Teaching Cyber Blog

Subscribe for news and updates




Month: June 2023

  • Protect your Cloud Accounts in 3 Steps

    Protect your Cloud Accounts in 3 Steps

    Cloud service providers are an ever-attractive target as organisations move data, applications, and resources into them. this article helps and provides the three steps you need to take as a priority. Cloud service providers are an ever-attractive target as organisations move data, applications, and resources into them. Cloud security is a complicated discipline with no…

  • How to introduce security into DevOps?

    How to introduce security into DevOps?

    Evolving from DevOps to DevSecOps, is it a ‘pipeline dream’ or something that can work within an organisation. This article covers the areas a business need to focus on to help make it happen. DevOps practices (combination of development and IT operations) can be critical to a business and its profitability, so it is important…

  • How to make a secure file upload secure?

    How to make a secure file upload secure?

    Thirteen steps to make your file upload more robust against attack. Pragmatic cyber security tips to help secure your file upload feature, forming part of an application, such as internet facing web application. 1. All validation processes should be performed on the server, not on the client side, this is to prevent user manipulation from…

  • What is Security Architecture?

    What is Security Architecture?

    This article covers the key areas of responsibility of the Security Architecture team within cybersecurity, to better inform and educate professionals of this important role. What is security architecture? What may be surprising, some professionals within the cyber security community do not understand the role. As a result it can lead to conflicting responsibilities and…

  • AISec: The Guide to Artificial Intelligence (AI) Solution Security 2023: AI Security Guide to secure AI solutions for students, beginners and cyber security professionals.

    AISec: The Guide to Artificial Intelligence (AI) Solution Security 2023: AI Security Guide to secure AI solutions for students, beginners and cyber security professionals.

    This is a fast-growing emerging area, specialist practitioners with skills in AISec (AI Security) and cyber security will be in high demand in the coming years. If you are a beginner, this book will give you the foundations in a practical easy to understand way. For experienced practitioners aware of the importance of AI, and…

  • How to protect your CISO from cyber security threats?

    How to protect your CISO from cyber security threats?

    Security awareness for managers, leaders within cyber security. Protecting the Chief Information Security Officer (CISO) from cyber threats. CISO are responsible for an organisation’s overall security. There are some controls that can be used to help protect this role: Cybersecurity Awareness, the CISO should receive specific, regular training and education on the latest cyber security…

  • Steps to protect your Azure App Service

    Steps to protect your Azure App Service

    Pragmatic cyber security tips to help secure your internet facing Azure App Service. App Service is a platform as a service (PaaS) by Microsoft Azure. This check list assumes you have an inventory of App Service, you know what you have and what each app does and their importance to you or your organisation. 1.…

  • Cybersecurity teams, who are they and what do they do?

    Cybersecurity teams, who are they and what do they do?

    An overview of cybersecurity teams, if you are new to the field find out where you want to start your career. If you are experienced, find out where you want to go next! Cybersecurity teams and their structure very much depend on the size and complexity of an organisation. The job function and even the…

×