Moving Away From Castle
The classic Castle-and-Moat Network Security Model is on its way to becoming history. What’s the new model? Click on the sketch to read the story.
Cybersecurity | Filmmaking | Perspective
The classic Castle-and-Moat Network Security Model is on its way to becoming history. What’s the new model? Click on the sketch to read the story.
Understand the fundamental difference between IT security’s two principles. Click on the sketch to read the story.
He better decrypts the message and follows the action to avoid the catastrophe.
Understand the three-way TCP handshake process with a movie night proposal and how the SYN Flood attack spoils the plan.
A Cybersecurity’s artistic impression on Will Smith slapping Chris Rock at Oscar Academy Award 2022.
Are teens the mastermind of cybercriminal group “Lapsus$”. Too early, but here are some interesting findings so far. Click on the sketch to read the story.
Cyber gang Lapsus$ breached 190 GB of Samsung Galaxy source code and leaked via Torrent. Is it just the beginning of a new data extortion crime? Click on the sketch to read the story.
Frank Abagnale’s two mice story elevated minimalism within me to redefine who I am. Click on the sketch to read the story.
Part 3 on how to prevent SQL Injection attacks using input validation technique. Click on the sketch to read the story.
Imagine you say to your kid “EAT ICE-CREAM” all the time instead of saying “NOT EVERYDAY”. Click on the sketch to read the story to learn examples of how SQL injection works in reality. Click on the sketch to read the story.