Skip to content

Mover and Shaker

In between traffic and disruptive technology

  • Blogs
  • Courses
    • Information Security
      • Module 1: General Security Concepts
      • Module 2: Operational & Organizational Security
      • Module 3: Legal Issues
      • Module 4: Privacy and Ethics
      • Module 5: Infrastructure Security
      • Module 6: Cryptography
      • Module 7: Public Key Infrastructure
      • Module 8: Physical Security
      • Module 9: Types of Attacks and Malware
      • Module 10: Security Operations and Baselining
    • Ethical Hacking
      • Module 1: Introduction to Ethical Hacking
      • Module 2: System Fundamentals
      • Module 3: Popular Attacks and Vulnerabilities
      • Module 4: Reconnaissance
      • Module 5: Scanning
      • Module 6: Gaining Access
      • Module 7: Maintaining Access and Covering Tracks
      • Module 8: Reporting
    • Cybersecurity Defense
      • Module 1: Risk Management
      • Module 2: Business Continuity
      • Module 3: Legal Investigation
      • Module 4: Computer Forensics
      • Module 5: Security Operations Center
  • Talks
  • Research
  • Academic
  • About

Do Not Trust. Verify Every Time: How to Start Zero Trust

Do Not Trust. Verify Every Time: How to Start Zero Trust

Posted on 4 Apr 20224 Apr 2022 by justinpcsIn Blogs, INFOSEC, Lessons, Research4 Minutes Read

A pragmatic approach to ransomware

A pragmatic approach to ransomware

Posted on 26 Mar 2022 by justinpcsIn Blogs, Lessons, Research5 Minutes Read

How to Keep it Private: People, Process and Technology

How to Keep it Private: People, Process and Technology

Posted on 11 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research, Talks7 Minutes Read

How Weak Session Management Lessens Security even with Strong Authentication Mechanisms

Featured

How Weak Session Management Lessens Security even with Strong Authentication Mechanisms

Posted on 7 Jun 202114 Aug 2021 by Justin PinedaIn Academic, Blogs, Lessons, Research2 Minutes Read

The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks

The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks

Posted on 10 Dec 2020 by Justin PinedaIn Blogs, Lessons, Research3 Minutes Read

How NMAP scan types complement your Vulnerability Scanner

How NMAP scan types complement your Vulnerability Scanner

Posted on 2 Dec 202011 Dec 2021 by Justin PinedaIn Academic, Blogs, Lessons, Research3 Minutes Read

Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion

Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion

Posted on 27 Nov 202011 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research3 Minutes Read

Securing the Organization’s IT Assets Amidst COVID-19

Securing the Organization’s IT Assets Amidst COVID-19

Posted on 29 Apr 202011 Dec 2021 by Justin PinedaIn Blogs, INFOSEC, Research5 Minutes Read

Exploring the Security Issues behind Facebook’s User Tracking from its ‘Big Data’ for Competitive Intelligence

Exploring the Security Issues behind Facebook’s User Tracking from its ‘Big Data’ for Competitive Intelligence

Posted on 9 Mar 202020 Mar 2020 by Justin PinedaIn Blogs, Research11 Minutes Read

Tips and Reasons: A Career in Cybersecurity

Tips and Reasons: A Career in Cybersecurity

Posted on 8 Feb 202020 Mar 2020 by Justin PinedaIn Blogs, Research, Talks4 Minutes Read

4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

Posted on 26 Dec 201920 Mar 2020 by Justin PinedaIn Blogs, Research4 Minutes Read

Proud of my students’ achievements @ UA&P event

Proud of my students’ achievements @ UA&P event

Posted on 1 Mar 201729 Jun 2017 by Justin PinedaIn Academic, Blogs, Experiences, Research1 Minute Read

Posts navigation

← Older Posts

Category: Research

Preparing a Data Privacy Compliant Organization

https://www.youtube.com/watch?v=fGlbwHDR4oU&t=1s

Support This Site By Donating

If you enjoy the lessons please support me on Ko-fi

Tags

acunetix apc seminar vulnerabilities indsutry daniel suarez bcp burp suite bypass ssl pinning ccs week cspc nabua bicol youth congress csrf cyber insurance cybersecurity data breach data lifecycle data privacy defense in depth diskriminasyon dpa dvwa equifax ethical hacking exam preparation giac gmob google auth gwapt hydra implicit deny information security INFOSEC infosec FUS model formula iso 27001 IT certification keepass lastpass least privilege mfa mobile security mobsf national privacy commission nessus nist 800-207 nmap npc owasp pamantasan ng lungsod ng pasig password manager patts pdi people personal data inventory pia pineda cybersecurity poc port scan privacy impact assessment process qualys ssl labs ransomware research conference sans sase scan type secure web application coding workshop bancnet bitshield security testing sequencer social engineering technology token vapt version scan vulnerability scan web goat websecurity zero trust zta ztn

Powered by WordPress.com.

Powered by WordPress.com.

 

Loading Comments...