Error 404

Looks like something went completely wrong. The page you are looking for cannot be found. Don't worry, just go back or browse my latest courses and articles below.

Latest Courses

Latest Articles

Cyber Security Dashboard: Phishing

Introduction In today’s digital landscape, phishing emails remain one of the most pervasive cybersecurity threats. These deceptive messages trick users into revealing...

Auditing Endpoint Security and Building a Cybersecurity Dashboard for Data-Driven Decisions

In my previous article, I discussed the importance of auditing your environment as the foundation for understanding and mitigating cybersecurity risks....

NIST Cybersecurity Framework: Recover Function – Restoring Operations After a Cyber Incident

In today’s ever-evolving cyber threat landscape, organizations must not only focus on preventing and responding to cyber incidents but also on...

NIST Cybersecurity Framework: Respond

In today's evolving cyber threat landscape, organizations must be prepared to swiftly and effectively respond to security incidents. The "Respond" function...

NIST Framework: Detect – Identifying Cyber Threats Before They Escalate

In today’s rapidly evolving cybersecurity landscape, the ability to detect cyber threats before they cause significant damage is crucial for any...

NIST Cybersecurity Framework: How the Protection Pillar Strengthens Security

In today’s digital landscape, cybersecurity is a top priority for businesses of all sizes. One of the most effective ways to...