Recent Blog
-
Threat Modeling 101: Reducing Your Cybersecurity Risk
As major data breaches and intricate cyberattacks continue to make headlines, organizations are drawn to investing in the latest cybersecurity solutions. However, merely spending money on the issue doesn’t resolve the underlying problem. The key to understanding why cybercriminals are succeeding lies in threat modeling, which involves adopting a hacker’s perspective to better protect your […]
-
Breaking Barriers and Inspiring the Next Generation of Women in Tech
This past weekend, I had the incredible opportunity to volunteer at the Michigan Council of Women in Technology Foundation (MCWT) Girls High School Cyber Challenge at the University of Michigan-Dearborn. This event was an eye-opening experience and a testament to the power of encouragement, support, and the potential of young women in the technology industry. […]
-
How to get the Exact Date of a LinkedIn Post Using OSINT Techniques
LinkedIn has grown into one of the most popular professional networking platforms, with millions of users posting updates and sharing content daily. For cybersecurity professionals, LinkedIn can be a valuable source of information for Open Source Intelligence (OSINT) and penetration testing. But unfortunately there is a common challenge faced by OSINT investigators and cybersecurity professionals […]