Security isn’t what slows the business down. It’s what keeps the business from falling apart while everyone else speeds up. The Language of Risk, Not Firewalls You can tell a lot about an organization by how it talks about security. Some see it as a cost. Some see it as compliance. The smart ones see it as survival. When you
Category: Cybersecurity
A secure Windows network is not built on trust or technology. It is built on doubt, discipline, and the refusal to believe that anything is ever safe. The Illusion of Safety We like to think a Windows network is safe because it is Windows. Familiar. Polished. Backed by billion-dollar branding. The truth is, Windows is only as secure as the
I get asked a lot as to why GIS. Why study it when I already hold a Master’s in Cybersecurity and more IT degrees and certs than anyone cares to count. By now I could have stopped. I could have sat back, waved the certificates, and called myself an expert. But here is the truth. I do not consider myself
So, you want to be a network and cybersecurity engineer? You dream of packet-sniffing like a bloodhound, tracing intrusions like a digital Sherlock Holmes, and configuring routers like a Cisco wizard. Great. But let’s get one thing straight: You also need to know how to code. Yes. Code. Like, programming. Not just copying and pasting some random script from Stack
Why DNS-over-HTTPS (DoH)? — The Primer Before we get deep into why DoH makes IT admins sweat, let’s start with why it exists in the first place. Traditional DNS Is a Massive Privacy Leak Every time you visit a website, your device asks a DNS server: “Hey, what’s the IP for gimmecatsinbowties.com?” And that query goes out completely unencrypted [¹].
Plot twist: It was one of mine the whole time. So there I was — mid-coffee, mid-ticket, mid-existential crisis — when I looked at my Wi-Fi dashboard and saw something terrifying: Two networks.Same SSID.One was mine.The other? An imposter. My first thought? “It’s happening. Evil twin attack. Shut it all down. Tell my wife I love her.” I leapt into
(Especially If You Work in a Public Utility Agency) Let’s not sugarcoat it: public utility agencies are prime targets. Not because we’re hoarding national secrets, but because attackers know we’re stretched thin, glued to outdated systems, and busy keeping things running while everyone else enjoys power, water, and a working commute. So what should cybersecurity awareness training actually include? Here’s
Because we can Google it ourselves, thank you very much. Let’s not sugarcoat it: Philippine cybersecurity is behind. Behind in funding. Behind in skills development. Behind in taking threats seriously until they hit us square in the NBI database. And what’s the usual response? “Hire a foreign consultant!”Preferably someone who charges six figures, presents a fancy PowerPoint, and whose only
Let’s talk about something serious — not in a boring, policy-wonk kind of way, but in a “we should actually care about this before things go south” kind of way. Because while we’re busy arguing online, stuck in traffic, or watching another Senate hearing that feels more like a teleserye, the rest of the world is playing 4D chess with
Short answer: Yes. Long answer: LOL, definitely yes. Let’s go back in time — before TikTok, before Wi-Fi, before we were arguing with strangers in the comments section of anything. We’re talking 1960s to 1980s, when the Internet (then called ARPANET) was just a bunch of universities and nerds trying to make computers talk to each other across wires and