Skip to content
The CISO Perspective

The CISO Perspective

Menu
  • Home
  • About
  • TCP on YouTube
  • Contact

Author: Andy H

Posted onFebruary 14, 2022February 21, 2022Careers

Becoming A Product Manager for Engineers

by Andy HLeave a comment on Becoming A Product Manager for Engineers

According to Glassdoor, Product Management was one of the fastest-growing and highest-paying jobs in not just tech but any profession for 2021. Any company that sells…

Read More
Posted onFebruary 5, 2022February 21, 2022Exploits

Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

by Andy HLeave a comment on Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

How Exploits Work In cybersecurity, the term “exploit” is used to represent a piece of code, data or sequence of commands that takes advantage of…

Read More
Posted onJanuary 13, 2022February 21, 2022Security Concepts

Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

by Andy HLeave a comment on Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in…

Read More
Posted onDecember 15, 2021February 21, 2022Security Technologies

What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained

by Andy HLeave a comment on What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained

What is AIOPs? Artificial Intelligence for IT Operations, or AIOps, is a term coined by Gartner to describe a class of technology that utilizes machine…

Read More
Posted onNovember 13, 2021February 21, 2022News

T-Mobile Data Breach: Timeline, Analysis and Lessons Learned

by Andy HLeave a comment on T-Mobile Data Breach: Timeline, Analysis and Lessons Learned

T-Mobile Data Breach On Monday, August 16, T-Mobile issued a public statement stating that unauthorized access to some of their user data had occurred. In…

Read More
Posted onOctober 13, 2021February 21, 2022Endpoint

What is XDR vs EDR vs MDR? Extended Detection and Response Explained

by Andy HLeave a comment on What is XDR vs EDR vs MDR? Extended Detection and Response Explained

EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network…

Read More
Posted onSeptember 13, 2021February 21, 2022Security Technologies

What is Machine Learning ? A.I., Models, Algorithm and Learning Explained

by Andy HLeave a comment on What is Machine Learning ? A.I., Models, Algorithm and Learning Explained

What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine…

Read More
Posted onAugust 18, 2021February 21, 2022Security Concepts

What is Open-Source Intelligence (OSINT)?  

by Andy HLeave a comment on What is Open-Source Intelligence (OSINT)?  

What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in…

Read More
Posted onJuly 21, 2021February 21, 2022Security Concepts

Active Reconnaissance: Overview, Methodology and Tools

by Andy HLeave a comment on Active Reconnaissance: Overview, Methodology and Tools

Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…

Read More
Posted onJune 4, 2021February 21, 2022Security Technologies

What Is SASE? Secure Access Service Edge Explained

by Andy HLeave a comment on What Is SASE? Secure Access Service Edge Explained

Secure Access Service Edge, or SASE, is a term coined by Gartner that combines multiple network and security technologies into a single offering. The goal…

Read More

Posts navigation

Page 1 Page 2 Page 3 Next Page

Recent Posts

  • ChatGPT for Offensive Security: Five Attacks
  • Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain
  • What is Secure Service Edge? SSE vs SASE vs VPNs
  • What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
  • Becoming A Product Manager for Engineers

Archives

  • February 2023
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020

Categories

  • Careers
  • Endpoint
  • Endpoint Protection
  • Exploits
  • Firewall
  • General
  • News
  • Security Concepts
  • Security Strategy
  • Security Technologies
  • Sizing
  • Uncategorized
RSS Error: WP HTTP Error: A valid URL was not provided.

The CISO Perspective

TCP was created as a free resource for security news, knowledge and training.
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress