I am an information security specialist with over 12 +years of experience, the last three of which I have served as Chief Information Security Officer at Funding Societies and Zai.
Anyone can learn to Threat Model. Threat Modelling is as fundamental as version control.
Threat Modelling helps you look at the big picture. You can threat model almost anything from a piece of software to a business and all the way to a country's economy.
This imbalance is evident in the widespread presence of Chief Technology Officers (CTOs), while roles dedicated to Knowledge Management are conspicuously absent.
Project 2: 🤯 Cyber, (Mis)adventures.
Read more about this project here.
If there is one thing you need to remember about April 2023, then it's
3CX Double Supply Chain Compromise
It's important because this double supply chain is the first ever to be seen.
The double
Captain "Sully" and his crew managed to save the lives of all 155 passengers on board US Airways Flight 1549, making an emergency landing on the Hudson River.
Writing to think, writing to express, writing to uncover, and writing to heal is something no human or AI can take away from you. Only you can take that ability away from yourself.
Introduction
The CCSP certification is one of the most sought-after certifications for IT professionals.
It is a globally recognized credential that validates an individual's knowledge and skills in cloud security.
The certification is offered by (ISC)², a leading non-profit organization in the information security industry. This comprehensive guide
5 min read
Subscribe to Ishan Girdhar newsletter and stay updated.
Don't miss anything. Get all the latest posts delivered straight to your inbox. It's free!