Published inDark Roast SecurityApplying Attention Restoration Theory to Your Digital WorkspaceIt’s no secret that working remotely can sometimes feel like trying to be productive in the midst of a bustling coffee shop, where every…Apr 16Apr 16
Published inDark Roast SecurityAuthentication and Authorization: Where Does SSO Fit In?Secure environments follow a set of steps to separate the users who have access to network resources from those who do not. Identification…Oct 17, 2022Oct 17, 2022
Published inDark Roast SecurityThreat Modeling — The Short VersionThreat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization…Jan 28, 20225Jan 28, 20225
Published inDark Roast SecurityContinue to Capture…The Skills?Capture the flag with TryHackMe and HackTheBoxFeb 28, 20211Feb 28, 20211
Published inDark Roast SecurityPreparing for a TraceLabs OSINT CTFAre you a first time contestant?Feb 25, 2021Feb 25, 2021
Published inDark Roast SecurityPowerful, Flexible, Easy, Free: NmapPort scanning, ping sweeps, OS detection, version detection…Feb 17, 2021Feb 17, 2021
Published inDark Roast SecurityPreparing for CompTIA Security+ Certification ExamIt worked for me, it might work for you too.Aug 4, 2020Aug 4, 2020
Published inDark Roast SecurityOSINT for Good: Trace Labs Missing Person CTFAn Experience worth repeating!Apr 16, 2020Apr 16, 2020