Jaime Cruse
Dec 29, 2020
A Cyber Security Professional’s Quick Start Guide To Operational Technology
A cold, hard truth exists for conventional career paths in cyber security, and that is that it’s not quite as sexy as one may believe....
Jaime Cruse
May 21, 2020
Building A Simple Python Port Scanner
Somebody once told me “If you can’t write code, you’ll always rely on those who can.” I’ve reflected on that quite a bit over the nine or...
Jaime Cruse
Feb 27, 2020
Encrypting Data-At-Rest With VeraCrypt
Current events prove that 2020 will see the unfortunate continuation of the fight for privacy as a basic human right across the globe....
Jaime Cruse
Nov 1, 2019
Type Juggling Exploit Demo
Type juggling is a feature within PHP which provides developers some flexibility in comparing variables. It is derived from “loose...
Jaime Cruse
Oct 2, 2019
Introduction To Cryptology
In computing terms, cryptography is one of the primary technical methods by which individuals and organizations protect against the...
Jaime Cruse
Jul 8, 2019
CruSec’s 2019 CISSP Study Guide - Domain 8: Software Development Security
Domain 8: Software Development Security 8.1 Understand and integrate security in the Software Development Life Cycle Programming Concepts...
Jaime Cruse
Jul 8, 2019
CruSec’s 2019 CISSP Study Guide - Domain 7: Security Operations
Domain 7: Security Operations 7.1 Understand and support investigations Forensics Digital Forensics – focuses on the recovery and...
Jaime Cruse
Jul 8, 2019
CruSec’s 2019 CISSP Study Guide - Domain 6: Security Assessment and Testing
Domain 6: Security Assessment and Testing 6.1 Design and validate assessment, test and audit strategies Spans many areas:...
Jaime Cruse
Jul 8, 2019
CruSec’s 2019 CISSP Study Guide - Domain 5: Identity and Access Management
Domain 5: Identity and Access Management 5.1 Control physical and logical access to assets IAAA Five elements: Identification – claiming...
Jaime Cruse
Jul 8, 2019
CruSec’s 2019 CISSP Study Guide - Domain 4: Communication and Network Security
Domain 4: Communication and Network Security 4.1 Implement secure design principles in network architectures Communications and Network...