$554M of Debt Makes You a Security Risk

Imagine you’re applying for a job that requires access to sensitive, classified information. One of the first things you’ll go through is an extensive background check, including a thorough review of your financial history. This is because financial instability can make someone a target for blackmail or manipulation, which is a major security concern. So, if a regular person applied for a security clearance while owing $554 million, like former President Donald Trump reportedly does, they'd be immediately flagged as a security risk and denied clearance.

Carrying that level of debt is more than just a personal financial problem—it’s a potential national security crisis. People in deep financial trouble can be desperate, which makes them more susceptible to outside influence. If foreign adversaries, powerful corporations, or corrupt actors know someone is financially compromised, they can exploit that vulnerability. This is why security clearances involve rigorous financial scrutiny.

Read More...

security (1)

I Passed the CISSP Exam

Today, I finally conquered the CISSP exam—a milestone I’ve been working toward recently. It’s been a long journey filled with lots of late-night study, some anxiety near the end, and a whole lot of coffee along the way.

Waking up this morning, I felt “typical” exam day jitters, amplified by the significance of what was at stake. The CISSP certification isn’t just any exam; it’s a test of not only knowledge but also a bit of mental endurance with picking the “best” answer. After months of preparation, the moment was here. I arrived at the testing center thirty minutes earlier than the recommended thirty minutes, went in and went through their security checks, and found myself seated in front of the computer, ready to go.

Read More...

cybersecurity (4) cissp (1)

The Pentester Blueprint

“The Pentester Blueprint” is a great guide for anyone interested in pursuing a career in penetration testing or cybersecurity. The book, co-authored by Kim Crawley and Phillip L. Wylie, provides a comprehensive overview of the field, from foundational knowledge and skills to the various paths one can take to become a successful pentester.

The book starts by introducing the basics of penetration testing, including the roles and responsibilities of a pentester, the skills required, and the tools commonly used in the field. As the book progresses, it delves into stories of actual penetration testers. They offer insights into their own diverse paths they took to enter the field. The authors have provided us with a collection of real-life professionals who have successfully transitioned into penetration testing from various other backgrounds. These stories are not just inspirational but also practical, offering advice and strategies that readers can apply to their own career journeys.

Read More...

cybersecurity (4) pentester (1)

Raku: Why It Hasn't Caught On

In the vast realm of modern programming languages, some rise to prominence while others remain forever in the shadows. Raku, initially named Perl 6, is one such language that, despite its powerful features, has failed to gather a developer base large enough to cause the language to become mainstream. Here's my take on why Raku has failed to catch on, based on personal experience, observation, and lots of waiting.

Read More...

raku (17)

Do Not "Switch To Linux"

Using Linux for your first time can be very exciting. You suddenly gain access to a wealth of customization options, all the free and open-source software you could ever want or need, and access to a strong community of (sometimes overly-)enthusiastic Linux users. But before you dive headfirst into this new world, there's an important consideration I'd like to advise you on. It boils down to this: don't "switch to Linux" on your one and only computer. Don't dual-boot it and don't bother with getting a second hard drive. In essence, do not touch your current working computer, no matter what operating system it's running. Leave it fully operational and invest in a cheap second computer instead. You can thank me later!

Read More...

linux (10)

Subsequent Data Breaches

The perspective that once personal identifiable information (PII) or personal health information (PHI) has been leaked, subsequent leaks are less significant is a common one. However, there are several reasons why each new data breach remains a significant concern, regardless of past breaches. So why does each individual data breach matter?

Not every breach exposes the same set of information. One breach may leak your email address and password, while another may reveal your social security number, medical records, or financial details. Each new breach potentially adds more pieces to the puzzle of your identity, increasing the risk of identity theft or fraud.

Read More...

cybersecurity (4)

Note Taking Applications

As I delve deeper into the field of cybersecurity and penetration testing I’ve discovered that if you search Google or Youtube for “penetration testing note-taking applications” you’ll see there are a surprising number of opinions out there on which application is best. I agree with them, that a reliable note-taking app is indispensable for this sort of work, and so I’ve been on a quest to find which application actually works best for me.

Read More...

notes (1)

Why Use Strong Passwords?

During my penetration testing studies I’ve come to realize the need for strong passwords is now more important than ever. I only realized recently just how easy it is to crack a weak password.

Let me show you how easy it is to brute-force (guess) a weak password!

Read More...

cybersecurity (4)