Sitemap - 2023 - Danny's Newsletter

Cert Chasing: Good or Bad?

How you can Elevate Phishing Analysis with Automation

The Umbrella of Cybersecurity

My 2023 Wrapped

The Okta Breach: Part ll

Invite your friends to read Danny's Newsletter

The Utility of Linux

Cybersecurity Interview Series: Technical Round

Cybersecurity Interview Series: Scenarios

Cybersecurity Interview Series

SEC Cybersecurity Disclosure: An Era of Transparency and Accountability

Nmap: The Swiss Army Knife of Network Scanning and Its Role in Cybersecurity

The Okta Breach: Deep Dive into the Incident, and Its Implications

Free Cybersecurity Resources

Sigma: The Security Community's Tool

The Evolving Landscape of EDR: A Closer Look

Yara: A Deep Dive

SIEM: A Deep Dive into SIEM Platforms

How to Launch Your Career in Cybersecurity

Regex: A Deep Dive

Learning Linux: Free Course Reminder

Cybersecurity: Dive Deep into the Tools of the Trade

Deep Learning Acoustic Attacks: Can AI Hear Your Keystrokes?

Decoding Deception: How to Spot Scammy Cybersecurity Accounts and Fake Influencers

From Security Incident to a Cyber Security Career

PyLoose: First Python-Based Fileless Attack in the Wild

The Importance of Linux

Cybersecurity Career Paths: Compliance

Cybersecurity Career Paths: Threat Intelligence & Threat Hunting

Sharing Your Voice: A Journey to Cybersecurity on the Our Voices Podcast

Cybersecurity Career Paths: Detection & Response and Incident Response

Cybersecurity Career Paths: Application Security

Amidst the Noise: Understanding the Nuances of Detections in Cybersecurity

Cybersecurity Career Paths: A Deep Dive into Blue Team Roles

Knowing Your Why

Detection Engineering vs Threat Hunting

Detection Engineering

Intro To Linux Course (Free)

Passkeys and What They Mean For Users

An Overview of Cloud Certifications: AWS, Azure, and GCP

Cloud Providers And How They Have Shaped Security

RSAC x BSides Preview

Pushing Internal Data To Repo - An Anecdote

Free Cybersecurity Resources

How to Choose Your Cybersecurity Path

An Overview of the Umbrella that is Cybersecurity

Cybersecurity Interview Series: Technical Interviews

Cybersecurity Interview Series: Scenarios

Threat vs Vulnerability vs Risk

Cybersecurity Interview Series

Avoid Becoming the Next Breach Victim

3 Ways to Stay Current in Cybersecurity

3 Ways to get Hands-On Experience for getting into Cybersecurity

Get in: How to Launch Your Career in Cybersecurity

Why You Need To Learn Linux

Danny's newsletter - Issue #35 - Linux CLI: Use Cases

Danny's newsletter Issue #34 - Linux Command Line

Danny's newsletter - Issue #33