How Cloudflare Works: Part 2 — Testing & Hardening
Practical validation steps to confirm Cloudflare proxying, TLS (Full strict), WAF behavior, rate limiting, bot mitigation, and DNSSEC.
Practical validation steps to confirm Cloudflare proxying, TLS (Full strict), WAF behavior, rate limiting, bot mitigation, and DNSSEC.
Learn how to map security events in Splunk to the MITRE ATT&CK framework — understanding adversary behavior, tactics, techniques, and how to align your detections accordingly.
Learn how to install Splunk Enterprise and write your first SPL searches for security monitoring — a practical beginner's guide for cybersecurity professionals and home lab users.
A detailed walkthrough of Snort 3 basic configuration, HOME_NET, rule loading, and validation.
A complete step-by-step guide to installing Snort 3 on Kali Linux using both repository and source-based methods — including dependencies, configuration, and verification.
A practical, in-depth guide to how Cloudflare works as a security layer — covering WAF, DDoS protection, DNS, TLS, rate limiting, and how to verify your configuration is actually working.
How mentorship and collaboration led to the creation of CyberSecHub, a free cybersecurity awareness site for students and communities. Lessons learned, tech stack, and impact.
Part 2 of our series dives into the Measure and Manage functions of NIST’s AI RMF v1.0. We explore how to assess and mitigate AI risks in practice, offer implementation tips and tools, discuss the framework’s limitations, and provide a handy checklist to apply to your own AI projects.
Why AI risk management matters, an overview of NIST’s AI RMF v1.0, and a breakdown of its first two core functions: Govern and Map.
A practical introduction to penetration testing — methodology, essential tools, and the step-by-step process every aspiring ethical hacker needs to understand before touching a real target.
A comprehensive practitioner's guide to building a real foundation in cybersecurity — mindset, core skills, lab building, methodology, certifications, and finding your place in the field.
A practical introduction to Open Source Intelligence — the tools, techniques, and methodology used by security professionals to gather and analyze publicly available information.