Skip to main content

Blog

How Cloudflare Works: Part 2 — Testing & Hardening
cloudflare

How Cloudflare Works: Part 2 — Testing & Hardening

5 min read

Practical validation steps to confirm Cloudflare proxying, TLS (Full strict), WAF behavior, rate limiting, bot mitigation, and DNSSEC.

cloudflare security waf tls dns dnssec hardening ops
Splunk Part 02: MITRE ATT&CK Framework and Behavioral Mapping
splunk

Splunk Part 02: MITRE ATT&CK Framework and Behavioral Mapping

4 min read

Learn how to map security events in Splunk to the MITRE ATT&CK framework — understanding adversary behavior, tactics, techniques, and how to align your detections accordingly.

splunk siem mitre-attck security-monitoring threat-modeling detection-engineering
How to Install Snort 3 on Kali Linux (Step-by-Step Guide)
snort

How to Install Snort 3 on Kali Linux (Step-by-Step Guide)

5 min read

A complete step-by-step guide to installing Snort 3 on Kali Linux using both repository and source-based methods — including dependencies, configuration, and verification.

snort ids network-security installation kali-linux
How Cloudflare Works: A Security Blueprint
cloudflare

How Cloudflare Works: A Security Blueprint

4 min read

A practical, in-depth guide to how Cloudflare works as a security layer — covering WAF, DDoS protection, DNS, TLS, rate limiting, and how to verify your configuration is actually working.

cloudflare security cdn ddos waf dns ops
Navigating the NIST AI RMF v1.0
AI

Navigating the NIST AI RMF v1.0

21 min read

Part 2 of our series dives into the Measure and Manage functions of NIST’s AI RMF v1.0. We explore how to assess and mitigate AI risks in practice, offer implementation tips and tools, discuss the framework’s limitations, and provide a handy checklist to apply to your own AI projects.

AI Risk Management NIST Cybersecurity
Navigating the NIST AI Risk Management Framework
AI

Navigating the NIST AI Risk Management Framework

9 min read

Why AI risk management matters, an overview of NIST’s AI RMF v1.0, and a breakdown of its first two core functions: Govern and Map.

AI Risk Management NIST Cybersecurity
penetration-testing

Penetration Testing Basics: Your First Steps into Ethical Hacking

4 min read

A practical introduction to penetration testing — methodology, essential tools, and the step-by-step process every aspiring ethical hacker needs to understand before touching a real target.

penetration-testing ethical-hacking cybersecurity security-testing beginner methodology
cybersecurity

Cybersecurity Foundation: A Practitioner's Guide

14 min read

A comprehensive practitioner's guide to building a real foundation in cybersecurity — mindset, core skills, lab building, methodology, certifications, and finding your place in the field.

cybersecurity beginner guide