I failed the first CISSP attempt on 26th October 2022. After more than a year of preparation, I had no determination to face the exam again. But the report card forced me to look at the shiny side. The exam summary indicated I have passed four domains and require proficiency in others. After retrospection and […]
Four stages of true CISSP professional. – Like it? Check out my ambitious project, CISSP As An Art (CaaArt), where I transform core CISSP concepts into visual storytelling through minimalism and art. – Join my private email list – I share CISSP concepts, AI insights, short films, industry news, learning resources, and curated content. You can check […]
Download CISSP Art Booklet – Quantitative Risk Assessment UV Radiation The mini creative CISSP booklet below explores quantitative risk analysis and assessment with complex formulas. Risk Assessment with UV Rays – This article is part of my ambitious project, CISSP As An Art (CaaArt), in which I transform core CISSP concepts into visual storytelling through minimalism and […]
Download CISSP Art Booklet – STRIDE Threat Modeling and ANTS The below mini creative CISSP booklet explores the core threat modeling concept using the STRIDE model. – This article is part of my ambitious project, CISSP As An Art (CaaArt), in which I transform core CISSP concepts into visual storytelling through minimalism and art. – Join my […]
I had an opportunity to attend Steve Piper’s webinar on Five Ways AI Improve Cybersecurity Defense. I am sharing my notes, thoughts and reflections. Don’t forget to check out the AI image generated at the end of this article 🙂 I hope it’s useful for you. Please let me know your thoughts or questions in […]
Download CISSP Art booklet – The Yellow Forest and AAA CISSP booklet on elements of AAA – as part of Cissp As An Art project. This article is part of my ambitious project, CISSP As An Art (CaaArt), in which I transform core CISSP concepts into visual storytelling through minimalism and art. – Join my […]
Download CISSP booklet: The Mystery Box and Security Terms CISSP booklet on elements of AAA – as part of Cissp As An Art project. – This article is part of my ambitious project, CISSP As An Art (CaaArt), in which I transform core CISSP concepts into visual storytelling through minimalism and art. – Join my […]
Story One day, Mulla saw a troop of horsemen coming towards him. He saw himself as an enslaved person in his imagination. He was frightened. Mulla climbed the nearby wall and hid inside an open grave. The horse riders came and saw Mulla shivering with his eyes closed. “What are you doing in the grave?” […]
I found the questions related to (ISC)2 code of ethics were tricky. You will struggle to answer unless you have soaked these canons deep inside your nerves. The ethics are not limited to passing the CISSP exam. It’s a constant reminder to me that I have committed to providing great service. I take pride in […]
“Optimistic sees a vulnerability between a security patch, and pessimistic sees a security patch between a vulnerability.” A cybersecurity professional needs both perspectives.
“And you think multi-factor authentication is limited to technology?”
I am so excited to announce Dave On Cyber is live! It’s a minimal space without distractions and ads like I always wanted. I dedicate my creative work and knowledge to the cybersecurity community with pure reading experience and cybersecurity learning resources. Start with CIA is the ABC of cybersecurity.
When the student is ready, the teacher will appear. When the student is truly ready, the teacher disappears. — Lao Tzu What’s Lao trying to convey? You are a student. You are also a teacher. Learning new skills and acquiring appropriate cybersecurity domain knowledge is not limited to cracking an interview, job security or advancing the career. Learning […]
Story One day, Mulla took his donkey with loaded salt to the market. They pass through the river, and salt melts! The donkey was happy, but Mulla had to bear the loss. After a few days, Mulla and the donkey had to pass through the same stream. However, this time, the wool was loaded on […]
Where is the risk? It’s everywhere. Being single is a risk of loneliness and depression. Being in a live-in relationship is a risk of an uncertain future. Being married is a risk of missing bachelorhood. Whether it’s relationship or data, you can never eliminate the risk. All you can do is reduce it to the […]
Cyber yoga – breathe in security patches, breathe out vulnerabilities.
Story One day, Mulla Nasruddin was drinking tea at the teahouse. He announced that he was the most hospitable man in town, which amused the crowd. Mulla invites many people for lunch at his home, and the crowd and Mulla march towards the house. More people joined, and the crowd gathered outside Mulla’s house quickly. […]
The official CISSP study guide has more than 1300 pages. Before you pass the exam, it tastes your reading patience level with bland language. I had two choices. Read fast with skimming and skipping. Or read word by word from the first to the last page. I chose later. I read it like a novel. […]
AI feels like a fax machine. Blessing in the beginning, burden at the end. The question is whether AI is a blessing or a curse for IT Security.
“SSO – two sides of one coin.”
What’s the first thing you learned in the English language? A… B… C… It could be the ABC-relevant alphabet in your native language. You can only speak or write some words in English with ABC. It’s not an entire language, but a good start. It does help to make connections, such as A for Apple. […]
“Who is cyber-aware among Goofy and Micky?”
Microsoft’s Internet Explorer (IE) retires after 27 years. The web browser was launched in 1995 with Windows 95 operating system. It was at its peak in 2003 when 95% of people were using IE. The popularity started deteriorating in 2004 after Firefox and Chrome. I was not a big fan and mostly used IE to […]
“You have taken cryptography seriously when the road sign reminds you of the hash function, message digest and SHA-256 more than the one-way driving sign board.”
“Why did Elon Musk pay $44 billion to change from Twitter to X?”
Inspired from historic Oscar night when Will Smith slapped Chris Rock. “The only violence we are interested in watching — is a cyber slap.”