When defining this CIS Control we can look no further than its’s name. Protection of data is a vital point for any organization's security. This control is responsible for developing processes to identify, classify, securely handle, retain, and dispose of data. Data for a while now is not kept inside…

As the name indicates, a reconnaissance assault is an attempt by an adversary to collect and analyze data about a network depends before initiating more serious sorts of attacks. The reconnaissance attack is frequently carried out utilizing public information. Intelligence gathering from a reconnaissance attacker will concentrate on “Who” will…

Malware is unauthorized program or file in your device against your permission. It has the ability to connect itself to legitimate code and spread; it can hide in valuable software or duplicate itself around the Internet. Macro viruses infect programs like Microsoft Word and Excel. These specific viruses bind themselves…

Ivery Daniels III

Cyber Security Professional | Red Team

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store