With experience working in information security, including almost two decades of investigative cyber security experience, I’ve excelled at triaging, investigating and securing high-tech systems emerging cyber threats.
Unfortunately there will always be a weak point. That point will change and cycle around, NMP, social engineering, RCE, etc.. As practitioners we should strive to continuously improve security, but need to realize it will never be perfect. Security is a journey not a destination.
July 23, 2025 at 4:07 PM
Unfortunately there will always be a weak point. That point will change and cycle around, NMP, social engineering, RCE, etc.. As practitioners we should strive to continuously improve security, but need to realize it will never be perfect. Security is a journey not a destination.
A username, which is often a person's email address, is essentially half of the key to entry into an account. Although strong passwords are important, the use of 2FA and even alternate app specific email addresses can add a layer of protection and identity who sold your account details.
June 25, 2025 at 10:24 AM
A username, which is often a person's email address, is essentially half of the key to entry into an account. Although strong passwords are important, the use of 2FA and even alternate app specific email addresses can add a layer of protection and identity who sold your account details.