Tag: achubbard
Making A Career Change From Support and Operations to Cybersecurity
- By Alexander C. Hubbard in Career Advice, Security, System Administration Tasks
-
June 30, 2022
- 1 min to read
- Leave comment
Enable SSH on Unifi and Unifi Dream Machine Pro
- By Alexander C. Hubbard in Homelab, Networking, System Administration Tasks, Ubiquiti
-
February 14, 2021
- 5 mins to read
- 1 comment
Site Search

What are some common frameworks that I see as a vCISO with my clients?
#ciso #vciso #nist #cybersecurity #frameworks #cmmc #pcidss
1 week ago
What are cybersecurity frameworks?
#vciso #ciso #cybersecurity #infosec #nist
1 week ago
PART 11 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago
PART 10 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago
PART 9a of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago
PART 9 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago
PART 8 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago
PART 7 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago
PART 6 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
4 months ago