My Journey of Transitioning from Information Security to Information Assurance

TL;DR: Of the various paths to transition into information assurance, I took the education route by pursuing a two-year Master of Information Systems Assurance …

Current Limitations of AI in Cybersecurity by ChatGPT (Part 2)

In this second part of a two-part article series—click here to read the first article—ChatGPT outlines the limitations of AI in cybersecurity. For better …

Current Limitations of AI in Cybersecurity by ChatGPT (Part 1)

In my first ever interactions with Chat Generative Pre-Trained Transformer, commonly referred to as ChatGPT, I asked the chatbot some questions about the limitations …

Why You Should Build a Home Lab

Home labs are integral to the growth of IT professionals. It is where we develop, get creative, destroy stuff, and we are never afraid …

Domainitor: Tool to track and generate domain names expiry report

Domainitor, an easy-to-use tool, automates the generation of domain names expiry reports, which helps to keep track of the expiry of huge domain assets. …
Cyber security digest, news, stories, trends, and tips straight to your inbox