity Copywriting
Author Teresa Rothaar “How do I get into cybersecurity?” It’s a perennial question. Usually, cybersecurity pros answer it by talking...
abdelsyfane
Mar 7, 20226 min read
907 views
1 comment


Humanizing Cybersecurity Culture
Authors Shary Llanos Antonio and Adriana Jaramillo Pinzón The best way to reduce information security risks in an organization is to ...
abdelsyfane
Feb 21, 20223 min read
259 views
0 comments
bottom of page