Welcome to the Inner Sphere!
I am on a journey to become a security researcher, exploring the depths of cybersecurity to uncover vulnerabilities and develop innovative solutions to protect digital environments. My mission is to contribute to a more secure digital world through continuous learning, innovation, and problem-solving. This is the first step in sharing my knowledge and experiences.
TL;DR Intro
I am a cybersecurity professional by day and a hacker by night. With a diverse skill set spanning DevSecOps, security tools, and multiple programming languages, I thrive on the challenge of safeguarding digital landscapes.
For the safest email settings, just block all emails. Then you can sleep at night knowing no-one can get phished through your email system! This post will walk through two different scenarios of email flow, and I will ramble my thoughts around things that should be done, could be done, or shouldn’t be done for each one. Hopefully, it will bring you joy and laughter instead of humdrum of technical mumbo jumbo.
This post is geared towards the business email security teams. However, if you are just wanting to learn more about email flows, securing email flows, or more than the average person on emails, come on in and read a while!
Scan me for a surprise! Learn more about QR Codes and some ways to stay safe when scanning them.
No, this isn’t swapping stories about your favorite Sim’s game. This article is talking about a cyber-attack where a bad person transfers your cellphone number to their cellphone.
That is the question! This blog will explain what multi-factor authentication (MFA) is, why it is important, and some things to pay attention to. By the end of this blog, hopefully you can make an informed decision to answer the question.
For those of you who are just starting out in your cybersecurity endeavors or looking to learn about what phishing is, you’ve come to the right place.