The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1
17 January 2025
An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version 4.0 Now Mandatory,” as if it were a portent of ruin. Usain stared at it, knowing that “update” and “mandatory” were two terms that would lead to no good in...
An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet
4 January 2025
Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of cybersecurity. Try juggling three enormous certifications—CISM, CRISC, and CISA—and you thought killing dragons or reading the Rosetta Stone were difficult. Get ready for a ride filled with terror, bewilderment, and,...
When a CrowdStrike Update Went Rogue: A Cybersecurity Fiasco and Lessons Learned
30 October 2024
In the ever-dramatic world of cybersecurity, where threats lurk in every digital shadow, CrowdStrike managed to throw a plot twist that even Hollywood would envy. On July 19, 2024, a seemingly routine update spiraled into chaos, crashing millions of Windows hosts worldwide. Grab your popcorn as we dissect this saga,...
The UniSuper-Cloudocalypse: The Day Google Deleted Everything and Redesigned Risk Management
17 August 2024
Pretend for a second that you are a superannuation fund, the custodian of the retirement funds of countless Australians. Everything is going swimmingly, your private cloud is running smoothly on Google’s gleaming infrastructure, and then something goes wrong. Google erases your private cloud by mistake, which is a huge gaffe....
GRC: The Most Boring Field in Cybersecurity
17 June 2024
SARCASM WARNING! What comes to your mind when you think about cybersecurity? High-stakes battles against shadowy hackers? On-the-edge episodes of staving off a real-time data breach? Maybe even the glamour of outsmarting the bad boys armed with their advanced tools and techniques? Get ready for this one, as all those...
The Risks of Blindly Embracing AI in Enterprises
2 June 2024
Artificial Intelligence (AI) has become identified with innovation and progress in the current technological landscape. Many enterprise organizations rush to integrate the technology into their operations simply to help them be categorized among “edge technology adapters.” This enthusiasm usually overlooks the myriad of risks associated with adoption. This article comprehensively...
Nmap for us! The Noobs: The Complete Idiot’s Guide to Scanning Networks
2 December 2023
Well hello there my felonious friends! Are you ready to unlock your inner criminal mastermind? Then gather ’round, because I’m going to learn you real good how to use the “so-called” professional hacking tool Nmap. What’s that you say? You’ve never heard of Nmap before? Wow, you must be one...
PCI-DSS, ISO, NIST, CIS: Understanding and Implementing Security Standards
25 May 2022
Are you confused about the various security standards floating around the cybersecurity industry? You’ve probably encountered acronyms like PCI-DSS, ISO, NIST, and CIS, but what do they all mean? In this blog post, we will delve into these security standards, their significance, and how they can help protect your organization’s...
Red Team V/S Blue Team in Cyber Security
2 April 2022
In the field of cybersecurity, there are two primary types of teams: the Red Team and the Blue Team. These teams play crucial roles in identifying vulnerabilities, defending against attacks, and ensuring the overall security of an organization’s digital infrastructure. In this blog post, we’ll delve into the definitions, responsibilities,...
Sliding into Cybersecurity
2 February 2022
Let’s be honest, it can sometimes feel like you’re trying to break into Fort Knox with a toothpick. But fret not, my fellow digital adventurers! In this post, I’ll sprinkle in a generous dose ideas to help you conquer the challenges of starting a career in cyber security. So grab...