Tips and Reasons: A Career in Cybersecurity

Is there a career in IT Security/Cybersecurity in the Philippines? - This is the question that is always asked when I give workshops or lectures in the academe. I always answer an astounding "yes." Here are the reasons why: Reason #1: There is a need for cybersecurity professionals because of the increasing number of cybercrimes … Continue reading Tips and Reasons: A Career in Cybersecurity

4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

COMING from the business side, I have met and seen various vendors who promise heaven and earth to answer IT problems in your organization. There are the 'yes' guys who will always answer 'yes' when you ask if the solution can do this or that. There are the 'deflectors' who try to confuse or worse, … Continue reading 4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

Proud of my students’ achievements @ UA&P event

Last February 24, 2017, me and my undergraduate students went to the University of Asia and the Pacific (UA&P) in Pasig City to present their project Hydra in a school-initiated research conference. The event was not very big but various students from undergrad to PhD were prepared to present their papers. I was really pushy … Continue reading Proud of my students’ achievements @ UA&P event

8 Helpful Things You can do to Prepare and Pass a GIAC exam

Roughly one year after I passed the GIAC Web Application Penetration Tester (GWAPT) exam, I took the GIAC Mobile Device Security Analyst (GMOB). I became one of a less than a thousand professionals who earned the certification. One of the observations that I have is that preparations I did for both exams were pretty much … Continue reading 8 Helpful Things You can do to Prepare and Pass a GIAC exam

COMSEC2 Vulnerability POC and Analysis

For COMSEC2, the project of the students is to simulate and existing vulnerability (it can be application, network etc.) and create an analysis based from research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the … Continue reading COMSEC2 Vulnerability POC and Analysis

Machine Project in Infosec

Objectives ■To be able to configure, implement an open-source security tool. ■To simulate a real-world attack scenario where the security tool can be used. ■To show how to configure necessary functionalities of the security tool. Tasks ■Each group will be assigned a specific security tool. Each group will research about the topic and download an … Continue reading Machine Project in Infosec

Research Paper on Emerging Technologies

Introduction A Case Study will be held as an academic symposium during the midterms week to discuss various emerging technologies in the field of information security. Each group will be tasked to research on a specified topic, explore and answer key issues about the subject. As its culminating activity, an academic paper with a required … Continue reading Research Paper on Emerging Technologies