INFOSEC The CIA Triad The CIA Triad may sound like an unholy alliance of the CIA and Chinese gangsters, but is actually good practice.
INFOSEC Security Should Start with the Involvement of Top Management Security researcher Alesanco explains why top management in an organization plays an important role in security, and how an organization can secure its assets by assessing risks and having a Business Continuity Plan (BCP) in place... and much much more.
INFOSEC Against Child Pornography Child pornography awareness is crucial to society and hardly spoken about. Alesanco stands against child exploitation and shares important methods on how we can protect children from the dangerous threats of real life monsters.
INFOSEC Secjuice Squeeze 63 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Secjuice Squeeze 59 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
Secjuice Squeeze 58 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Secjuice Squeeze 57 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
INFOSEC Secjuice Squeeze 56 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
INFOSEC Secjuice Squeeze 55 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Unrelease Resource Stream: Sometimes Garbage Collectors Do Not Save Us The problem of not releasing the resources we use is that over time the server fills up with things to do and is no longer able to process incoming requests, causing a disservice.
TECHNICAL RegEx: Sequence Is Important Regular Expressions, known as RegEx, are cool,they are extremely useful and allow us to do beautiful things.
INFOSEC SAST Isn't Code Review Static Application Security Test (SAST) is useful for checking your source code to find potential security vulnerabilities, but it isn't Code Review.
TECHNICAL How To Upload Any File To Amazon's Free Unlimited Photo Storage Space Have you ever wondered how to use Amazon Photos unlimited space for your own personal files? Wonder no longer, Alessandro Innocenzi has it all figured out and Amazon says it's fine.
TECHNICAL Reverse Engineering My Own Website Security researcher Alessandro Innocenzi built his website using esoteric programming languages, a website that you have to first compile in order to get any information out of it.
INFOSEC Web Scraping And Why You Shouldn’t Publish Your Email Address Learn about web scraping, why you should never publish your email address on the internet and what happens when your email has been scraped with Alessandro Innocenzi.
CYBERSEC How To Gain Infosec Experience Without An Infosec Job Want to find a job in infosec but lack the necessary experience? Check out Alessandro Innocenzi's guide to earning that experience in pentest labs, sandboxes and bounty programs.
INFOSEC Embedding Security In Your Development Process In his latest article Alessandro Innocenzi teaches us how to embed security at the heart of your development lifecycle.
CYBERSEC How To Setup Miners For Monero (XMR) Learn how to securely set up and operate a Monero miner, to mitigate against cyber theft with Alessanco Innocenzi.
CYBERSEC My First Foray Into Software Reverse Engineering Security researcher Alessandro Innocenzi is dipping his toe into reverse engineering, join him on his journey and find our what he learned.