Cloud Related
API & Web Application Security
AWS Security Controls and Services
What Is Cloudflare?
Cloud Access Security Broker (CASB)
Google Cloud Platform (GCP)
Microsoft Azure Security Tooling
Terraform: Infrastructure as Code for the Cloud Era
Cyber Security Careers
Amazon Leadership Principles
AWS Fundamentals for Cybersecurity Engineers
Azure Fundamentals for Cybersecurity Engineers
Cybersecurity Career Paths
Cyber Security Engineer Certifications
Mentoring
Security Engineer Tiers
SOC Analyst Tiers
S.T.A.R. technique
Cryptography
Cryptography Essentials
What is the Difference Between Hashing and Encryption?
PKI – what is it?
Cyber Security Tech You Should Know
Deobfuscate a PowerShell Script with Example
File Analysis
IP Address Ranges
IPv4 and IPv6 Understanding the Key Differences
Packet Analysis
Scripting Languages in Cybersecurity
Top 50 Nmap Commands
SPF, DKIM, and DMARC
Quantum Computing Threats
Well-Known TCP & UDP Ports (0–1023)
What Is a Firewall?
Governance, Risk & Compliance (GRC)
Vendor Security Assessments and Third-Party Risk Reviews
How to Conduct Vendor Security Assessments Using the NIST Framework
Incident Response
Beaconing Detection with Splunk
Chain of Custody Procedures
Common Attack Types
Cyber Kill Chain
How to Conduct a Post-Incident Review (PIR)
Log Analysis
MITRE ATT&CK Framework
NIST SP 800-61 incident response planning.
Phishing Link Clicked – NIST 800-61 Response
Top Cybersecurity Tools to Learn in 2025
Regulatory Compliance & Frameworks
CIS Controls – The Center for Internet Security
GDPR: A Guide for Cybersecurity and Compliance Professionals
HIPAA: Understanding U.S. Healthcare Data Protection
ISO 27001 Controls Breakdown
ISO/IEC 42001: AI Management System Standard
NIS2 – Network and Information Security Directive 2
NIST Cybersecurity Framework (NIST CSF)
What Is NIST SP 800-53?
NIST SP 800-61 incident response planning.
SOC 1 vs SOC 2 – Security & Compliance Frameworks
PCI DSS Payment Card Industry Data Security Standard
Regulatory Compliance Standards: At a Glance
SOX Sarbanes-Oxley
Vulnerabilities & Exploits Management
Certificate Pinning
Common Attack Types
Exploits: Weaknesses Weaponised
Qualys: Enterprise Security and Compliance Platform
Understanding SQL Injection (SQLi)
Security Awareness Training & Behaviour Management Programs
CultureAI: Real-Time Human Risk Management Platform
KnowBe4: The Global Leader in Security Awareness Training
Threat Modelling
OpenCTI – Threat Intelligence for Threat Modelling
Threat Modelling Frameworks: Identifying and Managing Cyber Risks
Training
Capture The Flag (CTF)
Kernel of Truth
Acronyms
API & Web Application Security
AWS Security Controls and Services
Azure vs AWS Security Services – Side-by-Side Comparison
Beaconing Detection with Splunk
Breach and Attack Simulation
C2 Server – Command and Control in Cybersecurity
Capture The Flag (CTF)
Certificate Pinning
Chain of Custody Procedures
CI/CD and integrating security into pipelines (DevSecOps)
CIA Triad
CIS Controls – The Center for Internet Security
Cloud Access Security Broker (CASB)
Common Attack Types
Common Cybersecurity Misconceptions That Put You at Risk
Cryptography Essentials
CultureAI: Real-Time Human Risk Management Platform
Cyber Defence Team Programs
Insider Risk
Threat Intelligence
Cyber Essentials Plus (CE+)
Cyber Kill Chain
Cyber Security Tech You Should Know
Deobfuscate a PowerShell Script with Example
File Analysis
IP Address Ranges
IPv4 and IPv6 Understanding the Key Differences
Packet Analysis
Quantum Computing Threats
Scripting Languages in Cybersecurity
SPF, DKIM, and DMARC
Top 50 Nmap Commands
Top Cybersecurity Tools to Learn in 2025
Well-Known TCP & UDP Ports (0–1023)
What Is a Firewall?
Cybersecurity Best Practices
Cybersecurity Careers
Amazon Leadership Principles
AWS Fundamentals for Cybersecurity Engineers
Azure Fundamentals for Cybersecurity Engineers
Cyber Security Engineer Certifications
Cybersecurity Career Paths
Mentoring
S.T.A.R. technique
Security Engineer Tiers
SOC Analyst Tiers
DAST – Dynamic Application Security Testing
Data Loss Prevention (DLP)
Detection Engineering 101
DORA – Digital Operational Resilience Act
Endpoint Detection & Response (EDR)
Evaluating and Uplifting an Organisation’s Cybersecurity Posture: My Approach
Exploits: Weaknesses Weaponised
Free Cyber Security Tools
GDPR: A Guide for Cybersecurity and Compliance Professionals
Google Cloud Platform (GCP)
HIPAA: Understanding U.S. Healthcare Data Protection
Home Labs
Cybersecurity Home Lab – Advanced
Cybersecurity Home Lab – Beginner
Cybersecurity Home Lab – Intermediate
How to Conduct a Post-Incident Review (PIR)
How to Conduct Vendor Security Assessments Using the NIST Framework
ISO 27001 Controls Breakdown
ISO/IEC 42001: AI Management System Standard
KnowBe4: The Global Leader in Security Awareness Training
Listings
Log Analysis
MDR (Managed Detection & Response)
Microsoft Azure Security Tooling
MITRE ATT&CK Framework
My Home Lab Setup
NHS Data Security and Protection Toolkit (DSPT)
NIS2 – Network and Information Security Directive 2
NIST Cybersecurity Framework (NIST CSF)
NIST SP 800-61 incident response planning.
OpenCTI – Threat Intelligence for Threat Modelling
PCI DSS Payment Card Industry Data Security Standard
Phishing Link Clicked – NIST 800-61 Response
PKI – what is it?
Playbook
Playbook vs Runbook vs Workflow
Qualys: Enterprise Security and Compliance Platform
Red, Blue & Purple Teams
Blue Team
Purple Team
Red Team
Regulatory Compliance
Regulatory Compliance Standards: At a Glance
Runbook
SAST – Static Application Security Testing
Security Information and Event Management (SIEM)
Security Orchestration, Automation, and Response (SOAR)
SOAR Automation Examples
SOC 1 vs SOC 2 – Security & Compliance Frameworks
SOX Sarbanes-Oxley
Terraform: Infrastructure as Code for the Cloud Era
Threat Hunting
Threat Intelligence (TI)
Threat Modelling Frameworks: Identifying and Managing Cyber Risks
Top 10 OWASP
Understanding SQL Injection (SQLi)
Vendor Security Assessments and Third-Party Risk Reviews
Welcome to Kernel of Truth
What Is Cloudflare?
What Is NIST SP 800-53?
What is the Difference Between Hashing and Encryption?
Windows 11 Sandbox error 0x80070103
Workflows in Cybersecurity
XDR (Extended Detection & Response)
Search
Search
Regulatory Compliance
NCSC Latest
'NCSC Cyber Series' podcast now available
15/07/2025
Getting your organisation ready for Windows 11 upgrade before Autumn 2025
14/07/2025
Creating the right organisational culture for cyber security
25/06/2025