Browsing category

Uncategorized

6 Common Threats To Wireless Networks

   In my previous articles, I have talked about all that you need to know about Home Networks. In this article, I want to look at all that you need to know about Common Threats to Wireless networks. Follow me as we are going to look at that together in […]

How To Use Windows Easy Transfer

In my previous article, I have talked about some of the facts that you need to know about computer network security generally. In this article, I want to throw more light on how to fo Window Easy Transfer on Windows Operating System. Follow me as we will look at that […]

10 Types Of Network Security Threats

When it comes to the process of connecting two or more computers together, there are some risks that are associated with it which you have to be aware of. I want to talk about ten different types of such risks in this article. Follow me as we are going to […]

Understanding Access Control List In Cybersecurity

  Many technologies and protocols can have impacts on I’m monitoring. Access Control Lists (ACLs) are among these technologies. ACLs can give a false sense of security if they are overly relied upon. ACLs, and packet filtering in general, are technologies that contribute to an evolving set of network security […]

End Device Logs In Cybersecurity: The Various Types

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what […]

Network Logs In Cybersecurity: Facts To Note

Network Logs In Cybersecurity: Facts To Note   The tcpdump command-line tool is a very popular packet analyzer. It can display packet captures in real-time or write packet captures to a file. It captures detailed packet protocol and content data. Wireshark is a GUI built on tcpdump functionality. The structure […]

The Need For Alert Evaluation In Cybersecurity

The Need For Alert Evaluation In Cybersecurity   The threat landscape is constantly changing as new vulnerabilities are discovered and new threats evolve. As a user and organizational needs change, so also does the attack surface. Threat actors have learned how to quickly vary the features of their exploits in […]

Ways Using Sguil In Investigating Network Data

  The primary duty of a cybersecurity analyst is the verification of security alerts. Depending on the organization, the tools used to do this will vary. For example, a ticketing system may be used to manage task assignments and documentation. In this article, I am going to talk about ways […]

13 Ways To Avoid Cyber Security Threats

In my previous article, I have discussed some of the facts that you need to know about phishing and Business Email Compromise generally.   In this article, I want to look at some of the facts that you need to put into consideration in order to avoid cyber security threats. […]

All You Need To Know About Wi-fi Technologies

Wifi is the technology for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices without using cables.   One major problem with Wi-fi is that anyone listening can actually discover what is being communicated. […]

Facts About Endpoint Security Architecture

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other devices connected to a network.   Endpoints need to be secured because they are easy to point of entry into […]