top of page
Search


Windows Servers or Linux Servers?
When it comes to selecting an operating system for enterprise servers, the debate between Windows and Linux is as old as the hills, yet...

Chris Yarbrough
Feb 15, 20243 min read


Investigating Email Headers
Phishing attempts are more abundant than ever in today's organizational email environments. Email headers are one of many tools that...

Chris Yarbrough
Feb 14, 20242 min read


The Resume Secrets HR Doesn't Want You To Know
Crafting a resume that stands out is crucial in the competitive field of cybersecurity. Whether you're just starting, have a few years...

Chris Yarbrough
Feb 13, 20243 min read


You Need To Disable Outdated SSL/TLS Protocols RIGHT NOW
The security of web traffic is paramount for businesses of all sizes. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)...

Chris Yarbrough
Feb 2, 20243 min read


Learn These 5 Linux Tools for Offensive Cybersecurity Professionals
Linux is the operating system of choice for many cybersecurity professionals due to its flexibility, open-source nature, and powerful...

Chris Yarbrough
Feb 2, 20242 min read


Deepfake Voice Scams Will Own Your Grandma
Today, we're tackling an increasingly sophisticated cyber threat: deepfake voice scams. As voice cloning technology becomes more...

Chris Yarbrough
Feb 1, 20242 min read


Imposter Syndrome in the AI Era of Cybersecurity
Let’s address a challenge many of us face but seldom discuss openly – Imposter Syndrome. Right now, AI and rapid technological...

Chris Yarbrough
Jan 31, 20242 min read


The Definitive (Or Not So Definitive) Cybersecurity Red Teaming Certification Path
Today, we’re looking at certifications in the exciting field of red teaming. Red teaming, for those new to the term, involves simulating...

Chris Yarbrough
Jan 29, 20243 min read


How to Crush Cybersecurity Interview Questions - Part 2
Continuing from our last discussion on acing cybersecurity interviews, here are five more essential questions that you might encounter....

Chris Yarbrough
Jan 27, 20242 min read


How to Crush Cybersecurity Interview Questions - Part 1
Whether you’re a budding cybersecurity enthusiast or a seasoned professional preparing for an interview, it's crucial to be well-prepared...

Chris Yarbrough
Jan 26, 20242 min read


You Need to Know About the Largest Data Leak EVER
Welcome back, cybersecurity enthusiasts! Today, we're addressing a groundbreaking development in the digital world – the discovery of a...

Chris Yarbrough
Jan 25, 20242 min read


Do You Use Defense in Depth?
Defense in Depth is a fundamental concept in Cybersecurity. In a constantly complexifying (totally a real word) digital world, relying on...

Chris Yarbrough
Jan 24, 20242 min read


Use These Strategies for Endpoint Security or Get Hacked
With the increasing number of devices connecting to corporate networks and the rise of remote work, securing endpoints is more important...

Chris Yarbrough
Jan 22, 20242 min read


Generative AI Is a Security Nightmare, But It Doesn't Have To Be
Today, we're discussing issues of cybersecurity in generative AI, particularly in the context of Large Language Models (LLMs), which are...

Chris Yarbrough
Jan 21, 20242 min read


Hello World
Hello and welcome to my professional space on the web! I'm Chris Yarbrough, a cybersecurity specialist based in South Texas. This blog is...

Chris Yarbrough
Jan 21, 20242 min read
Cybersecurity Blog: Blog2
bottom of page