top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Threat Hunting Metrics: The Good, The Bad and The Ugly
Author Kosta Threat hunting is a crucial aspect of information security, but measuring its effectiveness can be challenging. In this...
abdelsyfane
Oct 16, 20235 min read
256 views
0 comments

Navigating Cybersecurity: A Unique Journey
Author Jennifer Smith My voyage into cybersecurity defied convention, taking me down an unexpected and meandering path that has shaped...
abdelsyfane
Oct 9, 20233 min read
86 views
0 comments


Connecting WOMEN In Cybersecurity and Information Technology (IT)
Author: voldimmoral A Place For Women To Connect With Other Women Around The World 💃 Are you a woman? Are you a student, curious mind,...
abdelsyfane
Oct 3, 20233 min read
82 views
0 comments


Let’s build a Cloud Network- 01: VPC and Subnets
Author Jinali Pabasara Welcome to this article series, where we’ll embark on an exciting journey through fundamental networking...
abdelsyfane
Sep 25, 20236 min read
92 views
0 comments

Navigating Cybersecurity: A Unique Journey
Author Jennifer Smith My voyage into cybersecurity defied convention, taking me down an unexpected and meandering path that has shaped my...
abdelsyfane
Sep 24, 20233 min read
48 views
0 comments


Media Literacy: Defending Against Disinformation in Elections and Conspiracy Theories
Introduction In today's digital age, where information is readily accessible at our fingertips, disinformation and conspiracy theories...
abdelsyfane
Sep 18, 20233 min read
50 views
0 comments


Enhancing Africa's Cybersecurity Landscape: Insights from the July 2023 African Union Digital Gov
Author Emily Stamm Africa is experiencing tremendous technological progress, with internet penetration increasing and smart cities...
abdelsyfane
Sep 11, 20234 min read
172 views
0 comments


Navigating the Landscape of Smart Devices: Privacy, Security, and Connectivity Introduction
Author Jennifer Smith In the ever-evolving landscape of technology, the rise of intelligent devices has transformed how we interact with...
abdelsyfane
Sep 5, 20233 min read
68 views
0 comments
Elevating Small Business Cybersecurity: Proven Measures to Safeguard Your Team and Customers
In today's rapidly evolving digital landscape, the paramount significance of cybersecurity cannot be overstated, particularly for small...
abdelsyfane
Aug 28, 20234 min read
29 views
0 comments


Cybersecurity Education is Year-Round
It's that time of year when fresh-faced students head back to the classroom after a summer off. Here at CSNP, we know that...
abdelsyfane
Aug 21, 20235 min read
100 views
0 comments


InfoSec Community Outreach Tips — Part 1: Public Libraries
Author: Tracy Z Maleef Originally published on Medium. Congratulations! You’ve decided to reach beyond your comfort zone and give a ...
abdelsyfane
Aug 14, 20236 min read
148 views
0 comments

Amateur Insights: The Road to Cyber
Author Catarina Pottle As a recent graduate from a community college with an Associate of Applied Science in Cybersecurity, I have...
abdelsyfane
Aug 7, 20235 min read
56 views
0 comments


Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT
Author Alex Pack Introduction Geolocation, a subset of Geospatial Intelligence (GEOINT), is a fascinating field for Open-Source...
abdelsyfane
Jul 31, 20237 min read
864 views
0 comments


CSNP July Newsletter
Summer Safety Takes More Than Sunscreen As the sun shines brighter and the days are long, we want to ensure your online experiences...
abdelsyfane
Jul 24, 20234 min read
18 views
0 comments

Disability Pride Month
July is Disability Pride Month to commemorate the 1990 Americans with Disability Act, which protects people with disabilities from...
abdelsyfane
Jul 17, 20232 min read
26 views
0 comments


EDR Telemetry Project: A Comprehensive Comparison
Author Kostas Endpoint Detection and Response (EDR) products have become essential to organizations’ cybersecurity strategies. As a...
abdelsyfane
Jul 10, 20235 min read
119 views
0 comments


Build a Threat Hunting Lab. Installing and Configuring Elasticsearch and Kibana
Authors: Laiali Kazalbach and Mohamed Elsayed Technical requirements VMware Workstation with at least 6 GB of RAM, 6 CPU cores, and a 70...
abdelsyfane
Jul 4, 20233 min read
123 views
0 comments


Pride Month, Computing Pioneer Turing, and CSNP's Commitment to Growing Diversity in Cybersecurity
CSNP's June Newsletter Pride Month, Computing Pioneer Turing, and CSNP's Commitment to Growing Diversity in Cybersecurity Celebrating ...
abdelsyfane
Jun 26, 20235 min read
17 views
0 comments


How to Use the Ransomware Control Matrix: A Step-by-Step Guide
Author Ed Rojas In the previous blog, The Ransomware Control Matrix: Introducing a New Framework, we provided a history of how and why...
abdelsyfane
Jun 19, 20238 min read
142 views
0 comments


Leveraging ChatGPT for Resume Optimization and CV Writing: A Comprehensive Guide
Author Nathali Cano Introduction: In today's competitive job market, crafting an outstanding resume or curriculum vitae (CV) is essential...
abdelsyfane
Jun 12, 20233 min read
59 views
0 comments
bottom of page