cybersecurityshawn.com

Shawn Maschino serves as the main contributor and editor at CybersecurityShawn.com. With over two decades of experience and a strong dedication to reshaping perceptions of cybersecurity in the business realm, the content presented on this website aims to bolster and stimulate businesses in enhancing their cybersecurity strategies and fostering meaningful discussions on the subject.

Analysis: “Mysterious Team Bangladesh” Hactivism Attacks – Lessons for Businesses in Addressing Similar Cybersecurity Challenges

Introduction: The rise of hacktivist groups poses a significant cybersecurity challenge to businesses and organizations worldwide. One such group, known as Mysterious Team Bangladesh, has gained notoriety for conducting over 750 distributed denial-of-service (DDoS) attacks and 78 website defacements since June 2022. These attacks primarily target logistics, government, and financial sector organizations in India and […]

Analysis: “Mysterious Team Bangladesh” Hactivism Attacks – Lessons for Businesses in Addressing Similar Cybersecurity Challenges Read More »

Excuse Me. I BURPed!

BURP Suite is a comprehensive software application developed by PortSwigger, designed specifically for performing security testing of web applications. It is widely recognized and utilized by cybersecurity professionals as a critical tool in their arsenal. BURP Suite combines multiple security testing techniques and provides an integrated platform for effectively identifying, analyzing, and mitigating vulnerabilities in […]

Excuse Me. I BURPed! Read More »

ZAP, POW, SECURITY!

In this tool overview, we are looking at the OWASP tool ZAP (Zed Attack Proxy) and its significance in enhancing the security of businesses. Overview of OWASP ZAP: OWASP ZAP is a widely-used open-source web application security testing tool developed by the Open Web Application Security Project (OWASP). Its primary purpose is to identify and […]

ZAP, POW, SECURITY! Read More »

To SSL or to Not SSL, That is Not The Question

Hey there, fellow internet enthusiasts! Today, let’s dive into a topic that’s been buzzing around the digital world lately: SSL. If you’ve come across this acronym but aren’t quite sure what it means, fear not! We’re about to unravel the mysteries behind SSL and explain why it’s become an absolute necessity for websites in this […]

To SSL or to Not SSL, That is Not The Question Read More »

Attribute Deep Dive – Compliant

We have previously highlighted the value of using attributes to direct the development of cybersecurity architectures in this post.  Here, we will dive into the attribute of “Compliant.”   As with the development of any cybersecurity architecture, the definition and application of the attribute should be driven and aligned with the organization that is using […]

Attribute Deep Dive – Compliant Read More »

Critical Aspects To Identify When Developing Cybersecurity Architecture

Developing cybersecurity architectures is not just a matter of selecting what tools or processes will be needed to secure a system or achieve a specific security goal.  While doing this is part of the process, it alone will not cover all aspects needed to ensure fit-for-use and fit-for-purpose cybersecurity.  Nor will it provide two-way traceability, […]

Critical Aspects To Identify When Developing Cybersecurity Architecture Read More »

Developing a Robust Cybersecurity Architecture Using SABSA: Top Priorities

In the age of increasing cybersecurity threats, an organization’s security strategy is of paramount importance. The Sherwood Applied Business Security Architecture (SABSA) provides a robust framework to help organizations build resilient cybersecurity systems. However, embarking on the journey to establish a comprehensive security architecture can be a complex task. Therefore, it is critical to focus […]

Developing a Robust Cybersecurity Architecture Using SABSA: Top Priorities Read More »

Adopting SABSA: Challenges, Complexities, and Recommendations

The Sherwood Applied Business Security Architecture (SABSA) is a renowned framework and methodology for developing risk-driven, enterprise information security, and assurance architectures. While it offers a holistic, multi-layered approach that emphasizes a tight link between business goals and IT security, the adoption of SABSA is often fraught with a number of challenges, mostly due to […]

Adopting SABSA: Challenges, Complexities, and Recommendations Read More »

Understanding SABSA: Strengthening Organizational Security for Long-Term Success

Introduction In today’s rapidly evolving digital landscape, cybersecurity has become an indispensable aspect of organizational success. With data breaches and cyberattacks becoming more sophisticated, businesses must adopt robust security frameworks to safeguard their sensitive information and critical assets. One such framework that has gained prominence is SABSA (Sherwood Applied Business Security Architecture). This blog post […]

Understanding SABSA: Strengthening Organizational Security for Long-Term Success Read More »

Scroll to Top