Zoning Out: An Introduction to DNS Zone Transfers

Estimated difficulty:  πŸ’œπŸ’œπŸ€πŸ€πŸ€ DNS (Domain Name System) zone transfers are used to help replicate databases across different domain servers, allowing administrators to modify or edit records easily by implementing the changes on one server and copying the changes to the others. Zone transfers are completed using the AXFR protocol, and Continue Reading

Risky Business: A Down-Low on Risk Management Basics

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€ First thing’s first! Let’s talk definitions. So, what actually is risk management? To put it simply, it is the management of the risk within an organisation (doh!). The risk management process involves identifying security risks and creating and implementing plans to mitigate them. Defining Risk Risk is Continue Reading

I Spy With My Little Eye: A Guide to Social Media OpSec

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€ Happy Friday and happy (continued) cybersecurity awareness month! For those of you that don’t know, October is renowned for being cybersecurity awareness month – a month dedicated by security professionals to raise awareness in cybersecurity, specifically to the everyday user of technology that may not be security-savvy. Continue Reading