top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
abdelsyfane
Jun 5, 202311 min read
Brace for Impacket!
Detecting a Red Team (and Threat Actor) Favorite Author Micah Babinski Introduction and Objectives In this article we’ll take on the...
133 views0 comments
abdelsyfane
May 22, 20234 min read
Securing Minds, Safeguarding Data: The Intersection of Mental Health Awareness and Cybersecurity
May is Mental Health Awareness Month, a time dedicated to raising awareness about mental health and advocating for support and...
95 views1 comment
abdelsyfane
May 22, 20234 min read
The Ethics of Artificial Intelligence
Author Jonathan Gonzalez Artificial Intelligence (AI) is a rapidly evolving field of technology that has the potential to transform many...
60 views1 comment
abdelsyfane
May 15, 20233 min read
The Ransomware Control Matrix: Introducing a New Framework
Author Ed Rojas As cyber attacks continue to threaten organizations of all sizes, my colleague Aria Rahimi and I recognized the need...
103 views0 comments
abdelsyfane
May 8, 20239 min read
The Defender’s Guide to Windows Services
It’s dangerous to find malicious services alone! Take this! Authors: Luke Paine & Jonathan Johnson Introduction This is the second...
113 views0 comments
abdelsyfane
May 1, 20236 min read
Launch your Career in Cryptography
Author Emily Stamm Cryptography is a captivating and continuously evolving field that is critical in the modern world. From securing...
439 views0 comments
abdelsyfane
Apr 24, 202310 min read
Internet of Things (IoT)-Protecting Your Children
Author Marta Wang In partnership with Breezeline What is IoT? What is the Internet of things, or more commonly IoT? Look around at your...
137 views1 comment
abdelsyfane
Apr 17, 202317 min read
TryHackMe Cyber Kill Chain
Originally published November 18, 2022 on Medium Author Dan Rearden The Cyber Kill Chain framework is designed for identification and...
793 views0 comments
abdelsyfane
Apr 10, 20235 min read
Threat Hunting Series: Detection Engineering VS Threat Hunting
Author: Kostas Threat hunting is becoming mainstream, and despite the attention it receives, many people need help to differentiate it...
46 views0 comments
abdelsyfane
Apr 3, 20238 min read
What Should You Do if Your Child Is a Bully?
Originally published March 2022 on the Social Work License Map Bullying is a common occurrence in schools regardless of the ages of...
79 views0 comments
abdelsyfane
Mar 27, 20238 min read
The Defender’s Guide to the Windows Registry It’s dangerous to defend the registry alone! Take this!
Authors: Luke Paine & Jonathan Johnson Introduction Welcome to the Defender’s Guide. This is a series of blog posts designed to give you...
98 views0 comments
abdelsyfane
Mar 23, 20234 min read
3 Tips for Women Entering Cybersecurity: Show up, Stand up and Network
Author Janelle Hsia My advice for women who want to work in cybersecurity is three things: show up, stand up and network. Show Up As a...
46 views0 comments
abdelsyfane
Mar 20, 20233 min read
The Evil Twin – The Cost of Free Wi-FiÂ
Originally published on Medium on July 15, 2022 Author Harriet Kerubo Growing up, I enjoyed watching Cartoon Network, more so, The Cramp...
83 views0 comments
abdelsyfane
Mar 16, 20234 min read
Hacking Stereotypes
Author Kathy Collins As a woman in cybersecurity, I have experienced some challenges, but I have also had incredible opportunities to...
42 views0 comments
abdelsyfane
Mar 13, 20238 min read
Dark Web 101
Author Kathryn Carnell In partnership with Breezeline We know less about the deep ocean than space, according to the National Oceanic and...
188 views0 comments
abdelsyfane
Mar 8, 20235 min read
My (Trace)route to Cybersecurity
Author Candace Moix Hello CSNP readers! My name is Candace Moix and I volunteer as one of the Directors of the CyberSafety Initiative. My...
79 views0 comments
abdelsyfane
Mar 6, 20236 min read
Personal IoT Security: How users can ensure they stay safe in the digital environment Image result
Author: Al Hanson Electronics are progressively integrating into our lives. These consumer devices that make our lives more streamlined...
58 views1 comment
abdelsyfane
Mar 2, 20239 min read
Making the Jump into Penetration Testing from a Non Cyber Job
Author Dorota Kozlowska The End: I am a true Wonder Woman. Finally becoming a Penetration Tester. I am a Winner. What have I won? My own...
188 views0 comments
abdelsyfane
Feb 27, 20234 min read
Prevent Email Spoofing with SPF, DKIM and DMARC
Author Fred Luo Email spoofing is one of the common techniques used by phishing attacks. By using different techniques, attackers trick...
37 views0 comments
abdelsyfane
Feb 23, 20234 min read
Steps to Making Progress
Author Charles Karanja I am grateful for the opportunity to tell my story as the USA celebrates Black History Month. It is easy to switch...
64 views0 comments
bottom of page