What is Credential Stuffing and Why Should I Care?
You should know by now that using common passwords is a bad idea. And you may have heard of recent password breaches and that you should change passwords on breached sites. But there is an additional threat: credential stuffing. Whenever there is a breach where usernames or email addresses are disclosed and can be matched […]
Does Agile Transform a Business?
We’ll talk about the above, rarely asked question in a minute. But first let us talk about your day so far, perhaps it’s gone something like this; After your commute to work, you’ve arrived at the office, opened your laptop and then sat back gazing out the window dreaming of the upcoming weekend. Let’s analyse […]
Randomly Sampling Rows in R
It’s impossible to imagine a data scientist who does not have to randomly sample datasets on a regular basis. Most employ the useful and easy function sample( ), defined in R’s base namespace. Let’s take a closer look at sample( ) and then take a look at a flexible alternative that is just as easy […]
The CCSP Cloud Security Certification is Hot, How Can I Prepare?
The (ISC)2 CCSP is hot. That’s the Certified Cloud Security Professional. It’s from the same group that offers the famous CISSP. At the end of 2018 there were 131,180 people with CISSP world-wide, and 84,557 in the U.S.A. But, only 4,518 people world-wide held CCSP. Do you want to be one of the new ones? Not What […]
A Cyber Security Income Opportunity: Freelance Bug Finder
I recently wrote about the Cyber Security Staffing Shortage, and how it meant good things for those interested in careers in cyber security. Here is another – potentially quite lucrative – opportunity: bounty hunter. I’m not talking about the bounty hunters you see in movies or television shows, though. I’m talking about bug finders. You […]