My Journey of Transitioning from Information Security to Information Assurance
TL;DR: Of the various paths to transition into information assurance, I took the education route by pursuing a two-year Master of Information Systems Assurance …Current Limitations of AI in Cybersecurity by ChatGPT (Part 2)
In this second part of a two-part article series—click here to read the first article—ChatGPT outlines the limitations of AI in cybersecurity. For better …Current Limitations of AI in Cybersecurity by ChatGPT (Part 1)
In my first ever interactions with Chat Generative Pre-Trained Transformer, commonly referred to as ChatGPT, I asked the chatbot some questions about the limitations …Why You Should Build a Home Lab
Home labs are integral to the growth of IT professionals. It is where we develop, get creative, destroy stuff, and we are never afraid …Domainitor: Tool to track and generate domain names expiry report
Domainitor, an easy-to-use tool, automates the generation of domain names expiry reports, which helps to keep track of the expiry of huge domain assets. …
Cyber security digest, news, stories, trends, and tips straight to your inbox