Danny's Newsletter
Subscribe
Sign in
Home
Course
Archive
About
Latest
Top
Discussions
Linux: The OS of Cybersecurity
The Linux operating system is more than just an OS. It’s an adaptable and versatile swiss army knife that offers a variety of utilities and tools…
May 17
•
Danny
Share this post
Linux: The OS of Cybersecurity
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Threat Model: SIM Swapping
Previously we discussed Vulnerabilities, Threats, and Risk and how they all tie in together. In this post, we’ll talk about a real world scenario and…
May 9
•
Danny
1
Share this post
Threat Model: SIM Swapping
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Thinking In The Long Term
When it comes to working to get into tech and Cybersecurity, you are faced with a plethora of new subjects. When just starting out on the journey to…
May 2
•
Danny
1
Share this post
Thinking In The Long Term
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
April 2024
Embrace Your Autodidact
Why is staying current so important when it comes to Cybersecurity? Simply put, it enables you to be better equipped to handle new and emerging threats…
Apr 25
•
Danny
1
Share this post
Embrace Your Autodidact
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Free Resources
A good friend once said “If it’s free, take three". I think there’s a lot of truth to that. There is a collection of Cybersecurity knowledge out there…
Apr 19
•
Danny
1
Share this post
Free Resources
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Cybersecurity Career Paths: Compliance & GRC
One pathway within Cybersecurity that holds immense potential for growth is the realm of Compliance and Governance, Risk, and Compliance (GRC). What…
Apr 11
•
Danny
1
Share this post
Cybersecurity Career Paths: Compliance & GRC
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Cybersecurity Career Paths: AppSec
Application Security
Apr 4
•
Danny
1
Share this post
Cybersecurity Career Paths: AppSec
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
March 2024
Cybersecurity Career Paths: Threat Hunting
Previously we talked about Detection & Response and what the job entails. In this issue of the series, we’ll dive into another role within the Blue Team…
Mar 28
•
Danny
1
Share this post
Cybersecurity Career Paths: Threat Hunting
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Vulnerability vs Threat vs Risk Re-visited
How do we differentiate Vulnerabilities, Threats, and Risk in Cybersecurity? The importance and the difference in Vulnerabilities, Threats, and Risk can…
Mar 21
•
Danny
1
Share this post
Vulnerability vs Threat vs Risk Re-visited
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Cybersecurity Career Paths: Detection and Response
Detection and Response & Incident and Response
Mar 15
•
Danny
1
Share this post
Cybersecurity Career Paths: Detection and Response
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Free Linux Course
I have previously talked about the areas that are important when it comes to learning about Security. Although there are several, here’s a few that…
Mar 7
•
Danny
1
Share this post
Free Linux Course
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
February 2024
Detection Engineering or Threat Hunting?
In a recent post I wrote about Detection Engineering, and what it entails for a practitioner. At times, Detection Engineering and Threat Hunting can be…
Feb 29
•
Danny
2
Share this post
Detection Engineering or Threat Hunting?
zendannyy.substack.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts