<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Netizen Watch]]></title><description><![CDATA[The Inclusive MSSP servicing consumers, small businesses to enterprises I will share the architecture and approach to implementing scalable technical security controls. Cybersecurity for me is intertwined with my life so heads up. ]]></description><link>https://blog.netizen.watch</link><image><url>https://substackcdn.com/image/fetch/$s_!pw08!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5330c939-092d-4890-80cb-481d0b7174a4_240x240.png</url><title>Netizen Watch</title><link>https://blog.netizen.watch</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 06:44:30 GMT</lastBuildDate><atom:link href="https://blog.netizen.watch/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mogul Prep LLC.]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[akyl@netizen.watch]]></webMaster><itunes:owner><itunes:email><![CDATA[akyl@netizen.watch]]></itunes:email><itunes:name><![CDATA[Akyl]]></itunes:name></itunes:owner><itunes:author><![CDATA[Akyl]]></itunes:author><googleplay:owner><![CDATA[akyl@netizen.watch]]></googleplay:owner><googleplay:email><![CDATA[akyl@netizen.watch]]></googleplay:email><googleplay:author><![CDATA[Akyl]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Your Business Doesn't Close at 5 PM -- Neither Do Security Risks]]></title><description><![CDATA[Why 24/7 digital access requires operational security that works even when you're offline]]></description><link>https://blog.netizen.watch/p/your-business-doesnt-close-at-5-pm</link><guid isPermaLink="false">https://blog.netizen.watch/p/your-business-doesnt-close-at-5-pm</guid><dc:creator><![CDATA[Arie Kiana]]></dc:creator><pubDate>Sat, 18 Apr 2026 01:05:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vMUJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vMUJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vMUJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vMUJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vMUJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vMUJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vMUJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ebe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1757110,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/194458420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vMUJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vMUJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vMUJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vMUJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febe6f496-d51d-4059-8521-26315d8b433d_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>There Was a Time When Business Had an &#8220;Off&#8221; Switch</h2><p>Not long ago, when a business closed for the day&#8230; it actually closed. </p><p></p><p>Doors locked. <br>Lights off. <br>Registers counted.</p><p>Access ended when the workday did. </p><p>Risk had boundaries. </p><p>Today?</p><p>That boundary doesn&#8217;t exist. </p><p></p><h2>The Digital Reality Most People Haven&#8217;t Fully Processed</h2><p>Your business may shut down for the day. </p><p>But your systems don&#8217;t. </p><ul><li><p>Emails are still accessible</p></li><li><p>Logins are still active</p></li><li><p>Cloud platforms are still connected</p></li><li><p>Customer data is still stored</p></li><li><p>Accounts are still reachable from anywhere in the world</p></li></ul><p>Even while you sleep. </p><p>Even while you&#8217;re on vacation. </p><p>Even when you think nothing is happening. </p><div class="pullquote"><p><strong>Your business is still &#8220;open&#8221; &#8212; just without supervision. </strong></p></div><h2>Access Is No Longer Tied to Presence</h2><p>This is the shift most business owners haven&#8217;t operationalized yet. </p><p>Access used to require: </p><ul><li><p>physical presence</p></li><li><p>business hours</p></li><li><p>direct interaction</p></li></ul><p>Now it requires: </p><ul><li><p>a login</p></li><li><p>a device</p></li><li><p>and an opportunity</p></li></ul><p>That&#8217;s it. </p><p>Which means risk doesn&#8217;t wait for: </p><ul><li><p>your availability</p></li><li><p>your attention</p></li><li><p>or your awareness</p></li></ul><p></p><h2>Why This Changes Everything About Security</h2><p>Security is no longer about protecting <em>active work. </em></p><p>It&#8217;s about protecting: </p><blockquote><p><strong>idle systems, stored data, and unattended access points. </strong></p></blockquote><p>This is where most businesses are exposed. </p><p>Not during peak hours.<br>Not during active use. </p><p>But in the quiet gaps: </p><ul><li><p>overnight</p></li><li><p>weekends</p></li><li><p>vacations</p></li><li><p>busy seasons</p></li><li><p>moments of distraction </p></li></ul><p>Because that&#8217;s when: </p><ul><li><p>alerts are missed</p></li><li><p>decisions are delayed</p></li><li><p>and systems are left to run on autopilot</p></li></ul><p></p><h2>A Breach Doesn&#8217;t Just Steal Data &#8212; It Disrupts Operations</h2><p>Most people think of security breaches as data problems. </p><p>They&#8217;re not. </p><p>They&#8217;re operational problems. </p><p>A breach can: </p><ul><li><p>lock you out of your own systems</p></li><li><p>interrupt client communication</p></li><li><p>corrupt or expose sensitive data</p></li><li><p>damage trust and reputation</p></li><li><p>force reactive decisions and under pressure</p></li></ul><p></p><p>In other words: </p><div class="pullquote"><p><strong>It doesn&#8217;t just affect your security &#8212; it affects your ability to run your business. <br></strong></p></div><p>And the longer it goes unnoticed, the more expensive it becomes. </p><p></p><h2>The Gap: Businesses That Close vs Systems That Don&#8217;t </h2><p>Here&#8217;s the real issue: </p><p>Most businesses operate like they have defined hours. </p><p>But their infrastructure operates 24/7. </p><p>That mismatch creates risk. </p><p>Because while the business is: </p><ul><li><p>resting</p></li><li><p>offline</p></li><li><p>or focused elsewhere</p></li></ul><p>The system is: </p><ul><li><p>still accessible</p></li><li><p>still exposed</p></li><li><p>still active</p></li></ul><p></p><p>Without structure, this becomes: </p><p><strong>Unmanaged access.<br>Unmonitored activity. <br>Uncontrolled risk. </strong></p><p></p><h2>This Is Why 24/7 Protection Matters</h2><p>24/7 protection doesn&#8217;t mean you&#8217;re constantly working. </p><p>It means your <strong>systems are designed to hold without you</strong>. </p><p>That includes: </p><ul><li><p>controlled access</p></li><li><p>monitoring that filters signal from noise</p></li><li><p>alerts that actually get addressed</p></li><li><p>clear ownership of systems</p></li><li><p>defined response expectations</p></li></ul><p></p><p>This is where companies like <strong><a href="https://www.netizen.watch/">Netizen Watch</a></strong><a href="https://www.netizen.watch/"> </a>step in. </p><p>Not to overwhelm you with tools. </p><p>But to ensure your operations are supported &#8212; even when you&#8217;re not actively thinking about them. </p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>The New Standard: Systems That Work While You&#8217;re Offline</h2><p>Secure businesses don&#8217;t rely on constant attention. </p><p>They rely on: </p><ul><li><p>structure</p></li><li><p>clarity</p></li><li><p>and continuity</p></li></ul><p>They assume: </p><ul><li><p>people will get tired</p></li><li><p>days will get busy</p></li><li><p>things will be missed</p></li></ul><p>So they build systems that: </p><ul><li><p>catch what humans don&#8217;t </p></li><li><p>hold what humans forget</p></li><li><p>and protect what humans are building </p></li></ul><p></p><h2>A Simple Reframe</h2><p>Instead of asking: </p><p>&#8220;<em>When do I need to think about security?&#8221;</em></p><p>Ask: </p><blockquote><p><strong>&#8220;What&#8217;s protecting my business when I&#8217;m not?&#8221; </strong></p></blockquote><p></p><p>Because in the digital age:</p><p>That&#8217;s most of the time. </p><p></p><h2>Final Thought</h2><p>The most dangerous assumption in modern business is this: </p><div class="callout-block" data-callout="true"><p>&#8220;Nothing is happening because I&#8217;m not working.&#8221; </p></div><p></p><p>In reality, everything is still running. </p><p></p><p>Access is still open.<br>Systems are still active. <br>Risk is still present. </p><p></p><p>And the businesses that thrive long-term are the ones that understand: </p><p></p><p><strong>Security isn&#8217;t tied to your schedule. <br>It&#8217;s tied to your systems. </strong></p><p></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/p/your-business-doesnt-close-at-5-pm?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/p/your-business-doesnt-close-at-5-pm?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.netizen.watch/p/your-business-doesnt-close-at-5-pm?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[ Please accept my cookies...]]></title><description><![CDATA[A 1994 programming hack got the coziest name in tech history. Turns out, that friendliness was the perfect cover for the surveillance machine we all click &#8220;Accept&#8221; on every day.]]></description><link>https://blog.netizen.watch/p/please-accept-my-cookies</link><guid isPermaLink="false">https://blog.netizen.watch/p/please-accept-my-cookies</guid><dc:creator><![CDATA[Mason Ross]]></dc:creator><pubDate>Fri, 17 Apr 2026 02:16:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AuhL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AuhL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AuhL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!AuhL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!AuhL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!AuhL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AuhL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AuhL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!AuhL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!AuhL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!AuhL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1826c258-5e4f-43ec-863b-78f482a21470_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><p>you&#8217;ve seen the banner a thousand times.</p><p>A cheerful pop-up slides up from the bottom of the screen: &#8220;We use <strong>cookies</strong> to improve your experience. Accept all cookies?&#8221;</p><p>It sounds so&#8230; nice. Like someone&#8217;s offering you fresh-baked chocolate chip cookies, not quietly dropping a tiny file on your device that will follow you around the internet for months (or years).</p><p>Why on earth did they pick such an inviting, warm, <em>edible</em> name for something that&#8217;s fundamentally about tracking?</p><p>The answer is equal parts accident, engineering necessity, and accidental marketing genius. And it reveals a lot about how tech hides what it&#8217;s really doing.</p><h4>The Actual Origin Story (It&#8217;s Not What You Think)</h4><p>Let&#8217;s go back to 1994. The web is brand new, clunky, and &#8220;stateless.&#8221; Every time you clicked a link, the server forgot you existed the moment the page loaded. No memory. No shopping carts. No way to know if you&#8217;d already logged in.</p><p>A 23-year-old Netscape engineer named <strong>Lou Montulli</strong> was trying to fix that. He needed a way for websites to remember little bits of information about you&#8212;without storing everything on the server.</p><p>His solution? A tiny text file the server could send to your browser and get back on future visits. Basically a digital ID tag.</p><p>He didn&#8217;t invent the concept out of thin air. He borrowed it from an old Unix programming trick called a <strong>&#8220;magic cookie&#8221;</strong>&#8212;a small packet of data that programs pass back and forth unchanged, just to prove &#8220;hey, it&#8217;s me again.&#8221;</p><p>Montulli later explained it simply: he&#8217;d heard the term in college, it fit the technical purpose, and he <em>liked how it sounded</em>. So he dropped the &#8220;magic&#8221; and just started calling them <strong>cookies</strong>. The name stuck.</p><p>(He&#8217;s on record saying the fortune-cookie analogy&#8212;message hidden inside a treat&#8212;is a fun story people tell, but the real root is the Unix &#8220;magic cookie.&#8221;)</p><h4>Why &#8220;Cookies&#8221; Was Marketing Gold (Even If Unintentional)</h4><p>Here&#8217;s the thing: &#8220;magic cookie&#8221; sounds like nerd stuff.</p><p><strong>&#8220;Cookies&#8221;</strong> sounds like home. Comfort. Grandma&#8217;s kitchen. Something you <em>want</em> to accept.</p><p>It&#8217;s the same reason tech loves fluffy euphemisms:</p><ul><li><p>&#8220;The cloud&#8221; (not a bunch of warehouses full of servers)</p></li><li><p>&#8220;Pixels&#8221; (not invisible trackers)</p></li><li><p>&#8220;Data enrichment&#8221; (not &#8220;we&#8217;re building a profile of you&#8221;)</p></li></ul><p>Calling it a <strong>cookie</strong> was never meant to be deceptive at first. It was just a programmer being cute. But once the name existed, it became the perfect psychological Trojan horse.</p><p>By the late &#8217;90s and early 2000s, cookies weren&#8217;t just remembering your shopping cart anymore. They were being used for cross-site tracking, targeted ads, and building detailed behavioral profiles. The friendly name made the whole thing feel harmless.</p><p>You weren&#8217;t being <em>surveilled</em>. You were being offered a cookie. Who says no to cookies?</p><h4>Fast-Forward to Today: The Consent Theater</h4><p>Now every site hits you with those GDPR-mandated banners. Notice the language:</p><ul><li><p>&#8220;Essential cookies&#8221; (the ones you supposedly can&#8217;t refuse)</p></li><li><p>&#8220;Performance and functionality cookies&#8221; (sounds helpful)</p></li><li><p>&#8220;Marketing cookies&#8221; (the creepy ones&#8230; buried in the settings)</p></li></ul><p>The button that&#8217;s big, green, and glowing? <strong>&#8220;Accept all cookies.&#8221;</strong></p><p>It&#8217;s not an accident. Decades of behavioral research shows we&#8217;re wired to choose the path of least resistance&#8212;and the warmest-sounding option. &#8220;Accept cookies&#8221; triggers the same brain reaction as &#8220;free sample at the bakery.&#8221;</p><p>Meanwhile, rejecting them often requires six clicks and reading legalese.</p><p>The name did its job so well that even the privacy laws we passed to <em>regulate</em> cookies still use the cuddly word. We&#8217;re stuck debating &#8220;cookie consent&#8221; instead of &#8220;persistent cross-site user tracking identifiers.&#8221;</p><h4>So&#8230; Was It a Conspiracy?</h4><p>Not really.</p><p>Montulli&#8217;s original goal was actually pretty privacy-friendly: keep data on <em>your</em> device, tied to one site, not some central database. He never intended third-party ad networks to abuse it. (He&#8217;s said as much in interviews.)</p><p>But once the tool existed and had this adorable name, industry realized it was perfect for the new business model: surveillance capitalism.</p><p>The name softened the edges. It made regulation slower. It made users complacent.</p><p>And here we are in 2026&#8212;still calling it cookies while browsers phase out third-party tracking and the industry scrambles for &#8220;cookieless&#8221; alternatives that are&#8230; somehow even sneakier.</p><h4>The Bigger Lesson</h4><p>Language matters.</p><p>When tech wants you to accept something invasive, it wraps it in something friendly. Cookies. Clouds. Pixels. &#8220;We value your privacy.&#8221;</p><p>Next time you see that banner, remember: it&#8217;s not a treat. It&#8217;s a tracker wearing a cute name.</p><p>You don&#8217;t have to accept every cookie just because it sounds delicious.</p><p></p><p>&#8220;If this made you rethink your next &#8216;Accept all&#8217; click, hit the &#10084;&#65039; button and share it.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/p/please-accept-my-cookies/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.netizen.watch/p/please-accept-my-cookies/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/p/please-accept-my-cookies?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.netizen.watch/p/please-accept-my-cookies?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.netizen.watch/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Cyber Security Foundations Lesson 8: Explaining Incident Response Activities]]></title><description><![CDATA[What happens when cybersecurity goes from &#8220;possible problem&#8221; to &#8220;actual incident&#8221;?]]></description><link>https://blog.netizen.watch/p/cyber-security-foundations-lesson</link><guid isPermaLink="false">https://blog.netizen.watch/p/cyber-security-foundations-lesson</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:20:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pw08!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5330c939-092d-4890-80cb-481d0b7174a4_240x240.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W89e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W89e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 424w, https://substackcdn.com/image/fetch/$s_!W89e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 848w, https://substackcdn.com/image/fetch/$s_!W89e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 1272w, https://substackcdn.com/image/fetch/$s_!W89e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W89e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp" width="724" height="348.968" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:500,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:16446,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/193475912?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!W89e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 424w, https://substackcdn.com/image/fetch/$s_!W89e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 848w, https://substackcdn.com/image/fetch/$s_!W89e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 1272w, https://substackcdn.com/image/fetch/$s_!W89e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5870ed11-e6d0-4273-b6e9-8395ebe002ef_500x241.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Up to this point in the series, we&#8217;ve spent a lot of time learning how to <strong>spot risks, find vulnerabilities, monitor systems, and communicate security issues</strong></p><p>.</p><p>But now we hit the moment where cybersecurity gets very real.</p><p>Because eventually, in any organization, Something happens.</p><p>A user clicks the wrong link.<br>A strange login appears at 2:13 AM.<br>A server starts beaconing out to an IP it definitely should not be talking to.<br>Files start encrypting.<br>Alerts begin popping off.</p><p>And now the question is no longer:</p><blockquote><p>&#8220;Could something bad happen?&#8221;</p></blockquote><p>Now the question becomes:</p><h2><strong>&#8220;What do we do right now?&#8221;</strong></h2><p>That is exactly what <strong>incident response</strong> is all about.</p><p>Lesson 8 focuses on incident response planning, the incident response lifecycle, procedures, post-incident activities, digital forensics, legal concerns, and recovery.</p><p>So if Lesson 7 was about <strong>communicating vulnerabilities</strong>, Lesson 8 is about:</p><h1><strong>Responding when something has actually gone wrong.</strong></h1><p>And this is a huge topic for both <strong>CompTIA Security+</strong> and <strong>CySA+</strong>.</p><div><hr></div><h1><strong>First things first&#8230; what is an incident?</strong></h1><p>This matters more than people think.</p><p>Because not every weird computer issue is automatically a security incident.</p><p>Sometimes:</p><ul><li><p>an app crashes</p></li><li><p>a user forgets their password</p></li><li><p>a printer stops working</p></li><li><p>Wi-Fi acts dumb for no reason</p></li></ul><p>Annoying? Yes.<br>Cyber incident? Not always.</p><p>Lesson 8 points out that NIST describes an incident as:</p><blockquote><p><strong>&#8220;The act of violating an explicit or implied security policy.&#8221;</strong></p></blockquote><h2><strong>Simple definition</strong></h2><p>An incident is when something happens that <strong>threatens the confidentiality, integrity, or availability</strong> of systems or data.</p><p>So a help desk issue is not always a security incident.</p><p>But these definitely could be:</p><ul><li><p>malware infection</p></li><li><p>suspicious logins</p></li><li><p>unauthorized access</p></li><li><p>ransomware</p></li><li><p>data exfiltration</p></li><li><p>account compromise</p></li><li><p>weird outbound traffic</p></li><li><p>insider misuse</p></li></ul><p>That difference matters a lot on the exam and in real life.</p><div><hr></div><h1><strong>What is incident response?</strong></h1><h2><strong>Simple definition</strong></h2><p>Incident response is the process of <strong>preparing for, detecting, containing, investigating, and recovering from security incidents</strong>.</p><h2><strong>CompTIA-style idea</strong></h2><p>It&#8217;s about creating a plan to identify, investigate, and respond in a way that minimizes impact, protects assets, maintains security, supports business continuity, and protects reputation.</p><p>So basically:</p><h2><strong>Incident response = what your team does when things go sideways</strong></h2><p>And if you&#8217;re thinking:</p><blockquote><p>&#8220;Okay&#8230; so this is like cybersecurity emergency mode?&#8221;</p></blockquote><p>Yes.</p><p>That is exactly what this is.</p><div><hr></div><h1><strong>The 5 phases of incident response</strong></h1><h2><strong>This is one of the biggest takeaways from Lesson 8</strong></h2><p>One of the most important things in this lesson is the <strong>NIST Incident Response Life Cycle</strong>.</p><p>The slide on <strong>page 7</strong> lays it out really clearly as:</p><ol><li><p>Preparation</p></li><li><p>Detection and Analysis</p></li><li><p>Containment</p></li><li><p>Eradication and Recovery</p></li><li><p>Post-Incident Activity</p></li></ol><p>If you remember nothing else from this lesson, remember these five.</p><p>Let&#8217;s walk through them like a normal person.</p><div><hr></div><h1><strong>Phase 1: Preparation</strong></h1><h2><strong>You don&#8217;t wait for a fire to buy a fire extinguisher</strong></h2><p>This is the part that happens <strong>before</strong> the incident.</p><p>And honestly, it&#8217;s one of the most important parts.</p><p>Because if your organization has:</p><ul><li><p>no plan</p></li><li><p>no tools</p></li><li><p>no communication method</p></li><li><p>no roles</p></li><li><p>no procedures</p></li></ul><p>&#8230;then when an incident happens, everyone is just running around panicking.</p><p>And panic is not a security strategy.</p><p>Lesson 8 says preparation includes:</p><ul><li><p>creating resources and procedures</p></li><li><p>making systems more resilient</p></li><li><p>writing policies and procedures</p></li><li><p>setting up confidential lines of communication</p></li></ul><h3><strong>Simple definition</strong></h3><p>Preparation means getting ready <strong>before</strong> something bad happens.</p><h3><strong>Real-world example</strong></h3><p>Before a breach ever happens, a good security team should already know:</p><ul><li><p>who gets called first</p></li><li><p>where logs are collected</p></li><li><p>how to isolate a machine</p></li><li><p>who talks to leadership</p></li><li><p>who preserves evidence</p></li><li><p>what tools they&#8217;ll use</p></li></ul><p>That is preparation.</p><div><hr></div><h1><strong>Phase 2: Detection and Analysis</strong></h1><h2><strong>Did something actually happen&#8230; and how bad is it?</strong></h2><p>This is where your team starts figuring out whether something suspicious is just weird&#8230; or actually serious.</p><p>Lesson 8 says this phase includes:</p><ul><li><p>determining whether an incident has taken place</p></li><li><p>assessing severity (triage)</p></li><li><p>notifying stakeholders</p></li></ul><h2><strong>Simple definition</strong></h2><p>Detection and analysis is where you answer:</p><ul><li><p>Is this real?</p></li><li><p>What happened?</p></li><li><p>How bad is it?</p></li><li><p>What systems are involved?</p></li></ul><h3><strong>This is the &#8220;oh no&#8221; phase</strong></h3><p>This is where someone might notice:</p><ul><li><p>repeated failed logins</p></li><li><p>malware alerts</p></li><li><p>impossible travel logins</p></li><li><p>suspicious PowerShell</p></li><li><p>outbound connections to strange IPs</p></li><li><p>a user saying &#8220;my files won&#8217;t open anymore&#8221;</p></li></ul><p>Now the analyst has to investigate.</p><p>Not every alert is an incident.<br>But every real incident usually starts as <strong>some kind of signal</strong>.</p><p>That&#8217;s why analysts live in:</p><ul><li><p>logs</p></li><li><p>SIEMs</p></li><li><p>EDR tools</p></li><li><p>alerts</p></li><li><p>event timelines</p></li></ul><p>This is where the detective work begins.</p><div><hr></div><h1><strong>Phase 3: Containment</strong></h1><h2><strong>Stop the bleeding</strong></h2><p>Once you know something bad is happening, you don&#8217;t just sit there and admire the logs.</p><p>Now you need to stop it from spreading.</p><p>Lesson 8 says containment is about limiting the scope and magnitude of the incident and securing data while reducing immediate impact.</p><h2><strong>Simple definition</strong></h2><p>Containment means:</p><h2><strong>&#8220;Keep this from getting worse.&#8221;</strong></h2><h3><strong>Real-world example</strong></h3><p>If a machine is infected, containment might mean:</p><ul><li><p>taking it off the network</p></li><li><p>disabling a compromised account</p></li><li><p>blocking a malicious IP</p></li><li><p>isolating a server</p></li><li><p>shutting down access to a vulnerable app</p></li></ul><p>This phase is all about damage control.</p><p>And yes &#8212; sometimes this has to happen fast.</p><div><hr></div><h1><strong>Phase 4: Eradication and Recovery</strong></h1><h2><strong>Now we clean up the mess</strong></h2><p>Containment is not the end.</p><p>You may have stopped the damage from spreading, but the threat could still be sitting there.</p><p>Lesson 8 says eradication and recovery involve:</p><ul><li><p>removing or addressing the root cause</p></li><li><p>returning the system to a secure state</p></li><li><p>and repeating detection, containment, and eradication if needed until fully resolved</p></li></ul><h2><strong>Simple definition</strong></h2><p>This is the phase where you:</p><ul><li><p>remove the threat</p></li><li><p>fix what caused it</p></li><li><p>and safely bring systems back online</p></li></ul><h3><strong>Examples</strong></h3><p>This might include:</p><ul><li><p>deleting malware</p></li><li><p>reimaging a system</p></li><li><p>resetting passwords</p></li><li><p>removing persistence</p></li><li><p>restoring backups</p></li><li><p>patching the exploited weakness</p></li><li><p>hardening the system</p></li></ul><p>This is where security and IT operations usually work very closely together.</p><div><hr></div><h1><strong>Phase 5: Post-Incident Activity</strong></h1><h2><strong>What did we learn from this?</strong></h2><p>This phase gets skipped way too often in real life.</p><p>But it&#8217;s one of the most valuable parts.</p><p>Lesson 8 says post-incident activity (also called <strong>lessons learned</strong>) includes:</p><ul><li><p>analyzing the incident and the response</p></li><li><p>identifying how procedures and systems can be improved</p></li><li><p>documenting the incident</p></li><li><p>and using the results to improve future preparation</p></li></ul><h2><strong>Simple definition</strong></h2><p>This is the:</p><blockquote><p>&#8220;Okay&#8230; what do we need to do better next time?&#8221; phase</p></blockquote><p>And that matters because every incident is a chance to improve.</p><h3><strong>Good questions after an incident</strong></h3><ul><li><p>How did this happen?</p></li><li><p>What did we miss?</p></li><li><p>What worked well?</p></li><li><p>What slowed us down?</p></li><li><p>Do we need better alerts?</p></li><li><p>Better tools?</p></li><li><p>Better training?</p></li><li><p>Better policies?</p></li></ul><p>That&#8217;s how mature security teams get better over time.</p><div><hr></div><h1><strong>Quick memory trick for the 5 phases</strong></h1><p>If you want a simple way to remember them:</p><h2><strong>Prepare &#8594; Detect &#8594; Contain &#8594; Remove &#8594; Learn</strong></h2><p>That&#8217;s not the official wording, but it helps the flow make sense.</p><div><hr></div><h1><strong>Incident response planning: why having a plan matters</strong></h1><p>Lesson 8 makes it clear that incident response is not something you should improvise in the middle of a crisis.</p><p>It says planning includes:</p><ul><li><p>threat modeling</p></li><li><p>risk analysis</p></li><li><p>policy and process development</p></li><li><p>testing</p></li><li><p>simulations</p></li></ul><p>So a real incident response plan should not be:</p><blockquote><p>&#8220;We&#8217;ll figure it out if something happens.&#8221;</p></blockquote><p>That is a terrible plan.</p><p>A real IR plan should already define:</p><ul><li><p>what counts as an incident</p></li><li><p>who is responsible for what</p></li><li><p>who needs to be contacted</p></li><li><p>what tools are used</p></li><li><p>what steps happen in what order</p></li><li><p>how incidents get escalated</p></li></ul><p>Lesson 8 says common plan components include:</p><ul><li><p>incident response policies</p></li><li><p>incident response procedures</p></li><li><p>tools and resources</p></li><li><p>threat/incident identification</p></li><li><p>impact assessments</p></li><li><p>response plans</p></li><li><p>testing of response plans</p></li></ul><p>That&#8217;s a very exam-friendly list, by the way.</p><div><hr></div><h1><strong>What should an incident response policy include?</strong></h1><p>Lesson 8 says an IR policy should define:</p><ul><li><p>expectations and procedures</p></li><li><p>incident types to report</p></li><li><p>detailed steps</p></li><li><p>roles and responsibilities</p></li><li><p>communication protocols</p></li><li><p>response timelines</p></li><li><p>reporting timelines</p></li></ul><p>That&#8217;s basically your security team&#8217;s &#8220;if this happens, here&#8217;s how we move&#8221; document.</p><p>And honestly? That structure saves lives in cybersecurity.</p><p>Because when people are stressed, they don&#8217;t need mystery.<br>They need a plan.</p><div><hr></div><h1><strong>The tools that help incident response</strong></h1><p>Lesson 8 lists several tools and resources commonly used in incident response, including:</p><ul><li><p>SIEM</p></li><li><p>IDS</p></li><li><p>vulnerability scanners</p></li><li><p>NetFlow analyzers</p></li><li><p>infrastructure monitoring</p></li><li><p>proxies and gateways</p></li></ul><p>If you&#8217;ve been following the series, this should feel familiar.</p><p>Because by now we&#8217;ve already talked about:</p><ul><li><p>SIEM in earlier lessons</p></li><li><p>logging and monitoring</p></li><li><p>scanning</p></li><li><p>suspicious behavior</p></li><li><p>IoCs</p></li><li><p>vulnerability data</p></li></ul><p>That&#8217;s because incident response does <strong>not</strong> exist in isolation.</p><p>It depends on the work from previous lessons.</p><p>Incident response is really where all your earlier security visibility starts proving its value.</p><div><hr></div><h1><strong>Triage: not every incident is equal</strong></h1><p>Lesson 8 mentions <strong>triage</strong>, which is a very important concept. It says triage helps determine the scope of a security incident, and that playbooks and communication plans are essential for responding efficiently.</p><h2><strong>Simple definition</strong></h2><p>Triage means figuring out:</p><ul><li><p>what&#8217;s happening</p></li><li><p>how serious it is</p></li><li><p>what needs attention first</p></li></ul><h3><strong>Think of it like an emergency room</strong></h3><p>If one person has a paper cut and another person is not breathing, you don&#8217;t treat them in the same order.</p><p>Same idea in cybersecurity.</p><p>A low-risk phishing email is not the same as:</p><ul><li><p>domain admin compromise</p></li><li><p>ransomware spreading</p></li><li><p>active data theft</p></li><li><p>attacker persistence on a server</p></li></ul><p>Triage helps you prioritize response.</p><p>And yes &#8212; CompTIA absolutely likes testing this mindset.</p><div><hr></div><h1><strong>Playbooks: the cybersecurity cheat sheet during chaos</strong></h1><p>Lesson 8 says playbooks are invaluable for quickly and efficiently responding to incidents.</p><h2><strong>Simple definition</strong></h2><p>A playbook is basically a <strong>step-by-step response guide</strong> for a specific type of incident.</p><p>Examples:</p><ul><li><p>phishing playbook</p></li><li><p>ransomware playbook</p></li><li><p>malware infection playbook</p></li><li><p>insider threat playbook</p></li><li><p>suspicious login playbook</p></li></ul><h3><strong>Why playbooks matter</strong></h3><p>Because in a real incident, you don&#8217;t want to rely on memory alone.</p><p>You want a repeatable process.</p><p>That&#8217;s what makes teams faster and more consistent.</p><div><hr></div><h1><strong>Training and testing: because a plan is useless if nobody can use it</strong></h1><p>Lesson 8 says incident response should be tested through:</p><ul><li><p>tabletop exercises</p></li><li><p>mock incidents</p></li><li><p>full incident simulations</p></li></ul><p>This is huge.</p><p>Because having a written plan means nothing if the team has never practiced it.</p><h2><strong>Simple definition</strong></h2><p>Training and testing make sure your team can actually respond under pressure.</p><h3><strong>Quick breakdown</strong></h3><h3><strong>Tabletop exercise</strong></h3><p>People talk through what they would do.</p><h3><strong>Mock incident</strong></h3><p>More realistic and scenario-based.</p><h3><strong>Full simulation</strong></h3><p>Closest thing to the real deal.</p><p>And honestly? This is where you discover whether your plan is actually good or just looks nice in a PDF.</p><div><hr></div><h1><strong>BCDR: keeping the business alive while recovering</strong></h1><p>Lesson 8 also touches on <strong>Business Continuity (BC)</strong> and <strong>Disaster Recovery (DR)</strong>.</p><h2><strong>Business Continuity</strong></h2><p>How the organization keeps operating during and after a disaster.</p><h2><strong>Disaster Recovery</strong></h2><p>How the organization restores systems and services after the disruption.</p><h3><strong>Simple difference</strong></h3><h3><strong>BC = keep the business running</strong></h3><h3><strong>DR = recover the broken stuff</strong></h3><p>That distinction matters for both Security+ and CySA+.</p><div><hr></div><h1><strong>Incident response procedures: how incidents are actually worked</strong></h1><p>In the second half of the lesson, we get more hands-on.</p><p>Lesson 8 says incident response often starts by identifying <strong>Indicators of Compromise (IoCs)</strong>, and that IoCs are reactive and commonly come from logs or end-user reporting.</p><h2><strong>Simple definition</strong></h2><p>IoCs are signs that something suspicious or malicious may have happened.</p><p>Examples:</p><ul><li><p>strange outbound connections</p></li><li><p>suspicious hashes</p></li><li><p>malicious domains</p></li><li><p>weird login activity</p></li><li><p>known bad IP addresses</p></li><li><p>persistence artifacts</p></li><li><p>suspicious processes</p></li></ul><p>This ties back heavily to earlier lessons where we learned how to recognize suspicious activity and threat indicators.</p><p>So if Lesson 2 and Lesson 3 helped us <strong>see signs</strong>, Lesson 8 teaches us what to do <strong>after seeing them</strong>.</p><div><hr></div><h1><strong>SIEM and SOAR during incident response</strong></h1><p>Lesson 8 says SIEM tools are critical because they collect and process logs from many sources and help analysts prioritize alerts, while SOAR tools analyze outputs and automate next steps.</p><p>This is one of those moments where all the previous lessons start clicking together.</p><p>Because now you can see the chain:</p><ul><li><p>logs get collected</p></li><li><p>SIEM correlates them</p></li><li><p>analysts investigate</p></li><li><p>SOAR can automate parts of the response</p></li><li><p>playbooks help guide action</p></li></ul><p>That&#8217;s a real SOC workflow.</p><p>And if you remember <strong>Lesson 4</strong>, that was the lesson where we talked about automation, SIEM, SOAR, and process improvement. So now Lesson 8 is showing you those tools <strong>in action during a real incident</strong>.</p><p>That&#8217;s a great &#8220;light bulb&#8221; moment for beginners.</p><div><hr></div><h1><strong>Digital forensics: collecting the story after the attack</strong></h1><p>Now we move into one of the coolest parts of the lesson.</p><h2><strong>Digital forensics</strong></h2><p>Lesson 8 says some of the quick decisions in a forensic response include:</p><ul><li><p>ensuring safety</p></li><li><p>preventing further damage</p></li><li><p>determining whether it&#8217;s a primary or secondary attack</p></li><li><p>avoiding alerting the attacker</p></li><li><p>preserving forensic evidence</p></li></ul><h2><strong>Simple definition</strong></h2><p>Digital forensics is the process of collecting and analyzing digital evidence so you can understand what happened.</p><p>And this is important because after an incident, you usually want answers like:</p><ul><li><p>How did they get in?</p></li><li><p>What did they touch?</p></li><li><p>What did they steal?</p></li><li><p>Did they leave persistence?</p></li><li><p>Are they still here?</p></li></ul><p>That&#8217;s what forensic work helps answer.</p><div><hr></div><h1><strong>The 4 phases of digital forensics</strong></h1><p>Lesson 8 says a forensic investigation includes four phases:</p><ol><li><p>Identification</p></li><li><p>Collection</p></li><li><p>Analysis</p></li><li><p>Reporting/Presentation</p></li></ol><h2><strong>Simple version</strong></h2><h3><strong>Identification</strong></h3><p>Figure out what evidence matters.</p><h3><strong>Collection</strong></h3><p>Preserve and gather it safely.</p><h3><strong>Analysis</strong></h3><p>Figure out what the evidence means.</p><h3><strong>Reporting</strong></h3><p>Explain your findings clearly.</p><p>That last one matters a lot, because evidence that is not documented well can become way less useful.</p><div><hr></div><h1><strong>Data acquisition: grab the right evidence in the right order</strong></h1><p>Lesson 8 also mentions <strong>data acquisition</strong>, which includes copying volatile and nonvolatile storage, and collecting data from most volatile to least volatile.</p><p>That means things like:</p><ul><li><p>RAM</p></li><li><p>active network connections</p></li><li><p>running processes</p></li><li><p>temp files</p></li><li><p>disk data</p></li></ul><p>Some evidence disappears quickly, so timing matters.</p><p>That&#8217;s why incident response and forensics often go hand in hand.</p><div><hr></div><h1><strong>Legal concerns: yes, this part matters too</strong></h1><p>A lot of beginners skip over the legal side because it sounds boring.</p><p>Don&#8217;t.</p><p>Because this part can absolutely matter in the real world.</p><p>Lesson 8 says legal process requirements include:</p><ul><li><p>evidence preservation</p></li><li><p>chain of custody</p></li><li><p>legal holds</p></li><li><p>e-discovery</p></li></ul><h2><strong>Simple definitions</strong></h2><h3><strong>Evidence preservation</strong></h3><p>Don&#8217;t destroy or alter the evidence.</p><h3><strong>Chain of custody</strong></h3><p>Document who handled the evidence and when.</p><h3><strong>Legal hold</strong></h3><p>Keep relevant data from being deleted.</p><h3><strong>e-Discovery</strong></h3><p>Electronic data that may need to be reviewed for legal reasons.</p><p>If a real breach turns into:</p><ul><li><p>legal action</p></li><li><p>law enforcement involvement</p></li><li><p>internal investigation</p></li><li><p>regulatory review</p></li></ul><p>&#8230;this stuff matters a lot.</p><p>And CompTIA loves asking about it.</p><div><hr></div><h1><strong>Impact analysis: how bad was the damage?</strong></h1><p>Lesson 8 says impact analysis can include:</p><ul><li><p>organizational impact</p></li><li><p>localized impact</p></li><li><p>immediate impact</p></li><li><p>total impact</p></li></ul><h2><strong>Simple definition</strong></h2><p>Impact analysis asks:</p><h2><strong>&#8220;How much did this incident actually hurt us?&#8221;</strong></h2><p>That might include:</p><ul><li><p>downtime</p></li><li><p>lost money</p></li><li><p>damaged systems</p></li><li><p>lost productivity</p></li><li><p>stolen data</p></li><li><p>customer impact</p></li><li><p>legal risk</p></li><li><p>reputation damage</p></li></ul><p>This is how organizations move from &#8220;we had an incident&#8221; to &#8220;here&#8217;s what it actually cost.&#8221;</p><div><hr></div><h1><strong>Containment and recovery in plain English</strong></h1><p>Lesson 8 closes out with containment and recovery concepts like:</p><ul><li><p>containment</p></li><li><p>reimaging</p></li><li><p>recovery</p></li><li><p>remediation</p></li></ul><p>This is where we bring the environment back to normal.</p><p>Or better than normal.</p><p>Because ideally, after recovery, the environment is not just restored&#8230;</p><h2><strong>it is more secure than it was before the incident happened.</strong></h2><p>That is the goal.</p><div><hr></div><h1><strong>How Lesson 8 connects to the first 7 lessons</strong></h1><p>This lesson ties into almost everything we&#8217;ve learned so far.</p><p>And honestly, this is where the series starts to feel really connected.</p><div><hr></div><h2><strong>Lesson 1: Governance, risk, controls, patching</strong></h2><p>Lesson 1 gave us the foundation: governance, risk management, controls, hardening, patching, and attack surface reduction.</p><p>Lesson 8 builds on that by showing what happens when those controls fail or when a threat still gets through.</p><div><hr></div><h2><strong>Lesson 2: Threat actors, threat intel, IoCs, threat hunting</strong></h2><p>Lesson 2 taught us how to think like an analyst by recognizing threat behavior, IoCs, and attacker patterns.</p><p>Lesson 8 uses that directly during:</p><ul><li><p>detection</p></li><li><p>analysis</p></li><li><p>triage</p></li><li><p>investigation</p></li></ul><p>This is where those IoCs become part of a real response.</p><div><hr></div><h2><strong>Lesson 3: Systems, IAM, logging, visibility</strong></h2><p>Lesson 3 gave us visibility:</p><ul><li><p>logs</p></li><li><p>identity systems</p></li><li><p>access control</p></li><li><p>security monitoring</p></li></ul><p>Lesson 8 depends heavily on those things.</p><p>Because if you don&#8217;t have visibility, your incident response is basically guesswork.</p><div><hr></div><h2><strong>Lesson 4: Security operations, SIEM, SOAR, automation</strong></h2><p>Lesson 4 was all about making security operations more efficient and repeatable.</p><p>Lesson 8 is where those tools become battle-tested.</p><p>This is where SIEM and SOAR stop being &#8220;cool concepts&#8221; and become part of real incident handling.</p><div><hr></div><h2><strong>Lesson 5: Vulnerability scanning and assessments</strong></h2><p>Lesson 5 taught us how organizations proactively look for weaknesses.</p><p>Lesson 8 shows what happens when a weakness is exploited or when suspicious activity shows up after the fact.</p><div><hr></div><h2><strong>Lesson 6: Vulnerability analysis and prioritization</strong></h2><p>Lesson 6 taught us how to understand the severity and context of vulnerabilities.</p><p>Lesson 8 connects because incident responders often need to understand:</p><ul><li><p>what got exploited</p></li><li><p>how severe it was</p></li><li><p>and what the risk means during recovery</p></li></ul><div><hr></div><h2><strong>Lesson 7: Communicating vulnerability information</strong></h2><p>Lesson 7 taught us how to explain risk, findings, priorities, and remediation clearly.</p><p>Lesson 8 builds on that because incident response is not just technical work &#8212; it also requires:</p><ul><li><p>communication</p></li><li><p>escalation</p></li><li><p>reporting</p></li><li><p>stakeholder coordination</p></li><li><p>documentation</p></li></ul><p>So Lesson 7 and Lesson 8 actually fit together really well.</p><h3><strong>Lesson 7 = communicate the risk</strong></h3><h3><strong>Lesson 8 = respond when the risk becomes real</strong></h3><p>That&#8217;s a powerful connection.</p><div><hr></div><h1><strong>Final takeaway</strong></h1><p>If the first seven lessons helped us understand:</p><ul><li><p>how security works</p></li><li><p>how attackers operate</p></li><li><p>how to detect risk</p></li><li><p>how to find vulnerabilities</p></li><li><p>and how to communicate them&#8230;</p></li></ul><p>then <strong>Lesson 8</strong> is where all of that gets tested in the real world.</p><p>Because incident response is the moment where cybersecurity becomes more than theory.</p><p>It becomes action.</p><p>And one of the biggest things beginners need to understand is this:</p><h2><strong>Incident response is not just about fixing a broken computer.</strong></h2><p>It&#8217;s about:</p><ul><li><p>protecting the organization</p></li><li><p>minimizing damage</p></li><li><p>preserving evidence</p></li><li><p>restoring operations</p></li><li><p>and learning enough to do better next time</p></li></ul><p>That is real cybersecurity work.</p><div><hr></div><p>That wraps up <strong>Lesson 8: Incident Response Activities</strong>.</p><p>We covered:</p><ul><li><p>what an incident actually is</p></li><li><p>the 5 phases of incident response</p></li><li><p>planning and playbooks</p></li><li><p>SIEM and SOAR in action</p></li><li><p>digital forensics</p></li><li><p>legal concerns</p></li><li><p>impact analysis</p></li><li><p>containment and recovery</p></li></ul><p>And most importantly, we saw how this lesson connects back to the first seven lessons and pulls everything together into one bigger cybersecurity picture.</p><p>Thanks for learning with me, and I&#8217;ll see you next time as we keep building your cybersecurity foundation one lesson at a time.</p><h2><strong>See you in the next lesson.</strong></h2>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series-Lesson 7: Communicating Vulnerability Information]]></title><description><![CDATA[Finding the problem is important. Explaining it clearly is what gets it fixed.]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series-f4f</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series-f4f</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Wed, 01 Apr 2026 17:01:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yOCP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome back Everyone,</p><p>Up to this point, we&#8217;ve spent a lot of time learning how to <strong>spot risks, scan systems, analyze vulnerabilities, and understand what attackers might do</strong>. That&#8217;s all important. But Lesson 7 introduces a skill that often gets overlooked by beginners:</p><h2><strong>Communication.</strong></h2><p>And not the fluffy kind.<br>Not &#8220;good teamwork&#8221; on a poster.</p><p>I mean the real cybersecurity kind of communication where you can look at a vulnerability, understand the risk, and then explain it in a way that actually helps people make decisions.</p><p>Because in the real world, it&#8217;s not enough to say:</p><blockquote><p>&#8220;Hey, I found some vulnerabilities.&#8221;</p></blockquote><p>You also need to explain:</p><ul><li><p>what the issue is</p></li><li><p>how serious it is</p></li><li><p>what systems are affected</p></li><li><p>what should happen next</p></li><li><p>and what might stop the fix from happening right away</p></li></ul><p>That is the heart of <strong>Lesson 7: Communicating Vulnerability Information</strong>. The lesson focuses on vulnerability reporting, reporting best practices, KPIs, action plans, and inhibitors to remediation.</p><div><hr></div><h1><strong>Why this lesson matters</strong></h1><p>Let&#8217;s make it real.</p><p>Imagine you run a vulnerability scan and it finds:</p><ul><li><p>5 critical vulnerabilities</p></li><li><p>11 high vulnerabilities</p></li><li><p>40 medium vulnerabilities</p></li></ul><p>Now imagine you send that raw output to your boss, the IT manager, and the system admins with no explanation.</p><p>What happens?</p><p>Usually one of three things:</p><ul><li><p>they get confused</p></li><li><p>they ignore it</p></li><li><p>or they waste time trying to figure out what matters first</p></li></ul><p>That&#8217;s why vulnerability reporting exists. Its purpose is to make sure the organization understands the risks in its IT infrastructure and the appropriate mitigations. The lesson also says reports can be simple summaries or more detailed reports with specific mitigations.</p><p>So this lesson is really teaching you how to move from:</p><blockquote><p>&#8220;I found a problem.&#8221;</p></blockquote><p>to:</p><blockquote><p>&#8220;Here&#8217;s what the problem means, and here&#8217;s what we should do next.&#8221;</p></blockquote><div><hr></div><h1><strong>What is vulnerability reporting?</strong></h1><p>Vulnerability reporting is the process of taking security findings and turning them into something people can understand and act on.</p><h2><strong>CompTIA-style idea</strong></h2><p>It helps the organization become aware of weaknesses, improve response, strengthen security posture, and support compliance efforts.</p><p>So think of vulnerability reporting like this:</p><p>A vulnerability scanner is like a metal detector on the beach.<br>It can tell you that <strong>something is there</strong>.</p><p>But a report is the person who says:</p><ul><li><p>here&#8217;s what we found</p></li><li><p>here&#8217;s where it is</p></li><li><p>here&#8217;s how dangerous it is</p></li><li><p>and here&#8217;s what we should do about it</p></li></ul><p>Without that second part, the scan is just noise.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yOCP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yOCP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!yOCP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!yOCP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!yOCP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yOCP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:447037,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/192630924?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yOCP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!yOCP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!yOCP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!yOCP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778b9df4-568b-4919-905c-8cf80b4f63b1_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Lesson 7 points out three common report types: a <strong>vulnerability management dashboard</strong>, a <strong>vulnerability summary report</strong>, and a <strong>detailed vulnerability report</strong>. </p><h2><strong>1. Dashboard</strong></h2><p>This is the quick-glance version.</p><p>It might show:</p><ul><li><p>how many critical findings exist</p></li><li><p>whether vulnerabilities are trending up or down</p></li><li><p>which systems keep showing up the most</p></li><li><p>what needs attention right now</p></li></ul><p>This is good for managers, team leads, and anyone who needs fast visibility.</p><h3><strong>Think about it like this:</strong></h3><p>If your network had a &#8220;check engine&#8221; screen, the dashboard is that screen.</p><div><hr></div><h2><strong>2. Summary report</strong></h2><p>This gives the big picture.</p><p>It usually answers:</p><ul><li><p>What did we scan?</p></li><li><p>What did we find?</p></li><li><p>What is the overall risk?</p></li><li><p>What should we prioritize?</p></li></ul><p>This is useful when leadership wants the story without having to read every technical detail.</p><div><hr></div><h2><strong>3. Detailed report</strong></h2><p>This is for the people who actually have to fix the issue.</p><p>Lesson 7 says report content can include vulnerabilities involving operating systems, hypervisors, databases, desktop apps, mobile devices, web platforms, network devices, and more. It can also include audit findings, third-party assessments, physical security risks, and manual endpoint evaluations by analysts.</p><p>That means a detailed report is where the real technical work lives.</p><p>This is where you&#8217;ll likely see:</p><ul><li><p>the vulnerability name</p></li><li><p>the affected host</p></li><li><p>severity</p></li><li><p>evidence</p></li><li><p>recommendations</p></li><li><p>mitigation details</p></li></ul><p>So if the dashboard is the movie trailer, the detailed report is the full director&#8217;s cut.</p><div><hr></div><h1><strong>Quick check-in</strong></h1><p>If you&#8217;re brand new to this stuff, here&#8217;s the simplest way to remember it:</p><h3><strong>Dashboard = quick view</strong></h3><h3><strong>Summary = big picture</strong></h3><h3><strong>Detailed report = fix-it view</strong></h3><p>That one idea alone can help you answer exam questions and understand real-world workflows better.</p><div><hr></div><h1><strong>What should a good vulnerability report include?</strong></h1><p>Lesson 7 says a good report should contain:</p><ul><li><p>details about the type of vulnerability</p></li><li><p>the number of instances</p></li><li><p>the affected systems</p></li><li><p>the risk levels</p></li><li><p>recommendations</p></li></ul><p>That&#8217;s actually a great checklist.</p><p>Here&#8217;s the beginner-friendly version:</p><h2>A good report should answer:</h2><ul><li><p><strong>What is wrong?</strong></p></li><li><p><strong>Where is it?</strong></p></li><li><p><strong>How bad is it?</strong></p></li><li><p><strong>How many systems are affected?</strong></p></li><li><p><strong>What should we do next?</strong></p></li></ul><p>If a report doesn&#8217;t help answer those questions, it&#8217;s probably not very helpful.</p><p>And that matters because cybersecurity isn&#8217;t just about being technically correct.<br>It&#8217;s about being <strong>useful</strong>.</p><div><hr></div><h1><strong>Best practices: how to make reports actually helpful</strong></h1><p>Lesson 7 doesn&#8217;t just say &#8220;make a report.&#8221; It also talks about doing reporting the right way.</p><p>It says to:</p><ul><li><p>use appropriate tools</p></li><li><p>identify reporting needs first</p></li><li><p>select tools based on those needs</p></li><li><p>be consistent</p></li><li><p>create policies and procedures</p></li><li><p>generate reports on a regular schedule</p></li></ul><p>It also says consistency matters in format, color-coding, critical information focus, and automation.</p><h2><strong>Why consistency matters</strong></h2><p>Imagine one report uses red for &#8220;critical,&#8221; another uses orange, and another uses no color at all.</p><p>Now people are wasting brainpower just trying to read the report instead of fixing the problem.</p><p>Consistency helps teams move faster.</p><h2><strong>Why automation matters</strong></h2><p>Automation makes reporting more reliable and easier to maintain.</p><p>That means fewer manual mistakes and less time copying data around.</p><p>And if you remember from <strong>Lesson 4</strong>, automation, SIEMs, SOAR tools, and repeatable processes were a huge part of improving security operations. Lesson 4 emphasized that automation makes operations more efficient, consistent, reliable, and cost-effective.</p><p>So Lesson 7 kind of answers the question:</p><blockquote><p>&#8220;Okay, after all that automation and scanning&#8230; how do we present the results?&#8221;</p></blockquote><div><hr></div><h1><strong>Report formats matter too</strong></h1><p>Lesson 7 points out that vulnerability reports can come in different formats:</p><ul><li><p>plain text</p></li><li><p>CSV and XML</p></li><li><p>HTML</p></li><li><p>PDF</p></li></ul><p>That may sound small, but it matters.</p><h2><strong>Plain text</strong></h2><p>Great for command line use and searching.</p><h2><strong>CSV or XML</strong></h2><p>Useful for importing and exporting data between tools.</p><h2><strong>HTML</strong></h2><p>Better visual presentation in a browser.</p><h2><strong>PDF</strong></h2><p>Easy to print, share, and hand off formally.</p><h3><strong>Simple way to think about it</strong></h3><p>Different formats exist because different people consume information differently.</p><p>Analysts may love raw text.<br>Managers may want a clean PDF.<br>Tools may need XML or CSV.</p><p>Same information. Different delivery.</p><div><hr></div><h1><strong>Risk score and priority: not every finding is equal</strong></h1><p>Lesson 7 explains that risk scores help measure risk levels, prioritize work, evaluate security posture, and even compare posture across organizations in the same sector.</p><p>This connects directly to <strong>Lesson 6</strong>.</p><p>In Lesson 6, we learned about CVSS, vulnerability validation, contextual scoring, and the fact that a vulnerability score is not always the whole story. CVSS helps prioritize remediation, but context such as patch availability, asset value, exploitability, and environment can affect the true priority.</p><p>So now in Lesson 7, we&#8217;re taking that scoring knowledge and asking:</p><h2><strong>How do we communicate the priority clearly?</strong></h2><p>Because a vulnerability may be &#8220;high&#8221; on paper, but maybe it is:</p><ul><li><p>on an internet-facing server</p></li><li><p>on a sensitive system</p></li><li><p>tied to critical business operations</p></li><li><p>easy to exploit</p></li></ul><p>That changes how fast it needs attention.</p><h3><strong>Real-world example</strong></h3><p>A critical vulnerability on a public web server should probably be handled faster than the same vulnerability on a lab system with no outside access.</p><p>Same technical weakness.<br>Very different business urgency.</p><p>That&#8217;s why CySA+ pushes you to think beyond the number and focus on the context.</p><div><hr></div><h1><strong>Mitigations: what do we do about the vulnerability?</strong></h1><p>Lesson 7 says mitigation often includes identifying a required patch or describing a workaround, whether permanent or temporary.</p><p>This part matters because a report should not stop at:</p><blockquote><p>&#8220;Here is the bad thing.&#8221;</p></blockquote><p>It should also say:</p><blockquote><p>&#8220;Here is the next step.&#8221;</p></blockquote><p>That next step might be:</p><ul><li><p>install a patch</p></li><li><p>change a configuration</p></li><li><p>block a port</p></li><li><p>segment the network</p></li><li><p>disable a risky feature</p></li><li><p>use a compensating control until a patch is ready</p></li></ul><h3><strong>Interactive thought</strong></h3><p>If you found a critical flaw in a server that cannot be patched until next week, what would you do today?</p><p>That&#8217;s the kind of thinking this lesson wants from you.</p><p>You might:</p><ul><li><p>restrict access</p></li><li><p>monitor it more closely</p></li><li><p>isolate it</p></li><li><p>add firewall rules</p></li><li><p>document the risk and track it</p></li></ul><p>That is analyst thinking.</p><div><hr></div><h1><strong>Top 10 lists: why trends matter</strong></h1><p>Lesson 7 also talks about Top 10 lists and says they help highlight potential problems and focus on important activities, trends, or environmental changes. It gives examples like:</p><ul><li><p>vulnerabilities by host</p></li><li><p>vulnerabilities by count</p></li><li><p>traffic volume by device</p></li><li><p>protocols by volume</p></li><li><p>top external IP connections</p></li><li><p>email volume by user</p></li><li><p>malware alerts by user</p></li></ul><p>This is such a practical concept.</p><p>Because sometimes the smartest question in cybersecurity is not:</p><blockquote><p>&#8220;What happened once?&#8221;</p></blockquote><p>It&#8217;s:</p><blockquote><p>&#8220;What keeps showing up over and over again?&#8221;</p></blockquote><p>If one host always appears in the Top 10, that matters.<br>If one user keeps triggering malware alerts, that matters.<br>If one protocol suddenly spikes in volume, that matters.</p><p>Patterns tell stories.</p><p>This also ties back to <strong>Lesson 2</strong>, where we explored threat intelligence, threat hunting, and indicators of compromise. Lesson 2 taught that threat hunting uses an &#8220;assume breach&#8221; mindset and relies on indicators of compromise from logs, monitoring tools, endpoint tools, and SIEM platforms.</p><p>So Lesson 7 is really showing how findings and trends get packaged into something useful.</p><div><hr></div><h1><strong>Compliance reporting is part of this too</strong></h1><p>Lesson 7 says regulatory compliance reports may include policies, procedures, audit results, employee training records, and risk assessments, while internal compliance reports may include endpoint patching, configuration, procedure adherence, vendor practices, change management, and user account management.</p><p>This ties strongly into <strong>Lesson 5</strong>, where we talked about standards and frameworks like NIST, ISO, CIS Benchmarks, OWASP, PCI DSS, and privacy regulations.</p><p>So vulnerability reporting is not just for internal security teams.<br>Sometimes it also supports:</p><ul><li><p>audits</p></li><li><p>legal requirements</p></li><li><p>regulatory expectations</p></li><li><p>industry standards</p></li></ul><p>That means reporting is not optional busywork.<br>Sometimes it is part of keeping the organization compliant and accountable.</p><div><hr></div><h1><strong>KPI: how do we know if security is improving?</strong></h1><p>Lesson 7 introduces <strong>Key Performance Indicators</strong>, or KPIs. It says KPIs help measure progress toward goals, identify areas for improvement, and measure the effectiveness of a cybersecurity program.</p><p>KPIs are basically the scoreboard.</p><p>They help answer:</p><ul><li><p>Are we improving?</p></li><li><p>Are we detecting faster?</p></li><li><p>Are we reducing risk?</p></li><li><p>Are we putting resources in the right place?</p></li></ul><p>Lesson 7 gives examples such as:</p><ul><li><p>incidents tracked over time</p></li><li><p>detection time</p></li><li><p>indicators of compromise</p></li><li><p>number of threats</p></li><li><p>risk assessment results</p></li><li><p>resource allocation</p></li></ul><h3><strong>Beginner example</strong></h3><p>Let&#8217;s say last quarter your team had:</p><ul><li><p>20 critical findings open for 30+ days</p></li><li><p>slow detection times</p></li><li><p>repeated malware hits on the same systems</p></li></ul><p>And this quarter:</p><ul><li><p>open critical findings are down</p></li><li><p>detection time improved</p></li><li><p>repeated issues decreased</p></li></ul><p>That suggests the security program is getting stronger.</p><p>KPIs turn &#8220;I think we are doing better&#8221; into &#8220;the data suggests we are doing better.&#8221;</p><div><hr></div><h1><strong>But KPI data can be tricky</strong></h1><p>Lesson 7 also warns that KPIs are not perfect. It says incidents can be subjective, false positives happen, the cybersecurity landscape data may be inaccurate, irrelevant data can get in the way, and KPI-based decision-making is complicated.</p><p>This is super important for beginners.</p><p>Because numbers can lie if you don&#8217;t understand them.</p><p>For example:</p><ul><li><p>more alerts might mean things are worse</p></li><li><p>or it could mean your visibility improved</p></li><li><p>or your SIEM got tuned better</p></li><li><p>or your team is finally catching what used to be missed</p></li></ul><p>So KPI thinking is not just about staring at a graph.</p><p>It&#8217;s about asking:</p><h2><strong>What does this trend really mean?</strong></h2><div><hr></div><h1><strong>Action plans: the bridge between finding and fixing</strong></h1><p>Now we hit one of the most practical parts of the lesson.</p><p>Lesson 7 says action plans provide direction and focus, help meet strategic goals, frame progress, outline steps, resources, and timelines, and should be tailored to the organization and updated as the environment changes.</p><h2><strong>Simple definition</strong></h2><p>An action plan is the &#8220;now what?&#8221; document.</p><p>Not just:</p><blockquote><p>&#8220;These vulnerabilities exist.&#8221;</p></blockquote><p>But:</p><blockquote><p>&#8220;Here is how we&#8217;re going to deal with them.&#8221;</p></blockquote><p>The lesson lists common action plan outcomes such as:</p><ul><li><p>establishing security policies</p></li><li><p>training staff</p></li><li><p>software patching</p></li><li><p>compensating controls</p></li><li><p>configuration management</p></li></ul><p>That means action plans turn findings into movement.</p><h3><strong>Quick example</strong></h3><p>If the issue is users clicking phishing links, the action plan might include:</p><ul><li><p>awareness training</p></li><li><p>email filtering improvements</p></li><li><p>MFA rollout</p></li></ul><p>If the issue is outdated systems, the action plan might include:</p><ul><li><p>patching schedule</p></li><li><p>maintenance window planning</p></li><li><p>asset replacement timeline</p></li></ul><p>This is why cybersecurity is not just detection.<br>It is also follow-through.</p><div><hr></div><h1><strong>Why remediation gets delayed in the real world</strong></h1><p>This part is big because it teaches realism.</p><p>Lesson 7 explains that remediation can be slowed down by:</p><ul><li><p>MoUs</p></li><li><p>SLAs</p></li><li><p>governance</p></li><li><p>costs</p></li><li><p>operational pressure</p></li><li><p>stakeholder conflicts</p></li><li><p>business process interruption</p></li><li><p>degraded functionality</p></li><li><p>legacy systems</p></li><li><p>proprietary systems</p></li></ul><p>If you are new to cybersecurity, this can feel frustrating at first.</p><p>You might think:</p><blockquote><p>&#8220;If the vulnerability is bad, why not just fix it immediately?&#8221;</p></blockquote><p>Because the real world is messy.</p><p>Maybe patching breaks a critical business app.<br>Maybe a legacy system cannot handle modern updates.<br>Maybe a vendor controls the software.<br>Maybe downtime would cost a ton of money.<br>Maybe leadership is balancing risk against operations.</p><p>That does <strong>not</strong> mean security is being ignored.<br>It means cybersecurity has to work inside business reality.</p><p>And honestly, that&#8217;s one of the biggest differences between textbook security and real-world security.</p><div><hr></div><h1><strong>A quick beginner scenario</strong></h1><p>Let&#8217;s say you are a junior analyst and you find an old server with a serious vulnerability.</p><p>Your first thought might be:</p><blockquote><p>&#8220;Patch it now.&#8221;</p></blockquote><p>But then you learn:</p><ul><li><p>it supports payroll</p></li><li><p>it only works with an old application</p></li><li><p>the vendor no longer supports it</p></li><li><p>replacing it takes months</p></li></ul><p>Now the answer changes.</p><p>Maybe the real action plan is:</p><ul><li><p>restrict access</p></li><li><p>segment the system</p></li><li><p>monitor it closely</p></li><li><p>document the exception</p></li><li><p>build a replacement plan</p></li></ul><p>That&#8217;s still security work.<br>It&#8217;s just smarter and more realistic security work.</p><div><hr></div><h1><strong>How Lesson 7 connects to the first 6 lessons</strong></h1><p>This is where everything starts coming together.</p><h2><strong>Lesson 1: Governance, risk, controls, patching</strong></h2><p>Lesson 1 taught us the importance of governance, risk responses, control types, attack surface reduction, patching, configuration management, and maintenance windows.</p><p>Lesson 7 builds on that by showing how we communicate risk, report findings, recommend mitigations, and explain why a control or patch matters.</p><div><hr></div><h2><strong>Lesson 2: Threat actors, threat intel, IoCs, threat hunting</strong></h2><p>Lesson 2 introduced threat actors, OSINT, threat intelligence sharing, IoCs, and threat hunting.</p><p>Lesson 7 connects because once you find suspicious activity or patterns, someone has to write it up prioritize it and communicate it clearly.</p><div><hr></div><h2><strong>Lesson 3: Systems, IAM, logging, visibility</strong></h2><p>Lesson 3 taught us about system hardening, zero trust, IAM, DLP, PKI, and centralized logging.</p><p>Lesson 7 uses the data from those systems and logs to produce dashboards, reports, and measurable security outcomes.</p><div><hr></div><h2><strong>Lesson 4: Security operations and automation</strong></h2><p>Lesson 4 focused on automation, SIEM, SOAR, enrichment, orchestration, and process consistency.</p><p>Lesson 7 is where the outputs of those tools become understandable reports, trends, KPIs, and action plans.</p><div><hr></div><h2><strong>Lesson 5: Vulnerability scanning</strong></h2><p>Lesson 5 taught us how scanning works, the difference between internal and external scans, credentialed and noncredentialed scans, passive and active methods, baselines, and compliance scans.</p><p>Lesson 7 is basically what happens after the scan: now you need to explain the results in a way that leads to decisions.</p><div><hr></div><h2><strong>Lesson 6: Vulnerability analysis and scoring</strong></h2><p>Lesson 6 taught us about CVSS, SCAP, validation, false positives, true positives, exploitability, and context.</p><p>Lesson 7 takes that analysis and turns it into business-facing communication: what matters, what comes first, and what the plan should be.</p><div><hr></div><h1><strong>Final takeaway</strong></h1><p>If Lessons 1 through 6 taught us how to <strong>find</strong>, <strong>understand</strong>, and <strong>prioritize</strong> security issues, then Lesson 7 teaches us how to <strong>communicate</strong> those issues so they can actually be addressed.</p><p>And that&#8217;s a real cybersecurity skill.</p><p>Because the best analysts are not just the ones who find the most problems.</p><p>They are the ones who can say:</p><ul><li><p>here&#8217;s the issue</p></li><li><p>here&#8217;s why it matters</p></li><li><p>here&#8217;s how urgent it is</p></li><li><p>here&#8217;s what we should do</p></li><li><p>and here&#8217;s what might get in the way</p></li></ul><p>That is how you help make an organization safer.</p><p>That wraps up Lesson 7.</p><p>We covered vulnerability reporting, report types, best practices, KPIs, action plans, and the very real reasons remediation can get delayed. More importantly, we saw how this lesson connects back to the first six lessons and helps pull everything together into one bigger cybersecurity picture.</p><p>Thanks for learning with me, and I&#8217;ll see you next time as we keep building these cybersecurity foundations one lesson at a time.</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series – Lesson 6 Performing Vulnerability Analysis ]]></title><description><![CDATA[How Security Teams Decide What&#8217;s Actually Dangerous]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series-79d</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series-79d</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Fri, 27 Mar 2026 16:14:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pw08!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5330c939-092d-4890-80cb-481d0b7174a4_240x240.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In cybersecurity, finding vulnerabilities is only half the job.</p><p>The other half and honestly the more important half  is figuring out <strong>which weaknesses are actually dangerous, which ones can wait, and which ones aren&#8217;t even real problems at all</strong>.</p><p>That&#8217;s what <strong>vulnerability analysis</strong> is all about.</p><p>A company might run a scan and get back <strong>hundreds or even thousands of findings</strong>. But security teams can&#8217;t patch everything at once. They have to figure out:</p><ul><li><p>What is <strong>critical</strong></p></li><li><p>What is <strong>actually exploitable</strong></p></li><li><p>What affects the <strong>most important systems</strong></p></li><li><p>What is a <strong>false alarm</strong></p></li><li><p>And what looks bad on paper but isn&#8217;t a big real-world threat</p></li></ul><p>That&#8217;s the difference between just <strong>collecting security data</strong> and actually doing <strong>cyber defense work</strong>.</p><p>This lesson covers the systems and thought process analysts use to make those decisions, including <strong>SCAP</strong>, <strong>CVSS</strong>, validation concepts, and <strong>context-aware risk analysis</strong></p><div><hr></div><h1><strong>Why This Lesson Matters</strong></h1><p>If Lesson 5 was about <strong>scanning and finding weaknesses</strong>, Lesson 6 is about <strong>understanding those weaknesses</strong>.</p><p>This is where analysts start asking smarter questions like:</p><ul><li><p><em>How bad is this really?</em></p></li><li><p><em>Can an attacker actually use this?</em></p></li><li><p><em>How easy is it to exploit?</em></p></li><li><p><em>Does this matter in <strong>our</strong> environment?</em></p></li></ul><p>That&#8217;s real cybersecurity work.</p><p>Because in the real world, a &#8220;critical&#8221; vulnerability on one system might be a huge emergency&#8230;</p><p>&#8230;but on another system, it might barely matter at all.</p><p>And that&#8217;s exactly why analysts need more than just a scanner. They need <strong>judgment</strong>.</p><div><hr></div><h1><strong>1) What Is Vulnerability Analysis?</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>Vulnerability analysis</strong> is the process of <strong>evaluating identified vulnerabilities</strong> to determine their <strong>severity, exploitability, impact, and remediation priority</strong>.</p><h2><strong>Simple Definition</strong></h2><p><strong>Out of everything we found, what should we care about first?&#8221;</strong></p><p>A vulnerability scanner can tell you:</p><ul><li><p>&#8220;This server has a flaw.&#8221;</p></li><li><p>&#8220;This application is outdated.&#8221;</p></li><li><p>&#8220;This system is misconfigured.&#8221;</p></li></ul><p>But the scanner <strong>doesn&#8217;t fully understand your business environment</strong>.</p><p>That&#8217;s where the <strong>analyst</strong> comes in.</p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>Imagine a vulnerability scan finds:</p><ul><li><p>A <strong>critical remote code execution flaw</strong> on a test lab server</p></li><li><p>A <strong>medium vulnerability</strong> on the company&#8217;s payroll server</p></li><li><p>A <strong>low-severity issue</strong> on a public-facing VPN portal</p></li></ul><p>Which one matters most?</p><p>At first glance, you might say the <strong>critical</strong> one.</p><p>But maybe that &#8220;critical&#8221; server:</p><ul><li><p>is <strong>offline</strong></p></li><li><p>is <strong>air-gapped</strong></p></li><li><p>has <strong>no internet access</strong></p></li><li><p>and is used only for isolated testing</p></li></ul><p>Meanwhile, the &#8220;medium&#8221; issue might be sitting on a <strong>business-critical production server</strong>.</p><p>That&#8217;s why analysts don&#8217;t just patch based on labels.</p><p>They patch based on <strong>risk + context</strong>.</p><div><hr></div><h1><strong>2) Why Security Teams Need Standards</strong></h1><p>If every security vendor described vulnerabilities differently, things would become a mess fast.</p><p>One tool might say:</p><ul><li><p>&#8220;Severe&#8221;</p></li><li><p>&#8220;Very Dangerous&#8221;</p></li><li><p>&#8220;Urgent&#8221;</p></li><li><p>&#8220;High-ish&#8221;</p></li><li><p>&#8220;Bad, but maybe not bad&#8221;</p></li></ul><p>That&#8217;s not scalable.</p><p>So the cybersecurity industry uses <strong>standardized ways to identify, describe, and score vulnerabilities</strong>.</p><p>That&#8217;s where <strong>SCAP</strong>, <strong>CVE</strong>, <strong>CPE</strong>, <strong>CCE</strong>, and <strong>CVSS</strong> come in</p><p>Think of these as the <strong>common language of vulnerability management</strong>.</p><div><hr></div><h1><strong>3) SCAP &#8211; The &#8220;Cybersecurity Filing System&#8221;</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>SCAP (Security Content Automation Protocol)</strong> is a <strong>suite of open standards</strong> used to standardize the way security tools identify, describe, measure, and report <strong>vulnerabilities and misconfigurations</strong>.</p><h2><strong>Simple Definition</strong></h2><p>SCAP is basically:<strong>A standardized system that helps security tools speak the same language.</strong></p><p>Instead of every scanner, SIEM, and compliance tool making up its own naming system, SCAP helps them organize security findings in a way that&#8217;s <strong>consistent and machine-readable</strong>.</p><div><hr></div><h2><strong>What SCAP Helps Standardize</strong></h2><p>SCAP helps standardize how tools identify:</p><ul><li><p><strong>Software flaws</strong></p></li><li><p><strong>Misconfigurations</strong></p></li><li><p><strong>Known vulnerabilities</strong></p></li><li><p><strong>Security checklists</strong></p></li><li><p><strong>System names</strong></p></li><li><p><strong>Compliance benchmarks</strong></p></li></ul><div><hr></div><h2><strong>Real-World Example</strong></h2><p>Imagine your company uses:</p><ul><li><p><strong>Nessus</strong> for scanning</p></li><li><p><strong>Qualys</strong> for compliance</p></li><li><p><strong>Wazuh</strong> for monitoring</p></li><li><p><strong>A SIEM</strong> for alerting</p></li></ul><p>Without standardization, every tool might describe the same issue differently.</p><p>SCAP helps make sure all those tools can say:</p><blockquote><p>&#8220;Yep, we&#8217;re all talking about the same vulnerability on the same software.&#8221;</p></blockquote><p>That makes reporting, automation, patching, and auditing way easier.</p><div><hr></div><h1><strong>4) Important SCAP Languages and Formats</strong></h1><p>SCAP isn&#8217;t one single file or one single code. It&#8217;s more like a <strong>toolbox</strong> of standards.</p><p>Some of the most important ones are:</p><ul><li><p><strong>OVAL</strong></p></li><li><p><strong>ARF</strong></p></li><li><p><strong>XCCDF</strong></p></li></ul><p>Let&#8217;s break those down in normal human language.</p><div><hr></div><h2><strong>A) OVAL</strong></h2><h2><strong>Textbook Definition</strong></h2><p><strong>OVAL (Open Vulnerability and Assessment Language)</strong> is a standard used to describe <strong>system state, vulnerabilities, and configuration checks</strong> in a consistent way.</p><h2><strong>Simple Definition</strong></h2><p>OVAL is:<strong>A standard way to write security checks so tools know what to look for.</strong></p><p>It helps scanners and security tools check things like:</p><ul><li><p>Is a patch installed?</p></li><li><p>Is a bad service enabled?</p></li><li><p>Is a dangerous registry setting present?</p></li><li><p>Is a vulnerable version of software installed?</p></li></ul><h3><strong>Real-World Example</strong></h3><p>A scanner might use OVAL logic to check:</p><blockquote><p>&#8220;Does this Windows machine still have the vulnerable Print Spooler setting enabled?&#8221;</p></blockquote><p>If yes &#8594; flag it.</p><div><hr></div><h2><strong>B) ARF</strong></h2><h2><strong>Textbook Definition</strong></h2><p><strong>ARF (Asset Reporting Format)</strong> is a standardized format used to report security assessment results across different tools and platforms.</p><h2><strong>Simple Definition</strong></h2><p>ARF is:<strong>A common report format for sharing scan results.</strong></p><p>Instead of each tool outputting data in a weird custom way, ARF helps standardize reporting.</p><h3><strong>Real-World Example</strong></h3><p>If your organization exports vulnerability results from one platform and imports them into another dashboard, ARF helps those systems understand each other.</p><div><hr></div><h2><strong>C) XCCDF</strong></h2><h2><strong>Textbook Definition</strong></h2><p><strong>XCCDF (Extensible Configuration Checklist Description Format)</strong> is an XML-based standard used to define security checklists, benchmarks, and compliance checks.</p><h2><strong>Simple Definition</strong></h2><p>XCCDF is:<strong>A standardized checklist format for secure configurations.</strong></p><p>This is often tied to:</p><ul><li><p>hardening guides</p></li><li><p>compliance checks</p></li><li><p>benchmark enforcement</p></li></ul><h3><strong>Real-World Example</strong></h3><p>A company might use XCCDF-based benchmarks to verify whether systems comply with:</p><ul><li><p><strong>CIS Benchmarks</strong></p></li><li><p><strong>STIGs</strong></p></li><li><p>internal hardening baselines</p></li></ul><p>So if you&#8217;ve ever heard:</p><blockquote><p>&#8220;We need to check if this system meets the secure baseline&#8221;</p></blockquote><p>&#8230;XCCDF helps make that measurable.</p><div><hr></div><h1><strong>5) CVE &#8211; The Name Tag for Known Vulnerabilities</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>CVE (Common Vulnerabilities and Exposures)</strong> is a standardized system for assigning <strong>unique identifiers</strong> to publicly known vulnerabilities.</p><h2><strong>Simple Definition</strong></h2><p>A CVE is basically: <strong>The official ID number for a known security flaw.</strong></p><p>You&#8217;ll usually see them formatted like this:</p><ul><li><p><strong>CVE-2024-3094</strong></p></li><li><p><strong>CVE-2023-23397</strong></p></li><li><p><strong>CVE-2021-44228</strong></p></li></ul><p>The format is usually:</p><blockquote><p><strong>CVE-Year-Number</strong></p></blockquote><div><hr></div><h2><strong>Real-World Example</strong></h2><p>If a new vulnerability is discovered in Microsoft Exchange, it might get a CVE like:</p><blockquote><p><strong>CVE-2023-23397</strong></p></blockquote><p>Now everyone can refer to that same flaw using the same ID:</p><ul><li><p>security teams</p></li><li><p>vendors</p></li><li><p>patch bulletins</p></li><li><p>scanners</p></li><li><p>SIEM rules</p></li><li><p>threat intelligence reports</p></li></ul><p>Without CVEs, people would be saying things like:</p><blockquote><p>&#8220;That one Outlook exploit thingy from last month&#8230;&#8221;</p></blockquote><p>Not good.</p><div><hr></div><h1><strong>6) CPE &#8211; The Name Tag for Systems and Software</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>CPE (Common Platform Enumeration)</strong> is a standardized naming format used to identify <strong>software, operating systems, and hardware platforms</strong>.</p><h2><strong>Simple Definition</strong></h2><p>CPE is: <strong>The official naming system for products and platforms.</strong></p><p>This helps tools know <strong>what exactly is affected</strong>.</p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>Instead of vaguely saying:</p><blockquote><p>&#8220;Windows Server has an issue&#8221;</p></blockquote><p>A system can identify something more specific like:</p><ul><li><p>Microsoft Windows Server 2019</p></li><li><p>Apache HTTP Server 2.4.x</p></li><li><p>OpenSSL version X.X.X</p></li></ul><p>That matters because patching and vulnerability matching depend on <strong>exact versions</strong>.</p><div><hr></div><h1><strong>7) CCE &#8211; The Name Tag for Bad Configurations</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>CCE (Common Configuration Enumeration)</strong> is a standardized system for identifying <strong>security-related configuration issues</strong>.</p><h2><strong>Simple Definition</strong></h2><p>CCE is: <strong>A standardized ID for misconfigurations.</strong></p><p>While CVEs are for <strong>known software vulnerabilities</strong>, CCEs are more about <strong>bad settings and unsafe configurations</strong>.</p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>Examples of configuration issues might include:</p><ul><li><p>SMBv1 still enabled</p></li><li><p>insecure password policy</p></li><li><p>RDP exposed to the internet</p></li><li><p>guest account enabled</p></li><li><p>unnecessary services running</p></li></ul><p>That&#8217;s important because a lot of breaches happen not from a fancy zero-day&#8230;</p><p>&#8230;but from <strong>bad configurations</strong>.</p><div><hr></div><h1><strong>8) CVSS &#8211; The &#8220;How Bad Is It?&#8221; Score</strong></h1><p>Now we get to one of the biggest concepts in this lesson.</p><h2><strong>Textbook Definition</strong></h2><p><strong>CVSS (Common Vulnerability Scoring System)</strong> is an industry-standard method used to assess the <strong>severity</strong> of vulnerabilities using a numeric score and vector-based criteria.</p><h2><strong>Simple Definition</strong></h2><p>CVSS is: <strong>A scoring system that helps security teams judge how dangerous a vulnerability is.</strong></p><p>It gives vulnerabilities a score from <strong>0.0 to 10.0</strong> so teams can prioritize what to fix first</p><div><hr></div><h1><strong>9) Why CVSS Exists</strong></h1><p>If your scanner finds 800 vulnerabilities, you need a way to quickly sort them into something like:</p><ul><li><p>Ignore for now</p></li><li><p>Watch this</p></li><li><p>Fix soon</p></li><li><p>Patch immediately</p></li><li><p>Wake people up at 2 a.m.</p></li></ul><p>CVSS helps teams create that structure.</p><p>According to the lesson, CVSS helps by providing:</p><ul><li><p>an <strong>objective measure of risk</strong></p></li><li><p>insight into vulnerability severity</p></li><li><p>prioritization support</p></li><li><p>a common naming/scoring method across tools</p></li></ul><div><hr></div><h2><strong>Real-World Example</strong></h2><p>A vulnerability scanner might show:</p><ul><li><p><strong>Critical &#8211; 9.8</strong></p></li><li><p><strong>High &#8211; 8.1</strong></p></li><li><p><strong>Medium &#8211; 5.3</strong></p></li><li><p><strong>Low &#8211; 2.6</strong></p></li></ul><p>That immediately gives analysts a starting point.</p><p>But &#8212; and this is very important &#8212;</p><blockquote><p><strong>CVSS is helpful, but it is NOT the whole story.</strong></p></blockquote><p>That&#8217;s a huge Cyber Analyst mindset.</p><div><hr></div><h1><strong>10) CVSS Score Ranges</strong></h1><p>According to the lesson, CVSS scores are generally grouped like this:</p><ul><li><p><strong>0.0 = None</strong></p></li><li><p><strong>0.1&#8211;3.9 = Low</strong></p></li><li><p><strong>4.0&#8211;6.9 = Medium</strong></p></li><li><p><strong>7.0&#8211;8.9 = High</strong></p></li><li><p><strong>9.0&#8211;10.0 = Critical</strong></p></li></ul><div><hr></div><h2><strong>Simple Way to Think About It</strong></h2><h3><strong>Low</strong></h3><p>Not urgent. Usually limited impact.</p><h3><strong>Medium</strong></h3><p>Needs attention, but not usually a fire drill.</p><h3><strong>High</strong></h3><p>Serious enough to prioritize quickly.</p><h3><strong>Critical</strong></h3><p>Potentially dangerous enough to trigger immediate action.</p><p>But again&#8230;</p><blockquote><p><strong>&#8220;Critical&#8221; doesn&#8217;t always mean &#8220;panic.&#8221;</strong><br><strong>&#8220;Low&#8221; doesn&#8217;t always mean &#8220;safe.&#8221;</strong></p></blockquote><p>That&#8217;s where context comes in.</p><div><hr></div><h1><strong>11) CVSS Base Metrics &#8211; What the Score Is Made Of</strong></h1><p>CVSS isn&#8217;t just a random number. It&#8217;s built using <strong>metrics</strong>.</p><p>These metrics help describe <strong>how a vulnerability works</strong>, <strong>how easy it is to exploit</strong>, and <strong>what kind of damage it can cause</strong></p><p>These are the big ones you need to know.</p><div><hr></div><h1><strong>12) Attack Vector (AV)</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>Attack Vector</strong> describes <strong>how close an attacker must be</strong> to exploit the vulnerability.</p><h2><strong>Simple Definition</strong></h2><p>It answers: <strong>How does the attacker reach it?</strong></p><p>Possible values include:</p><ul><li><p><strong>Physical (P)</strong></p></li><li><p><strong>Local (L)</strong></p></li><li><p><strong>Adjacent Network (A)</strong></p></li><li><p><strong>Network (N)</strong></p></li></ul><div><hr></div><h2><strong>Simple Breakdown</strong></h2><h3><strong>Physical (P)</strong></h3><p>The attacker needs physical access to the device.</p><p><strong>Example:</strong> plugging into a machine directly.</p><h3><strong>Local (L)</strong></h3><p>The attacker needs local access or a local account.</p><p><strong>Example:</strong> malware already running on the host.</p><h3><strong>Adjacent (A)</strong></h3><p>The attacker needs to be on the same or nearby network.</p><p><strong>Example:</strong> same Wi-Fi or VLAN.</p><h3><strong>Network (N)</strong></h3><p>The attacker can reach it over the network or internet.</p><p><strong>Example:</strong> exploiting a public web server remotely.</p><div><hr></div><h2><strong>Why It Matters</strong></h2><p>A vulnerability exploitable over the <strong>internet</strong> is usually more dangerous than one requiring <strong>physical access</strong>.</p><p>That&#8217;s common sense &#8212; but CVSS formalizes it.</p><div><hr></div><h1><strong>13) Attack Complexity (AC)</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>Attack Complexity</strong> measures the <strong>conditions beyond the attacker&#8217;s control</strong> that must exist for exploitation to succeed.</p><h2><strong>Simple Definition</strong></h2><p><strong>How hard is this to pull off?</strong></p><p>Possible values:</p><ul><li><p><strong>Low (L)</strong></p></li><li><p><strong>High (H)</strong></p></li></ul><div><hr></div><h2><strong>Real-World Example</strong></h2><h3><strong>Low Complexity</strong></h3><p>An attacker just sends a crafted request and the exploit works.</p><h3><strong>High Complexity</strong></h3><p>The attacker needs:</p><ul><li><p>exact timing</p></li><li><p>a specific system state</p></li><li><p>a rare configuration</p></li><li><p>or special environmental conditions</p></li></ul><p>If it&#8217;s harder to exploit, that affects the score.</p><div><hr></div><h1><strong>14) Privileges Required (PR)</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>Privileges Required</strong> describes the level of access an attacker needs before exploiting the vulnerability.</p><h2><strong>Simple Definition</strong></h2><p><strong>Do I already need an account to use this?</strong></p><p>Possible values:</p><ul><li><p><strong>None (N)</strong></p></li><li><p><strong>Low (L)</strong></p></li><li><p><strong>High (H)</strong></p></li></ul><div><hr></div><h2><strong>Real-World Example</strong></h2><h3><strong>PR: None</strong></h3><p>Anyone on the internet can attempt exploitation.</p><p>That&#8217;s bad.</p><h3><strong>PR: Low</strong></h3><p>The attacker needs a normal user account.</p><h3><strong>PR: High</strong></h3><p>The attacker needs admin-level or elevated access first.</p><p>That usually makes the vulnerability less urgent than one anyone can hit.</p><div><hr></div><h1><strong>15) User Interaction (UI)</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>User Interaction</strong> measures whether exploitation requires a user to take some action.</p><h2><strong>Simple Definition</strong></h2><p><strong>Does the victim have to click something?</strong></p><p>Possible values:</p><ul><li><p><strong>None (N)</strong></p></li><li><p><strong>Required (R)</strong></p></li></ul><div><hr></div><h2><strong>Real-World Example</strong></h2><h3><strong>UI: None</strong></h3><p>The attacker can exploit it directly with no help from the victim.</p><h3><strong>UI: Required</strong></h3><p>The victim has to:</p><ul><li><p>click a link</p></li><li><p>open a file</p></li><li><p>enable macros</p></li><li><p>visit a malicious site</p></li></ul><p>This is common in phishing and malware delivery.</p><div><hr></div><h1><strong>16) Scope (S)</strong></h1><h2><strong>Textbook Definition</strong></h2><p><strong>Scope</strong> measures whether exploitation of the vulnerability affects only the vulnerable component, or can impact other components beyond it.</p><h2><strong>Simple Definition</strong></h2><p><strong>If this gets exploited, does it stay in one place or spread into other trust boundaries?</strong></p><p>Possible values:</p><ul><li><p><strong>Unchanged (U)</strong></p></li><li><p><strong>Changed (C)</strong></p></li></ul><div><hr></div><h2><strong>Real-World Example</strong></h2><p>If a web app vulnerability lets an attacker break into the <strong>underlying database server</strong>, that&#8217;s a bigger problem than if the damage stays isolated to just the app.</p><p>That means the scope has <strong>changed</strong>.</p><div><hr></div><h1><strong>17) CIA &#8211; Confidentiality, Integrity, Availability</strong></h1><p>These are core cybersecurity concepts and they show up again here.</p><p>CVSS measures how much a vulnerability impacts:</p><ul><li><p><strong>Confidentiality</strong></p></li><li><p><strong>Integrity</strong></p></li><li><p><strong>Availability</strong></p></li></ul><p>Possible values are usually:</p><ul><li><p><strong>High</strong></p></li><li><p><strong>Low</strong></p></li><li><p><strong>None</strong></p></li></ul><div><hr></div><h2><strong>A) Confidentiality (C)</strong></h2><h3><strong>Textbook Definition</strong></h3><p>The impact on the <strong>confidentiality of information resources</strong>.</p><h3><strong>Can attackers see stuff they shouldn&#8217;t?</strong></h3><h3><strong>Example</strong></h3><p>A database leak exposing:</p><ul><li><p>employee records</p></li><li><p>passwords</p></li><li><p>customer information</p></li></ul><p>That&#8217;s a confidentiality impact.</p><div><hr></div><h2><strong>B) Integrity (I)</strong></h2><h3><strong>Textbook Definition</strong></h3><p>The impact on the <strong>trustworthiness and correctness of data</strong>.</p><p><strong>Can attackers change stuff?</strong></p><h3><strong>Example</strong></h3><p>If an attacker can modify:</p><ul><li><p>payroll records</p></li><li><p>patient charts</p></li><li><p>user permissions</p></li><li><p>firewall rules</p></li></ul><p>That&#8217;s an integrity problem.</p><div><hr></div><h2><strong>C) Availability (A)</strong></h2><h3><strong>Textbook Definition</strong></h3><p>The impact on the <strong>availability of systems or services</strong>.</p><p><strong>Can attackers break or shut down the service?</strong></p><h3><strong>Example</strong></h3><p>If a flaw lets someone crash a web app or freeze a server, that affects availability.</p><div><hr></div><h1><strong>18) What a CVSS Vector String Looks Like</strong></h1><p>This is where the exam and real-world work start to overlap.</p><p>A CVSS vector might look like this:</p><p><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</code></p><p>At first glance, that looks ugly.</p><p>But once you understand it, it&#8217;s just a <strong>compressed description of the vulnerability</strong>.</p><p>The lesson uses that exact kind of vector in its review section</p><div><hr></div><h2><strong>Simple Breakdown of That Example</strong></h2><ul><li><p><strong>AV:N</strong> = Attack Vector: Network</p></li><li><p><strong>AC:H</strong> = Attack Complexity: High</p></li><li><p><strong>PR:N</strong> = Privileges Required: None</p></li><li><p><strong>UI:N</strong> = User Interaction: None</p></li><li><p><strong>S:U</strong> = Scope: Unchanged</p></li><li><p><strong>C:H</strong> = Confidentiality: High</p></li><li><p><strong>I:H</strong> = Integrity: High</p></li><li><p><strong>A:H</strong> = Availability: High</p></li></ul><h3><strong>What that means in plain English</strong></h3><p>This vulnerability:</p><ul><li><p>can be attacked <strong>over the network</strong></p></li><li><p>doesn&#8217;t require a login</p></li><li><p>doesn&#8217;t require the victim to click anything</p></li><li><p>could seriously affect <strong>confidentiality, integrity, and availability</strong></p></li><li><p>but may be <strong>harder to exploit</strong> because complexity is high</p></li></ul><p>That&#8217;s how analysts quickly &#8220;read&#8221; a vulnerability.</p><div><hr></div><h1><strong>19) The Big Problem With CVSS: It Can Mislead You</strong></h1><p>This is one of the most important real-world lessons in cybersecurity.</p><p>The CompTIA material specifically points out that CVSS has limitations, including the fact that:</p><ul><li><p>it may not fully describe <strong>exploitability</strong></p></li><li><p>scoring methods change across versions</p></li><li><p>labels like &#8220;informational&#8221; or &#8220;severe&#8221; may not tell the full story</p></li></ul><p>That&#8217;s analyst thinking right there.</p><div><hr></div><h2><strong>Why This Matters</strong></h2><p>A vulnerability can have a:</p><ul><li><p><strong>High score</strong> but be almost impossible to exploit in your environment</p></li></ul><p>Or it can have a:</p><ul><li><p><strong>Low or informational score</strong> but be extremely useful to an attacker</p></li></ul><p>That&#8217;s why mature security teams don&#8217;t blindly trust the number.</p><p>They use the number as a <strong>starting point</strong>, not a final answer.</p><div><hr></div><h1><strong>20) Vulnerability Validation &#8211; Is This Even Real?</strong></h1><p>Finding a vulnerability is one thing.</p><p>Confirming whether it&#8217;s <strong>actually valid</strong> is another.</p><p>This is where analysts deal with:</p><ul><li><p><strong>False positives</strong></p></li><li><p><strong>True positives</strong></p></li><li><p><strong>False negatives</strong></p></li><li><p><strong>True negatives</strong></p></li></ul><p>This is huge in real environments.</p><p>Because scanners are helpful&#8230;</p><p>&#8230;but scanners are not perfect.</p><div><hr></div><h1><strong>21) False Positive</strong></h1><h2><strong>Textbook Definition</strong></h2><p>A <strong>false positive</strong> occurs when a scan incorrectly reports a vulnerability or misconfiguration that is <strong>not actually present</strong>.</p><h2><strong>Simple Definition</strong></h2><p><strong>The tool says there&#8217;s a problem&#8230; but there really isn&#8217;t.</strong></p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>A scanner might say:</p><blockquote><p>&#8220;This server is vulnerable to XYZ.&#8221;</p></blockquote><p>But after checking:</p><ul><li><p>the patch is actually installed</p></li><li><p>the vulnerable component isn&#8217;t even enabled</p></li><li><p>or the scanner misread the version</p></li></ul><p>That&#8217;s a false positive.</p><div><hr></div><h2><strong>Why It Matters</strong></h2><p>False positives waste:</p><ul><li><p>analyst time</p></li><li><p>patching effort</p></li><li><p>engineering effort</p></li><li><p>leadership attention</p></li></ul><p>Too many false positives can also make teams start ignoring alerts.</p><p>That&#8217;s dangerous.</p><div><hr></div><h1><strong>22) True Positive</strong></h1><h2><strong>Textbook Definition</strong></h2><p>A <strong>true positive</strong> occurs when a tool correctly identifies a vulnerability that is actually present.</p><h2><strong>Simple Definition</strong></h2><p><strong>Yep, the scanner was right.</strong></p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>The scanner flags an outdated OpenSSL version, and when you check the host&#8230;</p><p>&#8230;it&#8217;s really there.</p><p>That&#8217;s a true positive.</p><p>That&#8217;s the stuff you actually need to deal with.</p><div><hr></div><h1><strong>23) False Negative</strong></h1><h2><strong>Textbook Definition</strong></h2><p>A <strong>false negative</strong> occurs when a tool fails to identify a vulnerability that <strong>does exist</strong>.</p><h2><strong>Simple Definition</strong></h2><p><strong>There IS a problem, but the scanner missed it.</strong></p><p>This one is often more dangerous than a false positive.</p><p>Because now you have a weakness sitting there with <strong>no alert</strong>.</p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>A custom vulnerable web app might be exploitable through a weird business logic flaw&#8230;</p><p>&#8230;but the scanner doesn&#8217;t recognize it.</p><p>So the system gets marked &#8220;clean.&#8221;</p><p>That&#8217;s bad.</p><div><hr></div><h1><strong>24) True Negative</strong></h1><h2><strong>Textbook Definition</strong></h2><p>A <strong>true negative</strong> occurs when a tool correctly reports that a vulnerability is <strong>not present</strong>.</p><h2><strong>Simple Definition</strong></h2><p><strong>No issue found &#8212; and that&#8217;s actually correct.</strong></p><p>That&#8217;s the outcome everyone wants.</p><div><hr></div><h1><strong>25) Context Is Everything</strong></h1><p>Now we get into one of the most important CySA+ ideas in this entire lesson:</p><blockquote><p><strong>A vulnerability score is not static.</strong></p></blockquote><p>The CompTIA lesson says analysts should consider things like:</p><ul><li><p>availability of patches</p></li><li><p>impact of the vulnerability</p></li><li><p>sophistication required</p></li><li><p>asset value</p></li><li><p>exploitability / weaponization</p></li></ul><p>That means:</p><blockquote><p><strong>Same vulnerability. Different environment. Different priority.</strong></p></blockquote><p>That&#8217;s real analyst thinking.</p><div><hr></div><h1><strong>26) Why a &#8220;Critical&#8221; Vulnerability Might Not Be Critical</strong></h1><p>CompTIA gives a great example:</p><p>A vulnerability might be a <strong>CVSS 10 remote code execution flaw</strong>, but if:</p><ul><li><p>the attacker has to be on the same network</p></li><li><p>and the vulnerable app runs on a <strong>fully air-gapped system</strong></p></li></ul><p>&#8230;then it may be reasonable to <strong>lower the priority</strong> in that environment</p><p>That&#8217;s a perfect real-world cybersecurity lesson.</p><div><hr></div><h2><strong>Simple Translation</strong></h2><p>Just because a vulnerability is &#8220;critical&#8221; in theory&#8230;</p><p>doesn&#8217;t mean it&#8217;s <strong>critical for you right now</strong>.</p><div><hr></div><h2><strong>Real-World Example</strong></h2><p>A public-facing web server with a <strong>High</strong> vulnerability may matter more than an isolated lab box with a <strong>Critical</strong> one.</p><p>That&#8217;s because risk is not just:</p><blockquote><p><strong>&#8220;How bad is the flaw?&#8221;</strong></p></blockquote><p>It&#8217;s also:</p><blockquote><p><strong>&#8220;How exposed are we?&#8221;</strong></p></blockquote><div><hr></div><h1><strong>27) Key Context Factors Analysts Consider</strong></h1><p>Let&#8217;s make this practical.</p><p>When security teams decide what to patch first, they often look at:</p><div><hr></div><h2><strong>A) Is There a Patch Available?</strong></h2><p>If a vendor has already released a patch, that changes your response options.</p><h3><strong>Why it matters</strong></h3><p>A vulnerability with an easy fix is often prioritized faster than one requiring a complex workaround.</p><h3><strong>Example</strong></h3><p>Microsoft releases an emergency patch for a zero-day.<br>That becomes a high-priority action item fast.</p><div><hr></div><h2><strong>B) How Valuable Is the Asset?</strong></h2><p>Not every system matters equally.</p><h3><strong>Example</strong></h3><p>A vulnerable kiosk computer is not the same as:</p><ul><li><p>a domain controller</p></li><li><p>a payroll database</p></li><li><p>an EHR server</p></li><li><p>a cloud identity provider</p></li></ul><p>Asset value matters a lot.</p><div><hr></div><h2><strong>C) Is the Vulnerability Publicly Weaponized?</strong></h2><p>Can attackers actually use it easily?</p><h3><strong>Simple Definition</strong></h3><p><strong>Weaponization</strong> means:</p><blockquote><p><strong>&#8220;Attackers already know how to use this flaw in the real world.&#8221;</strong></p></blockquote><h3><strong>Example</strong></h3><p>If exploit code is already on GitHub or in Metasploit, urgency goes up.</p><div><hr></div><h2><strong>D) Does It Require a Skilled Attacker?</strong></h2><p>A vulnerability that only advanced operators can exploit is different from one any random attacker can use.</p><h3><strong>Example</strong></h3><p>If a low-skill attacker can exploit it using a copy-paste script, patch priority rises.</p><div><hr></div><h2><strong>E) Is the System Exposed?</strong></h2><p>Can attackers even reach it?</p><h3><strong>Example</strong></h3><p>A vulnerable server behind multiple security layers is different from one directly exposed to the internet.</p><div><hr></div><h1><strong>28) Base, Temporal, and Environmental Thinking</strong></h1><p>The lesson explains that CVSS scoring includes more than just the flaw itself. It can account for:</p><ul><li><p><strong>Base</strong></p></li><li><p><strong>Temporal</strong></p></li><li><p><strong>Environmental</strong> factors</p></li></ul><p>This is a very CySA+ thing to understand.</p><div><hr></div><h2><strong>A) Base Metrics</strong></h2><p>These are the built-in characteristics of the vulnerability itself.</p><h3><strong>Simple Definition</strong></h3><blockquote><p><strong>&#8220;How bad is the flaw in general?&#8221;</strong></p></blockquote><p>Examples:</p><ul><li><p>Attack Vector</p></li><li><p>Attack Complexity</p></li><li><p>Privileges Required</p></li><li><p>CIA impact</p></li></ul><div><hr></div><h2><strong>B) Temporal Metrics</strong></h2><p>These account for things that can change over time.</p><h3><strong>Simple Definition</strong></h3><blockquote><p><strong>&#8220;How risky is it right now?&#8221;</strong></p></blockquote><p>Examples:</p><ul><li><p>Is there public exploit code?</p></li><li><p>Is a patch available?</p></li><li><p>How confident are we in the report?</p></li></ul><div><hr></div><h2><strong>C) Environmental Metrics</strong></h2><p>These adjust the score based on <strong>your specific environment</strong>.</p><h3><strong>Simple Definition</strong></h3><blockquote><p><strong>&#8220;How risky is it for us?&#8221;</strong></p></blockquote><p>Examples:</p><ul><li><p>Is the asset mission critical?</p></li><li><p>Is the system internet-facing?</p></li><li><p>Is it segmented?</p></li><li><p>Is it a production server or a test box?</p></li></ul><p>This is where cybersecurity becomes <strong>business-aware</strong>.</p><p>And that&#8217;s what separates analysts from button-clickers.</p><div><hr></div><h1><strong>29) What Analysts Actually Do After Scoring a Vulnerability</strong></h1><p>After scoring and validating a vulnerability, analysts usually do things like:</p><ul><li><p>verify the affected asset</p></li><li><p>confirm if the vulnerability is real</p></li><li><p>check exposure and business impact</p></li><li><p>compare it to other findings</p></li><li><p>determine urgency</p></li><li><p>assign remediation steps</p></li><li><p>document everything</p></li></ul><p>That&#8217;s vulnerability management in motion.</p><div><hr></div><h1><strong>30) Real-World Vulnerability Analysis Workflow</strong></h1><p>Here&#8217;s a beginner-friendly &#8220;what this looks like at work&#8221; section for your blog:</p><div><hr></div><h2><strong>Step 1: The Scanner Finds Something</strong></h2><p>Example:</p><blockquote><p>&#8220;Web Server 12 is vulnerable to CVE-2024-XXXX&#8221;</p></blockquote><div><hr></div><h2><strong>Step 2: The Analyst Validates It</strong></h2><p>Questions asked:</p><ul><li><p>Is this really installed?</p></li><li><p>Is the scanner correct?</p></li><li><p>Is it actually reachable?</p></li></ul><div><hr></div><h2><strong>Step 3: The Analyst Checks Context</strong></h2><p>Questions asked:</p><ul><li><p>Is this public-facing?</p></li><li><p>Is there exploit code?</p></li><li><p>Is there a patch?</p></li><li><p>Is this system important?</p></li></ul><div><hr></div><h2><strong>Step 4: Priority Is Assigned</strong></h2><p>Could be marked as:</p><ul><li><p>Patch now</p></li><li><p>Patch this week</p></li><li><p>Monitor</p></li><li><p>Accept temporarily</p></li><li><p>False positive / close ticket</p></li></ul><div><hr></div><h2><strong>Step 5: Remediation Happens</strong></h2><p>That might mean:</p><ul><li><p>patching</p></li><li><p>reconfiguring</p></li><li><p>isolating</p></li><li><p>disabling a service</p></li><li><p>compensating with another control</p></li></ul><div><hr></div><h2><strong>Step 6: The Finding Gets Tracked</strong></h2><p>Because if it&#8217;s not documented&#8230;</p><p>&#8230;it usually comes back later.</p><p>That&#8217;s real life.</p><div><hr></div><h1><strong>31) Why Beginners Get This Wrong</strong></h1><p>A lot of beginners think cybersecurity is just:</p><blockquote><p>&#8220;Run the scanner and fix the red stuff.&#8221;</p></blockquote><p>That&#8217;s not enough.</p><p>Because scanners don&#8217;t understand:</p><ul><li><p>business impact</p></li><li><p>asset criticality</p></li><li><p>attacker behavior</p></li><li><p>internal architecture</p></li><li><p>operational reality</p></li></ul><p>That&#8217;s why human analysts still matter.</p><p>A tool can <strong>find</strong> issues.</p><p>A real analyst figures out:</p><blockquote><p><strong>what matters most, why it matters, and what to do first.</strong></p></blockquote><p>That&#8217;s a big CySA+ mindset.</p><div><hr></div><h1><strong>32) Security+ vs CySA+ Exam Relevance</strong></h1><p>This part is good for your blog because it helps people see where this fits.</p><div><hr></div><h2><strong>For Security+</strong></h2><p>You should understand:</p><ul><li><p>what vulnerabilities are</p></li><li><p>why prioritization matters</p></li><li><p>what CVE and CVSS are</p></li><li><p>why context matters</p></li></ul><p>Security+ is more about understanding the <strong>concepts</strong>.</p><div><hr></div><h2><strong>For CySA+</strong></h2><p>You need to go deeper and understand:</p><ul><li><p>how to interpret CVSS vectors</p></li><li><p>how to validate findings</p></li><li><p>how to prioritize based on environment</p></li><li><p>how to recognize false positives / negatives</p></li><li><p>how to think like an analyst instead of just a technician</p></li></ul><p>CySA+ expects you to think:</p><blockquote><p><strong>&#8220;What should the analyst do with this information?&#8221;</strong></p></blockquote><p>That&#8217;s the real jump.</p><div><hr></div><h1><strong>33) Quick Memory Tricks for This Lesson</strong></h1><h1><strong>SCAP</strong></h1><blockquote><p><strong>&#8220;The structure&#8221;</strong><br>The standard system that helps security tools organize findings.</p></blockquote><div><hr></div><h2><strong>CVE</strong></h2><blockquote><p><strong>&#8220;The vulnerability ID&#8221;</strong><br>The official name tag for a known flaw.</p></blockquote><div><hr></div><h2><strong>CPE</strong></h2><blockquote><p><strong>&#8220;The product ID&#8221;</strong><br>The official name tag for software/hardware/platforms.</p></blockquote><div><hr></div><h2><strong>CCE</strong></h2><blockquote><p><strong>&#8220;The config issue ID&#8221;</strong><br>The official name tag for bad settings.</p></blockquote><div><hr></div><h2><strong>CVSS</strong></h2><blockquote><p><strong>&#8220;The danger score&#8221;</strong><br>How severe the vulnerability is.</p></blockquote><div><hr></div><h2><strong>False Positive</strong></h2><blockquote><p><strong>&#8220;Scanner cried wolf.&#8221;</strong></p></blockquote><div><hr></div><h2><strong>False Negative</strong></h2><blockquote><p><strong>&#8220;Scanner missed the wolf.&#8221;</strong></p></blockquote><p>That one sticks.</p><div><hr></div><h1><strong>34) Final Takeaway</strong></h1><p>Vulnerability analysis is where cybersecurity starts becoming <strong>decision-making</strong>.</p><p>Not every vulnerability matters equally.</p><p>Not every &#8220;critical&#8221; issue is urgent.</p><p>Not every &#8220;low&#8221; issue is harmless.</p><p>And not every scanner result is correct.</p><p>The best analysts know how to combine:</p><ul><li><p>technical findings</p></li><li><p>risk scoring</p></li><li><p>business context</p></li><li><p>and real-world judgment</p></li></ul><p>That&#8217;s what turns a list of vulnerabilities into an actual <strong>security strategy</strong>.</p><p>And honestly?</p><p>That&#8217;s what separates someone who just runs tools&#8230;</p><p>from someone who actually knows how to <strong>defend an environment</strong>.</p><p>This lesson ties everything together. In <strong>Lesson 2</strong>, you learned about threats, threat actors, and how attackers operate. In <strong>Lesson 3</strong>, you learned about systems, networks, cloud, IAM, and visibility, which helps you understand where vulnerabilities exist and why they matter. In <strong>Lesson 4</strong>, you saw how security operations use tools like SIEM and SOAR to stay organized and respond faster. In <strong>Lesson 5</strong>, you learned how scanners actually find weaknesses. Now in <strong>Lesson 6</strong>, you take all of that and learn how to <strong>analyze those weaknesses, validate them, and prioritize what needs to be fixed first</strong>.</p><p>That wraps up Lesson 6. Now you are starting to think less like someone who just runs tools and more like a real cybersecurity analyst. I&#8217;ll see you in the next lesson.</p><div><hr></div><h1></h1>]]></content:encoded></item><item><title><![CDATA[The Biggest Cybersecurity Risk in Your Business Isn't Technical...It's You]]></title><description><![CDATA[Why leadership behavior, not hackers or tools, is the weakest link in most security stacks]]></description><link>https://blog.netizen.watch/p/the-biggest-cybersecurity-risk-in-9e4</link><guid isPermaLink="false">https://blog.netizen.watch/p/the-biggest-cybersecurity-risk-in-9e4</guid><dc:creator><![CDATA[Arie Kiana]]></dc:creator><pubDate>Thu, 26 Mar 2026 12:05:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vnrH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vnrH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vnrH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vnrH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vnrH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vnrH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vnrH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1925168,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/192145091?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vnrH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vnrH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vnrH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vnrH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f3a1b2-1bbc-4f3f-8ea9-e0deef0549a7_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><em><strong>Sorry, not sorry. </strong></em></p><p></p><p>When business owners think about cybersecurity risk, they usually imagine something external. </p><p></p><p>A hacker.</p><p>A phishing email. </p><p>A data breach that comes out of nowhere. <br><br>Something <em>done to them. </em></p><p></p><p>What they rarely consider is the quieter, less comfortable truth: </p><p></p><blockquote><p><strong>Most security failures don&#8217;t come from malicious outsiders &#8212; they come from stressed, overloaded operators making reasonable decisions inside broken systems.</strong></p></blockquote><p></p><p>And in most businesses, the primary operator is the owner.</p><p></p><h2>Security Doesn&#8217;t Fail at the Edge &#8212; It Fails at the Center</h2><p>Cybersecurity tools are stronger than they&#8217;ve ever been. </p><p></p><p>Firewalls. <br>Endpoint protection. <br>Password managers.<br>Monitoring software.</p><p></p><p>And yet&#8230; breaches continue to rise. </p><p>Why? </p><p>Because tools don&#8217;t make decisions.<br>People do. </p><p>And when decision-making lives inside a single overwhelmed founder &#8212; without clear operational guardrails &#8212; security becomes fragile by default. </p><p>Not because the founder is careless. </p><p>But because: </p><blockquote><p><strong>Human memory, attention, and energy are unreliable infrastructure.</strong></p></blockquote><p></p><h2>The Operator Layer: The Most Overlooked Risk Surface</h2><p>Every business has multiple layers of security: </p><ul><li><p>technical tools</p></li><li><p>policies and permissions</p></li><li><p>data protection</p></li><li><p>monitoring and response</p></li></ul><p></p><p>But sitting above all of them is something rarely named: </p><blockquote><p><strong>The operator layer &#8212; the habits, decisions, and behaviors of the people running the system.</strong></p></blockquote><p></p><p>This is where most risk accumulates.</p><p>And it doesn&#8217;t look dramatic.</p><p></p><p>It looks like: </p><ul><li><p>reusing a password because &#8220;it&#8217;s temporary&#8221;</p></li><li><p>giving full access instead of scoped access &#8220;for speed&#8221;</p></li><li><p>skipping updates during a busy week</p></li><li><p>ignoring alerts because there are too many</p></li><li><p>storing credentials in a notes app &#8220;just for now&#8221;</p></li></ul><p></p><p>None of these feel dangerous in isolation. </p><p>But together?</p><p>They create an environment where breaches don&#8217;t require brilliance &#8212; only opportunity. </p><p></p><h2>Leadership Sets the Security Culture (Whether Intentionally or Not)</h2><p>In early-stage and growing businesses, the owner&#8217;s behavior becomes the blueprint. </p><p></p><p>Not the handbook.<br>Not the SOP.<br>The behavior. </p><p>Teams don&#8217;t follow written policies &#8212; they follow what they see. </p><p>If leadership: </p><ul><li><p>bypasses systems &#8594; systems get bypassed</p></li><li><p>avoids documentation &#8594;: knowledge becomes tribal</p></li><li><p>delays decisions &#8594; risks stack quietly</p></li><li><p>treats security as a nuisance &#8594; it stays underdeveloped</p></li></ul><p></p><p>This isn&#8217;t a moral failure. </p><p>It&#8217;s an operational one. </p><p>And it&#8217;s why: </p><blockquote><p><strong>Leadership discipline matters more than technical knowledge.</strong></p></blockquote><p></p><h2>&#8220;I&#8217;m Too Small to Be a Target&#8221; Is an Operational Myth</h2><p>Cybercriminals don&#8217;t prioritize businesses based on brand recognition. </p><p>They prioritize: </p><ul><li><p>weak access controls</p></li><li><p>predictable behavior</p></li><li><p>poor segmentation</p></li><li><p>lack of monitoring </p></li><li><p>slow response times</p></li></ul><p></p><p>Small businesses are often <em>more </em>exposed because: </p><ul><li><p>one person wears every hat</p></li><li><p>access grows faster than oversight</p></li><li><p>tools are added without integration</p></li><li><p>recovery plans don&#8217;t exist yet</p></li></ul><p></p><p>Security threats scale down beautifully. </p><p><strong>Operational maturity rarely does.</strong></p><p></p><h2>Why Tools Without Structure Create False Confidence</h2><p>Security tools are essential. </p><p></p><p>But without operational clarity, they create something more dangerous than vulnerability: </p><p></p><p><strong>False Confidence. </strong></p><p></p><p>Without structure: </p><ul><li><p>alerts create noise, not insight</p></li><li><p>permissions sprawl unchecked</p></li><li><p>accountability blurs </p></li><li><p>response becomes reactive</p></li><li><p>founders burn out managing expectations</p></li></ul><p></p><p>This is why Netizen Watch approaches protection through an operational lens first. </p><p></p><p>Because real security is not something you install. </p><p></p><p><strong>It&#8217;s something you run. </strong></p><p></p><h2>The Shift Secure Business Owners Make</h2><p>Secure leaders don&#8217;t try to do more. </p><p>They remove dependence on: </p><ul><li><p>memory</p></li><li><p>urgency</p></li><li><p>and heroics</p></li></ul><p></p><p>They design for: </p><ul><li><p>tired days</p></li><li><p>missed details</p></li><li><p>growth</p></li><li><p>delegation</p></li><li><p>human error</p></li></ul><p></p><p>They understand something most people don&#8217;t&#8221; </p><blockquote><p><strong>Security is a leadership system &#8212; not a technical chore. </strong></p></blockquote><p></p><h2>A Simple Operational Reframe</h2><p>Instead of asking: </p><p><em>&#8220;Do I have enough security tools?&#8221; </em></p><p></p><p>Ask: </p><p></p><p><em>&#8220;If I stepped away for two weeks, would my business still know how to protect itself?&#8221;</em></p><p></p><p>That one question reveals everything: </p><ul><li><p>clarity vs chaos</p></li><li><p>systems vs dependency</p></li><li><p>resilience vs luck</p></li></ul><p></p><h2>Security Is an Extension of Leadership</h2><p>Strong security isn&#8217;t loud. <br>It isn&#8217;t dramatic.<br>It doesn&#8217;t demand constant attention. </p><p></p><p>It feels: </p><ul><li><p>quiet</p></li><li><p>stable</p></li><li><p>boring &#8212; in the best way</p></li></ul><p></p><p>And it starts with leaders who understand: </p><blockquote><p><strong>Structure is not restrictive. It&#8217;s protective. </strong></p></blockquote><p></p><p>When operations are clear, security stops being stressful. </p><p>It simply becomes part of how the business is run. </p><p></p><h3>Coming Next</h3><p>Next in this series, we&#8217;re shifting the lens: </p><p></p><p><strong>Operational security isn&#8217;t paranoia &#8212; it&#8217;s peace of mind. </strong></p><p></p><p>And we&#8217;ll break down how calm,well-designed systems don&#8217;t just protect you&#8230;they give you your focus back</p><p>.</p>]]></content:encoded></item><item><title><![CDATA[Loops, Cycles, and Survival: What Fighter Pilots, Motorcycle Riders, and Incident Responders All Have in Common]]></title><description><![CDATA[The Decision Frameworks That Keep You Alive &#8212; On the Highway, In the Cockpit, and Behind the Keyboard]]></description><link>https://blog.netizen.watch/p/loops-cycles-and-survival-what-fighter</link><guid isPermaLink="false">https://blog.netizen.watch/p/loops-cycles-and-survival-what-fighter</guid><dc:creator><![CDATA[Akyl]]></dc:creator><pubDate>Mon, 23 Mar 2026 19:18:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mhf8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Some of you reading this ride motorcycles. Some of you work in SOCs staring at dashboards all day. A few of you might have done both while also serving in the military. Regardless of where you sit, I want you to understand something that changed the way I think about cybersecurity, riding, and honestly life in general: <strong>the best survival frameworks in the world all say the same thing.</strong></p><p>They just use different words.</p><p>Today we&#8217;re going to break down three frameworks that operate on the same underlying principle &#8212; continuous, looping decision-making under pressure. They come from three completely different worlds, but when you lay them side by side the similarities are impossible to ignore. If you understand one of them deeply, you already understand the bones of the other two.</p><p>Let&#8217;s get into it. &#128293;</p><h2>The Three Frameworks</h2><p><strong>1. The OODA Loop</strong> &#8212; Observe, Orient, Decide, Act<br>Developed by U.S. Air Force Colonel John Boyd. The man earned the nickname &#8220;Forty-Second Boyd&#8221; because he could defeat any opposing pilot in simulated combat in under 40 seconds. He studied how fighter pilots won dogfights and distilled it into a framework that has since been adopted by the military, business strategists, and cybersecurity professionals worldwide.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mhf8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mhf8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 424w, https://substackcdn.com/image/fetch/$s_!mhf8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 848w, https://substackcdn.com/image/fetch/$s_!mhf8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 1272w, https://substackcdn.com/image/fetch/$s_!mhf8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mhf8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png" width="1410" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1410,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:103404,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mhf8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 424w, https://substackcdn.com/image/fetch/$s_!mhf8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 848w, https://substackcdn.com/image/fetch/$s_!mhf8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 1272w, https://substackcdn.com/image/fetch/$s_!mhf8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15b9d2e9-18b6-4cba-ae3a-935fa05b5d7f_1410x704.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>2. The A3 Motorcycle Riding Strategy</strong> &#8212; Awareness, Assessment, Action<br>Taught in motorcycle safety courses across the country through programs like the Total Control Training curriculum. This is the mental framework that keeps riders alive on machines that are 38 times more dangerous than cars. Eighty percent of motorcycle crashes result in rider injury. There is no fender to protect you. The A3 strategy is your fender.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!owlw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!owlw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 424w, https://substackcdn.com/image/fetch/$s_!owlw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 848w, https://substackcdn.com/image/fetch/$s_!owlw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 1272w, https://substackcdn.com/image/fetch/$s_!owlw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!owlw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png" width="1410" height="684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:684,&quot;width&quot;:1410,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:107783,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!owlw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 424w, https://substackcdn.com/image/fetch/$s_!owlw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 848w, https://substackcdn.com/image/fetch/$s_!owlw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 1272w, https://substackcdn.com/image/fetch/$s_!owlw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21740b73-6890-45cc-af84-65a75e0a3ff0_1410x684.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>3. The NIST Incident Response Cycle</strong> &#8212; Preparation, Detection &amp; Analysis, Containment/Eradication/Recovery, Post-Incident Activity<br>Defined in NIST SP 800-61 and widely considered the gold standard for how organizations should handle cybersecurity incidents. If you work in a SOC, an MSSP, or any security team worth its salt, this cycle is supposed to be the rhythm of your operation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CWcQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CWcQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 424w, https://substackcdn.com/image/fetch/$s_!CWcQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 848w, https://substackcdn.com/image/fetch/$s_!CWcQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 1272w, https://substackcdn.com/image/fetch/$s_!CWcQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CWcQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png" width="1410" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1410,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:135728,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CWcQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 424w, https://substackcdn.com/image/fetch/$s_!CWcQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 848w, https://substackcdn.com/image/fetch/$s_!CWcQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 1272w, https://substackcdn.com/image/fetch/$s_!CWcQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F360c828c-4b83-4178-836c-c18de2ec7e94_1410x874.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>They&#8217;re All Loops. That&#8217;s the Point.</h2><p>The first thing to understand is that none of these are checklists. They are <strong>loops</strong>. Cycles. They repeat. The output of the last step feeds directly back into the first step, and every rotation through the loop makes you sharper than the last one.</p><p>Colonel Boyd didn&#8217;t call it the OODA <em>Process</em>. He called it the OODA <strong>Loop</strong>. Why? Because in a dogfight the situation changes every fraction of a second. You observe, you orient yourself to what&#8217;s happening, you decide on a course of action, you act &#8212; and then you observe again because your action just changed the entire situation. The pilot who can cycle through this loop faster than the opponent wins. Period.</p><p>The A3 strategy works the same way on the road. You&#8217;re riding and you become <em>aware</em> of a car drifting into your lane. You <em>assess</em> the threat &#8212; is the driver distracted? Is there an escape route to the right? You take <em>action</em> &#8212; you adjust speed, change lane position, or prepare to brake. And then what? You&#8217;re right back to awareness because the road just changed. Maybe that car corrected. Maybe a new hazard appeared. The loop never stops until the engine does.</p><p>And the NIST Incident Response Cycle? Same energy. You prepare. You detect and analyze a threat. You contain it, eradicate it, recover. Then you conduct post-incident review &#8212; and that review feeds lessons learned directly back into preparation. The cycle starts over. Every incident you survive makes the next response better.</p><p><strong>Three different worlds. One universal truth: survival belongs to the ones who loop fastest and learn deepest</strong></p><h2>Breaking Down the Parallels</h2><p>Let me map this out so you can see how tight the alignment really is.</p><h3>Step 1 &#8212; Take In Your Environment</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tvJs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tvJs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 424w, https://substackcdn.com/image/fetch/$s_!tvJs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 848w, https://substackcdn.com/image/fetch/$s_!tvJs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 1272w, https://substackcdn.com/image/fetch/$s_!tvJs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tvJs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png" width="663" height="110" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:110,&quot;width&quot;:663,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:19069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tvJs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 424w, https://substackcdn.com/image/fetch/$s_!tvJs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 848w, https://substackcdn.com/image/fetch/$s_!tvJs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 1272w, https://substackcdn.com/image/fetch/$s_!tvJs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d09085-89e6-4947-87a9-046e43c1b7eb_663x110.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Boyd said the first step is gathering information from every available source. Not just what&#8217;s in front of you, but the full picture &#8212; your instruments, your peripheral vision, radio chatter, the behavior of the enemy.</p><p>On a motorcycle, Awareness means your head is on a swivel. You&#8217;re scanning the road, checking mirrors, reading the body language of vehicles around you. That SUV with the driver looking at their phone? You saw it before it became a problem.</p><p>In incident response, this is the combination of Preparation (you set up your sensors, your SIEM, your alerting) and Detection (those tools actually pick up anomalies). If your observation tools are garbage, everything downstream fails. If a rider isn&#8217;t paying attention, no amount of skill saves them. If a pilot isn&#8217;t observing, they&#8217;re already dead.</p><h3>Step 2 &#8212; Make Sense of What You See</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0uj_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0uj_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 424w, https://substackcdn.com/image/fetch/$s_!0uj_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 848w, https://substackcdn.com/image/fetch/$s_!0uj_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 1272w, https://substackcdn.com/image/fetch/$s_!0uj_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0uj_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png" width="666" height="103" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:103,&quot;width&quot;:666,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:15713,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0uj_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 424w, https://substackcdn.com/image/fetch/$s_!0uj_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 848w, https://substackcdn.com/image/fetch/$s_!0uj_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 1272w, https://substackcdn.com/image/fetch/$s_!0uj_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99b50d11-0c5f-4ce6-8716-1aad483544f4_666x103.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This is the step Boyd considered the most important &#8212; and he was right. Observation without context is just data. Orientation is where you filter that data through your experience, your training, your cultural understanding, and your mental models to actually <em>understand</em> what is happening.</p><p>For riders, Assessment is where you determine the severity of the hazard. A car in the next lane isn&#8217;t automatically a threat. A car in the next lane whose wheels are turning toward your lane while the driver is looking the other way? That&#8217;s a different story. The assessment determines the response.</p><p>In cybersecurity, Analysis is where we determine whether an alert is a false positive or a genuine incident. This is the triage. This is where your experience as an analyst matters most. A junior analyst sees an alert. A senior analyst sees the same alert and knows from pattern recognition that this is the precursor to lateral movement. Same data, different orientation.</p><p>Boyd would say the analyst with the better orientation wins.</p><h3>Step 3 &#8212; Commit to a Course of Action</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZBBl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZBBl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 424w, https://substackcdn.com/image/fetch/$s_!ZBBl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 848w, https://substackcdn.com/image/fetch/$s_!ZBBl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 1272w, https://substackcdn.com/image/fetch/$s_!ZBBl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZBBl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png" width="727" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22509,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZBBl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 424w, https://substackcdn.com/image/fetch/$s_!ZBBl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 848w, https://substackcdn.com/image/fetch/$s_!ZBBl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 1272w, https://substackcdn.com/image/fetch/$s_!ZBBl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c8a8223-e76e-40cc-a6fe-84454176fdab_727x100.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Boyd&#8217;s Decide phase is about selecting the best response from the options your orientation generated. In a dogfight that decision might be made in milliseconds &#8212; break left, climb, engage, or disengage.</p><p>In the A3 strategy, the decision is baked into the Assessment phase. The moment you assess the severity of a hazard, your trained response kicks in. You don&#8217;t sit at a stoplight thinking about it. The training has already pre-loaded your decision tree.</p><p>In incident response, this maps to choosing your containment strategy. NIST is clear that the containment approach must match the type of attack. You don&#8217;t yank a production server offline for a phishing email. You don&#8217;t ignore a phishing email if it&#8217;s the entry point for a ransomware campaign. The decision has to be contextual, and it has to be fast.</p><h3>Step 4 &#8212; Execute</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x9Cf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x9Cf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 424w, https://substackcdn.com/image/fetch/$s_!x9Cf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 848w, https://substackcdn.com/image/fetch/$s_!x9Cf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 1272w, https://substackcdn.com/image/fetch/$s_!x9Cf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x9Cf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png" width="683" height="104" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:104,&quot;width&quot;:683,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x9Cf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 424w, https://substackcdn.com/image/fetch/$s_!x9Cf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 848w, https://substackcdn.com/image/fetch/$s_!x9Cf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 1272w, https://substackcdn.com/image/fetch/$s_!x9Cf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d1d6f9-480c-4624-b6ba-166f14e54925_683x104.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This is where theory meets the road, the sky, or the network. You do the thing.</p><p>The pilot executes the maneuver. The rider swerves, brakes, or accelerates out of danger. The IR team isolates the affected host, removes the malware, and begins restoring from backup.</p><p>But here&#8217;s the key &#8212; <strong>the action changes the environment</strong>. And that change demands a new loop. The pilot&#8217;s maneuver changes the relative position of every aircraft in the fight. The rider&#8217;s lane change introduces a new set of vehicles to be aware of. The containment action might trigger the attacker to pivot to a different system.</p><p>You&#8217;re back to Observe. Back to Awareness. Back to Detection.</p><h3>Step 5 &#8212; Learn and Feed It Back</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bpE8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bpE8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 424w, https://substackcdn.com/image/fetch/$s_!bpE8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 848w, https://substackcdn.com/image/fetch/$s_!bpE8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 1272w, https://substackcdn.com/image/fetch/$s_!bpE8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bpE8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png" width="762" height="110" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:110,&quot;width&quot;:762,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/191383437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bpE8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 424w, https://substackcdn.com/image/fetch/$s_!bpE8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 848w, https://substackcdn.com/image/fetch/$s_!bpE8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 1272w, https://substackcdn.com/image/fetch/$s_!bpE8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30521457-a59a-45fe-80bb-5dab4b6a10d4_762x110.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This is where NIST is the most explicit of the three. The Post-Incident Activity phase is specifically designed to capture lessons learned and feed them back into Preparation. What worked? What broke? What playbook needs to be updated? What tool failed?</p><p>Boyd&#8217;s framework accounts for this through the implicit feedback loops in his more detailed OODA diagram &#8212; your actions generate new observations, and your orientation is constantly being updated by experience.</p><p>For riders, every close call is a lesson. Every ride is a repetition of the loop that sharpens your instincts for the next one.</p><h2>Why This Matters for You</h2><p>If you&#8217;re a cybersecurity professional, understanding that the NIST IR Cycle is functionally the same framework that keeps fighter pilots alive should change the way you approach your work. <strong>Speed matters.</strong> The team that can detect, analyze, and respond faster than the attacker can pivot will win the engagement.</p><p>If you&#8217;re a motorcycle rider, understanding that your A3 training is running the same cognitive loop as a combat pilot should give you both confidence and humility. Confidence that the framework works. Humility that complacency kills &#8212; because the loop only works if you keep cycling through it.</p><p>And if you&#8217;re someone who does both &#8212; rides and works in cyber &#8212; you already know this in your bones. The feeling of riding through traffic with full awareness is the same feeling as triaging a live incident with a calm, focused mind. It&#8217;s the loop in action.</p>]]></content:encoded></item><item><title><![CDATA[Traveling for Work or Pleasure? Don’t Let Hackers Tag Along: My Top IT Safety Tips for 2026]]></title><description><![CDATA[Cybersecurity threats spike when you&#8217;re on the move&#8212;public Wi-Fi, lost devices, and jet-lagged decisions make travelers prime targets. Here&#8217;s how to stay secure without slowing down.]]></description><link>https://blog.netizen.watch/p/traveling-for-work-or-pleasure-dont</link><guid isPermaLink="false">https://blog.netizen.watch/p/traveling-for-work-or-pleasure-dont</guid><dc:creator><![CDATA[Mason Ross]]></dc:creator><pubDate>Sun, 08 Mar 2026 17:05:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-3ox!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p></p><p></p><p>Hey everyone,</p><p>If you&#8217;re like most professionals I talk to, travel is back in full swing in 2026&#8212;conferences, client meetings, quick getaways. But every trip comes with invisible risks: cybercriminals love travelers because you&#8217;re distracted, using unfamiliar networks, and carrying your digital life in your pocket or backpack.</p><p>Recent trends show cyber threats to travelers are rising&#8212;think data theft on public Wi-Fi, juice jacking at charging stations, phishing via fake travel apps, and even sophisticated attacks targeting business execs abroad. Geopolitical tensions and AI-powered scams are making it worse.</p><p>The good news? You don&#8217;t need to be a tech wizard to protect yourself. I&#8217;ve helped dozens of traveling teams lock things down. Here are the <strong>essential IT safety practices</strong> I recommend for anyone hitting the road this year.</p><h3></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-3ox!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-3ox!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!-3ox!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!-3ox!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!-3ox!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-3ox!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-3ox!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!-3ox!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!-3ox!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!-3ox!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a61d04-a9cb-4169-9490-544dedd5abac_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">airport wifi safety</figcaption></figure></div><h3>1. Before You Leave: Prep Your Devices Like a Pro</h3><p>The best defense starts at home.</p><ul><li><p><strong>Use a &#8220;travel-only&#8221; mindset</strong> &#8212; If possible, leave your primary work laptop/phone at home. Take a loaner device, cheap tablet, or even a burner phone for basics. Strip it down: remove sensitive files, log out of accounts, and back everything up securely (cloud + encrypted external drive).</p></li><li><p><strong>Update everything</strong> &#8212; Patch your OS, apps, antivirus, and firmware. Outdated software is still the #1 entry point for attacks.</p></li><li><p><strong>Enable full-disk encryption</strong> &#8212; On Windows (BitLocker), Mac (FileVault), or mobile (built-in). If a device gets lost or stolen, your data stays locked.</p></li><li><p><strong>Set strong locks</strong> &#8212; Use a passphrase (not just PIN), enable auto-lock after 1&#8211;5 minutes, and turn on remote wipe/find-my-device features.</p></li><li><p><strong>Backup and limit data</strong> &#8212; Only carry what you need. Store the rest in secure cloud services (with 2FA).</p></li></ul><p>Pro tip: Run a quick vulnerability scan before departure&#8212;tools like ours at Netizen Watch can spot external exposures fast.</p><h3>2. On the Go: Networks Are Your Biggest Enemy</h3><p>Airports, hotels, cafes&#8212;public Wi-Fi is a hacker playground in 2026.</p><ul><li><p><strong>Always use a VPN</strong> &#8212; This encrypts your traffic so snoopers can&#8217;t steal logins or data. Choose a reputable one (paid, no-logs policy, US-based if possible). Connect before doing anything sensitive.</p></li><li><p><strong>Disable auto-connect</strong> &#8212; Turn off automatic Wi-Fi and Bluetooth joining. Manually select networks, and verify the name (fake &#8220;Airport_Free_WiFi&#8221; hotspots are common).</p></li><li><p><strong>Avoid public charging stations</strong> &#8212; &#8220;Juice jacking&#8221; (malware via USB) is real. Use your own wall charger + power bank, or a data-blocker cable.</p></li><li><p><strong>Mobile data over Wi-Fi</strong> &#8212; When in doubt, use your phone&#8217;s cellular hotspot (with VPN on top).</p></li></ul><p>Bonus: Cover your webcam with tape when not in use&#8212;simple but effective against remote spying.</p><h3>3. Account &amp; Access: Lock It Down Extra Tight</h3><p>Travel makes you a target for credential stuffing and phishing.</p><ul><li><p><strong>Enable Multi-Factor Authentication (MFA/2FA) everywhere</strong> &#8212; Especially email, banking, work tools. Use an authenticator app (not SMS if possible&#8212;SIM swapping is still a thing).</p></li><li><p><strong>Use a password manager</strong> &#8212; Generate unique, strong passwords for every site. Never reuse them.</p></li><li><p><strong>Watch for phishing</strong> &#8212; Fake &#8220;your flight is delayed&#8221; texts/emails or urgent &#8220;update payment&#8221; messages spike during travel. Verify directly with the official app/site.</p></li><li><p><strong>Log out &amp; monitor</strong> &#8212; After sessions, log out of accounts. Check login activity for unfamiliar locations post-trip.</p></li></ul><h3>4. While Abroad: Extra Caution for International Travel</h3><p>Crossing borders adds layers&#8212;customs checks, foreign networks, potential device tampering.</p><ul><li><p><strong>Turn off unnecessary features</strong> &#8212; Disable Bluetooth, NFC, location services unless needed.</p></li><li><p><strong>Avoid unknown USBs/apps</strong> &#8212; Don&#8217;t plug into hotel TVs or download sketchy &#8220;local guides.&#8221;</p></li><li><p><strong>Physical security</strong> &#8212; Never leave devices unattended (even in hotel safes&#8212; they&#8217;re not secure). Keep positive control at all times.</p></li><li><p><strong>Post-trip cleanup</strong> &#8212; Change passwords for anything accessed abroad, review device logs for odd activity, and scan for malware.</p></li></ul><p>From government sources like the NSA: In high-risk areas, minimize what you carry and assume networks are monitored.</p><h3>5. Quick Travel Cybersecurity Checklist (Copy-Paste This!)</h3><ul><li><p>Backup data &amp; leave copies at home/base</p></li><li><p>Update all devices &amp; enable encryption</p></li><li><p>Set up VPN &amp; test it</p></li><li><p>Enable MFA on key accounts</p></li><li><p>Pack charger/power bank (no public USB)</p></li><li><p>Disable auto-join for Wi-Fi/Bluetooth</p></li><li><p>Use travel device if possible</p></li><li><p>Plan for remote wipe if lost</p></li></ul><p>Follow this, and you&#8217;ll drastically cut your risk.</p><p>Travel should be about opportunities&#8212;not headaches from a breach. In 2026, with AI making attacks faster and smarter, basic hygiene like this goes further than ever.</p><p>If you&#8217;re a business owner sending teams out or just want peace of mind, proactive tools make a huge difference&#8212;things like continuous monitoring, vulnerability management, or quick incident response.</p><p>At Netizen Watch, we help growing companies stay ahead without the overwhelm. Curious about your setup? Drop a comment below, reply to this email, or head to <a href="https://netizen.watch">netizen.watch</a> for a free external footprint check&#8212;no strings attached.</p><p>Safe travels, stay secure, and let&#8217;s keep the bad guys out of your itinerary.</p><p>What&#8217;s your biggest travel security worry right now? Comment below&#8212;I read them all.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/p/traveling-for-work-or-pleasure-dont?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.netizen.watch/p/traveling-for-work-or-pleasure-dont?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>P.S. If this helped, hit the like &#10084;&#65039; or share with a traveling colleague. Subscriptions keep more tips like this coming straight to your inbox.</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity in 2026]]></title><description><![CDATA[Shadow AI, SaaS Threats To Data Privacy, and Information Stealers]]></description><link>https://blog.netizen.watch/p/cybersecurity-in-2026</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-in-2026</guid><dc:creator><![CDATA[Akyl]]></dc:creator><pubDate>Sun, 01 Mar 2026 04:47:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6BIE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6BIE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6BIE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6BIE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6BIE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6BIE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6BIE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2875892,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/161778241?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6BIE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6BIE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6BIE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6BIE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bd76a2a-48a7-4a3f-a49e-e1bffd620d84_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>Finally it&#8217;s a new year and tech is on a decline. We are going back to the old ways of doing things. Removing technology from our vehicles, home appliances, and life.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bUSw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bUSw!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 424w, https://substackcdn.com/image/fetch/$s_!bUSw!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 848w, https://substackcdn.com/image/fetch/$s_!bUSw!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 1272w, https://substackcdn.com/image/fetch/$s_!bUSw!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bUSw!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif" width="480" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:480,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bUSw!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 424w, https://substackcdn.com/image/fetch/$s_!bUSw!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 848w, https://substackcdn.com/image/fetch/$s_!bUSw!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 1272w, https://substackcdn.com/image/fetch/$s_!bUSw!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0afc65ae-8bdb-4094-b18d-e5ea6109a45b_480x480.gif 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That&#8217;s not the case. People wish it was because they barely knew how to operate in the old way of doing things how are they going to survive in this interconnected, tech fueled, AI infused present. </p><p>This isn&#8217;t an article fear mongering how everything sucks because tech is included in everything, this is the article that going to tell what you need to learn before your preteen gets an AI girlfriend sending them nudes (and no we aren&#8217;t talking circuit boards). Not to mention fear stoking may help some folks amass power, but it doesn&#8217;t feed families. So lets talk about what skills you&#8217;ll need to keep up and what to expect in 2026 in cybersecurity.</p><ol><li><p><strong>Human Augmentation is Here to Stay; So How you secure your Data Matters<br></strong>I&#8217;ve heard countless people say they don&#8217;t use AI because of the threat to artist based industries, which hasn&#8217;t happened. Lazy people who do slow/shit work will be replaced with AI, but people who learn to use LLMs to augment their work will be in demand. For this to be an opportunity that we all take advantage of you&#8217;ll need to master the skill of AI Fluency. AI Fluency refers to a humans ability to incorporate LLMs into their workflow. The more fluent one becomes the more seamless that integration appears as well as increased output and quality. <a href="https://anthropic.skilljar.com/ai-fluency-framework-foundations">If you&#8217;re interested in learning AI Fluency check Anthropic&#8217;s free course offer.</a></p><p><br>The challenge for the industry is figuring out how to secure their data against the growing dangers of shadow AI. <a href="https://www.ibm.com/think/topics/shadow-ai">Shadow AI </a>is what we call it when members of an organization use LLMs and AI agents without approval giving AI agent a backdoor into the company&#8217;s data. Shadow AI allows <a href="https://blog.netizen.watch/p/cybersecurity-foundations-series-f84#:~:text=The%20Technical%20definition%20of%20A%20threat%20actor%20is%20an%20individual%20or%20group%20that%20conducts%20malicious%20activity%20against%20systems%2C%20networks%2C%20or%20data.">threat actors</a> new avenues to preform data exfiltration<br><br>Organizations will have to develop a strong foundations of data protection even during their small business and start up phase in order to protect their data from theft and breach. <br></p></li><li><p><strong> Malware and Data Theft have Evolved in Information Stealers</strong></p><p>In the 2025 Verizon Data Breach Investigation Report attributes 80% of the credentials used by Threat Actors to be collected by Information Stealers. Information Stealers refer to a new type of malware that aims to monetize the data stolen from individuals and organizations by ransoming the data for sale<br><br>Data Stealers or Information stealers have been covered abundantly by popular cybersecurity blogs like <a href="https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html">The Hacker News(THN)</a>, recent articles tell the tale of clever attackers leveraging information stealers delivered through SEO poisoning and other social engineering techniques like calendar based phishing making use of .ics files (files that add events to your digital calendars).<br><br>Those affected may find their credentials on the dark web for sale. This technique makes attribution to a specific threat group a bit more difficult by spreading the credentials threat actors sew seeds of doubt as to who could have used them during future attempt to attack organizations. Organizations and individuals not making use of MFA are more at risk of stolen credentials granting access to private resources.<br></p></li><li><p><strong>Cloud,SaaS Tool, and Subscription Models<br></strong>SaaS tools hosted in the cloud are a continued trend in our industry they are usually accompanied by the subscription business model that keeps the user paying for usage. This business model is becoming so popular in tech that as technology continues to be infused with more traditional industries the subscription model is seemingly following right behind. Car companies aren&#8217;t just selling machines they also charge monthly fees for various types of services. Gaming companies no longer just sell you a console and a disc for the game; DLCs are locked behind monthly subscriptions.<br> <br>Who is actually keeping track of all of the pay to play tools that professionals are using? Organizations who want to protect their customers data, team members privacy, and finances will have to take steps to track tooling for SaaS products and manage security configurations for a variety of externally hosted tools.</p><p><br><strong>What Do We Do?</strong></p><p>Tech isn&#8217;t slowing down, and neither are the risks. In 2026, the real divide won&#8217;t be &#8220;tech people vs non-tech people&#8221;&#8212;it&#8217;ll be the people who can operate safely inside a digital world, and the people who can&#8217;t.</p><p>AI is becoming normal in classrooms, workplaces, and homes, whether we like it or not. That means <strong>AI fluency</strong> is a life skill, but so is knowing what <em>not</em> to feed an AI tool&#8212;because <strong>shadow AI</strong> is quietly turning convenience into exposure. At the same time, modern malware isn&#8217;t just trying to break your computer anymore; <strong>information stealers</strong> are built to harvest identities, hijack logins, and turn your accounts into a revenue stream. And because nearly everything is cloud-based now&#8212;from email to payroll to car features&#8212;your security isn&#8217;t just about your laptop. It&#8217;s about your <strong>subscriptions, your SaaS stack, your settings, and your habits</strong>.</p><p>So here&#8217;s the mission: build strong data protection foundations early, track the tools you use, lock down accounts with MFA, and treat AI like a powerful assistant&#8212;not a confessional booth. The future isn&#8217;t &#8220;going back to the old ways.&#8221; The future is learning how to move forward without getting played.<strong><br><br><br></strong></p></li></ol>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series (Part 5) ]]></title><description><![CDATA[Lesson 5: Implementing Vulnerability Scanning Methods]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series-0cf</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series-0cf</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Thu, 26 Feb 2026 23:33:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cdC8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Lesson 5: Implementing Vulnerability Scanning Methods</h1><p>(CySA+ CS0-003)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cdC8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cdC8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cdC8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cdC8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cdC8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cdC8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg" width="1224" height="774" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:774,&quot;width&quot;:1224,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Security Operations Center (SOC) | by Abhinav Pathak | OSINT Team&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Security Operations Center (SOC) | by Abhinav Pathak | OSINT Team" title="What is Security Operations Center (SOC) | by Abhinav Pathak | OSINT Team" srcset="https://substackcdn.com/image/fetch/$s_!cdC8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cdC8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cdC8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cdC8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F134c31a7-7025-438c-87d6-04680cec694b_1224x774.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So far in this series, we&#8217;ve built the structure of security operations.</p><p>Lesson 1 explained <strong>why security exists</strong> &#8212; governance and risk.<br>Lesson 2 showed us <strong>who is attacking</strong> &#8212; threat actors and intelligence.<br>Lesson 3 defined <strong>what we&#8217;re protecting</strong> &#8212; systems, identity, and logging.<br>Lesson 4 explained <strong>how we operate efficiently</strong> &#8212; automation, SIEM, and SOAR.</p><p>Now Lesson 5 answers a different question:</p><p><strong>How do we find weaknesses before attackers do?</strong></p><p>Because detection is reactive.</p><p>Vulnerability scanning is proactive.</p><p>And if you&#8217;re studying for Security+ or CySA+, this is where you start thinking like a real analyst.</p><div><hr></div><h1>Why Compliance Comes First</h1><p>Most organizations don&#8217;t scan randomly.</p><p>They scan because frameworks and regulations require it.</p><p>You&#8217;ll see names like:</p><ul><li><p>NIST</p></li><li><p>ISO 27001</p></li><li><p>CIS Benchmarks</p></li><li><p>OWASP</p></li><li><p>PCI DSS</p></li></ul><p>These define what &#8220;secure&#8221; should look like.</p><div><hr></div><h2>CIS Benchmarks</h2><h3>Tech Def:</h3><p>A set of consensus-based secure configuration guidelines developed to harden operating systems and applications.</p><h3>Simple Def:</h3><p>A secure setup checklist for systems.</p><h3>Example</h3><p>If a Windows server allows anonymous SMB access, CIS would flag that as insecure.<br>The benchmark would recommend disabling it.</p><p>Security+ expects you to recognize CIS as a configuration best practice.<br>CySA+ expects you to use baselines when validating systems.</p><div><hr></div><h2>OWASP Top 10</h2><p>OWASP focuses on web application risks like:</p><ul><li><p>Broken Access Control</p></li><li><p>Injection</p></li><li><p>Security Misconfiguration</p></li><li><p>Server-Side Request Forgery</p></li></ul><h3>Tech Def:</h3><p>A ranked list of the most critical web application vulnerabilities.</p><h3>Simple Def:</h3><p>The most common web app mistakes attackers exploit.</p><h3>Example</h3><p>A login form that doesn&#8217;t properly sanitize input could allow SQL injection.<br>That&#8217;s an OWASP Top 10 issue.</p><p>On Security+, you identify it.<br>On CySA+, you interpret scan results showing it.</p><div><hr></div><h2>PCI DSS</h2><h3>Tech Def:</h3><p>A global security standard requiring organizations handling credit card data to implement controls and undergo regular assessments.</p><h3>Simple Def:</h3><p>If you process credit cards, you must prove you&#8217;re secure.</p><h3>Example</h3><p>An online store must run quarterly vulnerability scans and fix critical issues to stay PCI compliant.</p><p>On exams, remember: compliance can dictate scan frequency.</p><div><hr></div><h1>Vulnerability Scanning</h1><h2>Tech Def:</h2><p>An automated process that evaluates systems, applications, and devices for known security weaknesses using a vulnerability database.</p><h2>Simple Def:</h2><p>A tool that checks your systems for known problems.</p><h3>Example</h3><p>If your server is running an outdated version of Apache with a known exploit, the scanner will flag it.</p><p>Important distinction:</p><ul><li><p>Vulnerability scanning identifies weaknesses.</p></li><li><p>Penetration testing attempts to exploit them.</p></li></ul><p>Security+ tests the difference.<br>CySA+ expects you to apply it.</p><div><hr></div><h1>Internal vs External Scanning</h1><h2>External Scanning</h2><h3>Tech Def:</h3><p>Assessment performed from outside the organization&#8217;s network perimeter.</p><h3>Simple Def:</h3><p>What can someone on the internet see?</p><h3>Example</h3><p>An external scan finds that port 3389 (RDP) is exposed publicly.<br>That&#8217;s high risk.</p><p>External findings often require urgent remediation.</p><div><hr></div><h2>Internal Scanning</h2><h3>Tech Def:</h3><p>Assessment performed from within the organization&#8217;s network, often with authenticated access.</p><h3>Simple Def:</h3><p>What can someone inside see?</p><h3>Example</h3><p>An internal scan reveals shared folders accessible to &#8220;Everyone.&#8221;<br>An attacker who already gained access could escalate from there.</p><p>Internal scanning simulates post-compromise movement.</p><div><hr></div><h1>Credentialed vs Non-Credentialed</h1><h2>Credentialed Scanning</h2><h3>Tech Def:</h3><p>Uses valid authentication credentials to evaluate patch levels, configurations, and local vulnerabilities.</p><h3>Simple Def:</h3><p>The scanner logs in and checks deeply.</p><h3>Example</h3><p>A credentialed scan logs into a server and finds that a critical Windows patch is missing.</p><p>It sees things an outsider couldn&#8217;t.</p><div><hr></div><h2>Non-Credentialed Scanning</h2><h3>Tech Def:</h3><p>Assessment without authentication.</p><h3>Simple Def:</h3><p>Checking from the outside without logging in.</p><h3>Example</h3><p>It identifies open ports but cannot determine installed software versions.</p><p>Credentialed = deeper visibility.<br>Non-credentialed = surface visibility.</p><div><hr></div><h1>Agent-Based vs Agentless</h1><h2>Agentless</h2><h3>Tech Def:</h3><p>Collects vulnerability data remotely using protocols like SSH, WMI, or SNMP.</p><h3>Simple Def:</h3><p>No software installed &#8212; scan remotely.</p><h3>Example</h3><p>The scanner connects via SSH to collect system info.</p><p>If firewalls block SSH, the scan fails.</p><div><hr></div><h2>Agent-Based</h2><h3>Tech Def:</h3><p>Requires installation of software agents on endpoints to gather vulnerability data locally.</p><h3>Simple Def:</h3><p>You install a small program that reports vulnerabilities back.</p><h3>Example</h3><p>An endpoint agent reports missing patches even when the device is off the corporate network.</p><p>Trade-off:<br>Better visibility &#8212; but more management overhead.</p><div><hr></div><h1>Active vs Passive Scanning</h1><h2>Active Scanning</h2><h3>Tech Def:</h3><p>Directly interacts with systems to enumerate services and test vulnerabilities.</p><h3>Simple Def:</h3><p>The scanner probes the system.</p><h3>Example</h3><p>Nessus sends packets to determine service versions.</p><p>Active scans may affect performance.</p><div><hr></div><h2>Passive Scanning</h2><h3>Tech Def:</h3><p>Identifies vulnerabilities by observing traffic without direct interaction.</p><h3>Simple Def:</h3><p>Watching quietly instead of probing.</p><h3>Example</h3><p>Detecting cleartext passwords being transmitted over HTTP.</p><p>Passive scanning is useful in sensitive environments.</p><div><hr></div><h1>Criticality Ranking</h1><h2>Tech Def:</h2><p>A standardized scoring mechanism used to prioritize vulnerability remediation.</p><h2>Simple Def:</h2><p>A severity score to decide what to fix first.</p><h3>Example</h3><p>A &#8220;Critical&#8221; vulnerability on a public web server gets fixed before a &#8220;Medium&#8221; issue on a test machine.</p><p>But context matters.</p><p>That&#8217;s CySA-level thinking.</p><div><hr></div><h1>Static vs Dynamic Analysis</h1><h2>Static Analysis</h2><h3>Tech Def:</h3><p>Examination of source code without executing it.</p><h3>Simple Def:</h3><p>Reviewing the blueprint.</p><h3>Example</h3><p>Finding insecure coding libraries in a web application&#8217;s source code.</p><div><hr></div><h2>Dynamic Analysis</h2><h3>Tech Def:</h3><p>Testing software while it is running.</p><h3>Simple Def:</h3><p>Testing the building while people are inside.</p><h3>Example</h3><p>Interacting with a live web app to see if input validation fails.</p><div><hr></div><h1>Fuzzing</h1><h2>Tech Def:</h2><p>Automated injection of malformed or unexpected input to discover vulnerabilities.</p><h2>Simple Def:</h2><p>Throwing weird data at a program to see if it crashes.</p><h3>Example</h3><p>Sending extremely long input into a login field to see if it triggers a buffer overflow.</p><p>Attackers use fuzzing.<br>Defenders should too.</p><div><hr></div><h1>Configuration Baseline</h1><h2>Tech Def:</h2><p>A documented minimum security configuration standard used as a reference point.</p><h2>Simple Def:</h2><p>The secure starting point for a system.</p><h3>Example</h3><p>If your company baseline says RDP must require MFA, any system without MFA is non-compliant.</p><p>Baselines turn scanning into measurable security.</p><div><hr></div><h1>Industrial and Operational Technology</h1><p>Some systems control physical processes:</p><ul><li><p>SCADA</p></li><li><p>PLCs</p></li><li><p>Industrial Control Systems</p></li></ul><p>These can&#8217;t always handle aggressive scans.</p><h3>Example</h3><p>A poorly timed scan against a manufacturing controller could disrupt production.</p><p>In critical environments, availability may outweigh aggressive scanning.</p><p>CySA+ expects you to recognize operational impact.</p><div><hr></div><h1>The Bigger Picture</h1><p>Lesson 5 is about structure.</p><p>It&#8217;s about:</p><p>Compliance<br>Scope<br>Authentication strategy<br>Agent decisions<br>Performance considerations<br>Risk prioritization<br>Configuration baselines<br>Operational awareness</p><p>Scanning isn&#8217;t just running a tool.</p><p>It&#8217;s understanding what the results mean.</p><div><hr></div><h1>For Security+ Focus On:</h1><ul><li><p>Internal vs external</p></li><li><p>Credentialed vs non-credentialed</p></li><li><p>OWASP Top 10</p></li><li><p>PCI DSS basics</p></li><li><p>Baselines</p></li></ul><h1>For CySA+ Focus On:</h1><ul><li><p>Agent-based vs agentless</p></li><li><p>Active vs passive</p></li><li><p>Criticality ranking</p></li><li><p>Static vs dynamic analysis</p></li><li><p>Fuzzing</p></li><li><p>Operational technology considerations</p></li><li><p>Context-driven prioritization</p></li></ul><div><hr></div><h1>Conclusion</h1><p>Security isn&#8217;t just catching attacks.</p><p>It&#8217;s reducing weaknesses before they&#8217;re exploited.</p><p>Lesson 5 teaches that vulnerability scanning is structured, compliance-driven, risk-aware, and context-sensitive.</p><p>When governance sets expectations, intelligence identifies threats, logging provides visibility, automation speeds response &#8212; vulnerability scanning measures how exposed you actually are.</p><p>That&#8217;s operational maturity.</p><p>And that&#8217;s exactly what CompTIA security exams expect you to understand&#8230;&#8230;.</p><p>Until the next lesson.</p>]]></content:encoded></item><item><title><![CDATA[Cyber Mythbusters: Debunking One Myth at a Time]]></title><description><![CDATA[Myth #3 &#8212; &#8220;Strong Passwords Are Enough.&#8221;]]></description><link>https://blog.netizen.watch/p/cyber-mythbusters-debunking-one-myth-74e</link><guid isPermaLink="false">https://blog.netizen.watch/p/cyber-mythbusters-debunking-one-myth-74e</guid><dc:creator><![CDATA[CJ White]]></dc:creator><pubDate>Mon, 23 Feb 2026 16:00:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BEMa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Myth #3 &#8212; &#8220;Strong Passwords Are Enough.</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BEMa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BEMa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!BEMa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!BEMa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!BEMa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BEMa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3392899,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/188755238?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BEMa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!BEMa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!BEMa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!BEMa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F180fff60-007f-4ee4-a5f3-a1adeddbbd62_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Let&#8217;s be honest for a second: most of us <em>think</em> we&#8217;re doing the right thing when we use a &#8220;strong password.&#8221; Something like <strong>Winter2024!</strong>, <strong>GalaxyHorse19$</strong>, or the classic <strong>P@ssw0rd123!</strong> that every tech blog said was &#8220;secure&#8221; back in 2013.</p><p>So the myth goes like this:</p><blockquote><p>&#8220;If my password is strong, I&#8217;m safe.&#8221;</p></blockquote><p>It <em>sounds</em> right. It feels right.<br>Unfortunately, it&#8217;s outdated &#8212; and attackers know it.</p><p>Let&#8217;s break down why strong passwords alone don&#8217;t cut it anymore and what the data says about it.</p><div><hr></div><h2>The Myth</h2><p>People assume that if their password:</p><ul><li><p>Has a capital letter</p></li><li><p>Has a number</p></li><li><p>Has a symbol</p></li><li><p>Is longer than eight characters</p></li></ul><p>&#8230;then it&#8217;s automatically secure.</p><p>The problem? Attackers don&#8217;t break in the way they used to.</p><div><hr></div><h2>Reality: Passwords Are Failing at Scale</h2><h3>1. Most people still reuse passwords &#8212; which makes &#8220;strong&#8221; meaningless</h3><p>A 2025 study of <strong>19 billion leaked passwords</strong> found that <strong>94% were reused or weak</strong>, and only <strong>6% were unique</strong>.<br>That means if you reuse any password &#8212; even a &#8220;strong&#8221; one &#8212; it becomes worthless the moment it leaks from <em>any</em> site. <a href="https://cybernews.com/security/password-leak-study-unveils-2025-trends-reused-and-lazy/">[cybernews.com]</a></p><p>And attackers don&#8217;t try logging in manually. They feed those leaked passwords into automated tools.</p><div><hr></div><h3>2. Password cracking tools have gotten ridiculously fast</h3><p>According to password security research in 2025, <strong>seven of the ten most common passwords can be cracked in under one second</strong>, and many &#8220;complex&#8221; patterns like <em>P@ssw0rd</em> or <em>Welcome@123</em> appear frequently in breach dumps and get cracked near-instantly too. <a href="https://deepstrike.io/blog/password-statistics-2025">[deepstrike.io]</a></p><p>Even more concerning: modern GPU clusters can brute-force an 8&#8209;character password (lowercase only) in <strong>about three weeks</strong>, and fully complex 8&#8209;character passwords in <strong>months</strong>, thanks to massive leaps in hardware power and attacker tooling. <a href="https://deepstrike.io/blog/password-statistics-2025">[deepstrike.io]</a></p><p>Your &#8220;strong&#8221; password from a few years ago? Today it&#8217;s a warm-up exercise.</p><div><hr></div><h3>3. Credential stuffing is now industrial-scale</h3><p>Here&#8217;s where the real-world danger comes in.</p><p>In 2025:</p><ul><li><p>Credential stuffing made up <strong>22% of all breaches</strong>, more than any other initial access method, including phishing. <a href="https://deepstrike.io/blog/compromised-credential-statistics-2025">[deepstrike.io]</a></p></li><li><p>Attackers used automation to launch <strong>billions</strong> of login attempts using stolen username/password pairs from old breaches.</p></li><li><p>Many industries saw <strong>20&#8211;25% of all login traffic</strong> being malicious automated attempts, not real users. <a href="https://deepstrike.io/blog/password-statistics-2025">[deepstrike.io]</a></p></li></ul><p>Translation:<br>Attackers don&#8217;t need to &#8220;crack&#8221; your password at all &#8212; they just reuse it.</p><p>If you&#8217;ve used your strong password more than once, it&#8217;s already compromised.</p><div><hr></div><h3>4. Info-stealer malware bypasses passwords entirely</h3><p>In 2024 alone, infostealer malware like RedLine and Raccoon stole <strong>548 million passwords</strong> and <strong>17 billion session cookies</strong> from infected devices. <a href="https://deepstrike.io/blog/password-statistics-2025">[deepstrike.io]</a></p><p>Session cookies are the real danger:<br>Attackers can often use them to <strong>log in without needing your password or MFA</strong>.</p><p>Meaning:<br>You can have the strongest password in the world &#8212; and attackers can walk right past it.</p><div><hr></div><h2>Real-World Example: The &#8220;Strong Password&#8221; That Wasn&#8217;t</h2><p>A major 2025 breach involved a company where employees followed &#8220;corporate password rules.&#8221;<br>They used long, complex passwords with numbers, symbols, and uppercase letters.</p><p>Still, attackers got in.</p><p>Why?</p><ol><li><p>One employee reused their complex password on a personal site years earlier.</p></li><li><p>That site was later breached.</p></li><li><p>Attackers grabbed the leaked password.</p></li><li><p>They used automated bots to test it on corporate accounts.</p></li><li><p>It worked.</p></li><li><p>The company didn&#8217;t have MFA on that service.</p></li><li><p>Attackers stayed inside the network for <strong>292 days</strong>, undetected, because credential-based attacks take the longest to discover. <a href="https://deepstrike.io/blog/compromised-credential-statistics-2025">[deepstrike.io]</a></p></li></ol><p>Strong password? Yes.<br>Secure account? Not even close.</p><div><hr></div><h2>So what <em>does</em> make passwords safe today?</h2><h3>1. Unique passwords</h3><p>Reusing one password &#8212; even a &#8220;perfect&#8221; one &#8212; is the fastest way to get compromised.<br>84% of people still reuse passwords across platforms in 2025, and attackers depend on that behavior. <a href="https://www.demandsage.com/password-statistics/">[demandsage.com]</a></p><h3>2. Multi-Factor Authentication (MFA)</h3><p>Passwords are something you <em>know.</em><br>MFA adds something you <em>have.</em></p><p>MFA blocks most automated attacks.<br>It isn&#8217;t perfect, but it dramatically raises the cost for attackers.</p><h3>3. Passphrases instead of complex character soup</h3><p>&#8220;GreenCoffeeHorseSkyline&#8221; beats &#8220;W1nter2024!&#8221; every time.<br>Longer is better than &#8220;complex but short.&#8221;</p><h3>4. Monitoring for leaked credentials</h3><p>With billions of credentials leaked yearly, checking if your passwords appear in dumps is essential.</p><div><hr></div><h2>Why Passkeys Are the Future</h2><p>Google reports <strong>400+ million accounts</strong> now using passkeys, which <strong>cannot be phished or reused</strong>, making them resistant to the very attacks dominating 2025 and 2026. <a href="https://deepstrike.io/blog/compromised-credential-statistics-2025">[deepstrike.io]</a></p><p>Passkeys eliminate weak links like:</p><ul><li><p>Password reuse</p></li><li><p>Guessability</p></li><li><p>Phishing</p></li><li><p>Brute forcing</p></li><li><p>Credential stuffing</p></li></ul><p>They aren&#8217;t perfect yet, but they&#8217;re a major improvement.</p><div><hr></div><h2>Final Takeaway</h2><p>Strong passwords used to be enough.<br>Today, the data says otherwise:</p><ul><li><p>94% of leaked passwords are reused or weak <a href="https://cybernews.com/security/password-leak-study-unveils-2025-trends-reused-and-lazy/">[cybernews.com]</a></p></li><li><p>22% of breaches start with stolen credentials, the largest single vector in 2025 <a href="https://deepstrike.io/blog/compromised-credential-statistics-2025">[deepstrike.io]</a></p></li><li><p>Attackers stole 548 million passwords via infostealer malware in one year <a href="https://deepstrike.io/blog/password-statistics-2025">[deepstrike.io]</a></p></li><li><p>Password cracking hardware continues to accelerate faster than most users can adapt <a href="https://deepstrike.io/blog/password-statistics-2025">[deepstrike.io]</a></p></li></ul><p>A &#8220;strong password&#8221; is no longer a shield.</p><p>Security now comes from:</p><ul><li><p>Unique passwords</p></li><li><p>MFA</p></li><li><p>Passphrases</p></li><li><p>Passkeys</p></li><li><p>Reducing reuse</p></li><li><p>Staying aware of breaches</p></li></ul><p>A password is just one layer &#8212; and it can&#8217;t carry the whole load anymore.</p><p></p><p>If you&#8217;re finding Cyber Mythbusters helpful, consider subscribing and sharing this with someone who still thinks their passwords are &#8220;good enough.&#8221; Your support helps Netizen Watch keep digital security simple, real, and accessible.</p><div><hr></div><h2>Next Week on Cyber Mythbusters</h2><p><strong>Myth #4 &#8212; &#8220;My Phone Is Safe By Default.&#8221;</strong><br>We&#8217;ll explore why the device most people trust the most is quietly becoming attackers&#8217; favorite target.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series (part 4)]]></title><description><![CDATA[Lesson 4: Process Improvement in Security Operations]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series-627</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series-627</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Tue, 17 Feb 2026 17:23:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QZaB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Lesson 4: Process Improvement in Security Operations</h1><p><em>(CySA+ CS0-003)</em></p><p>By now, the structure of security operations should feel clear.</p><ul><li><p><strong>Lesson 1</strong> explained why security exists &#8212; governance, policy, and risk.</p></li><li><p><strong>Lesson 2</strong> showed us who is attacking &#8212; threat actors and intelligence.</p></li><li><p><strong>Lesson 3</strong> defined what we&#8217;re protecting &#8212; systems, identity, and logging.</p></li></ul><p>Lesson 4 answers the operational question:</p><p><strong>How do we run security efficiently at scale?</strong></p><p>Because once an organization grows, manual security operations break down fast.</p><div><hr></div><h1>Why Automation Becomes Necessary</h1><p>Imagine reviewing thousands of logs manually every day. Copying IP addresses into threat databases. Opening tickets one by one. Disabling accounts individually.</p><p>That works at small scale.<br>It fails at enterprise scale.</p><h3>Technical Definition &#8212; Automation</h3><p>Automation in security operations is the use of technology to perform repetitive detection, analysis, and response tasks with minimal human intervention to improve efficiency, consistency, and accuracy.</p><h3>Simple Definition</h3><p>Automation lets tools handle repetitive work so analysts can focus on real investigations.</p><p>Automation directly improves:</p><ul><li><p>Mean Time to Detect (MTTD)</p></li><li><p>Mean Time to Respond (MTTR)</p></li><li><p>Response consistency</p></li><li><p>Error reduction</p></li></ul><p>For CySA+, understand this clearly: automation is about <strong>operational maturity</strong>, not convenience.</p><div><hr></div><h1>SIEM: Turning Logs Into Intelligence</h1><p>In Lesson 3, we discussed logging across systems &#8212; firewalls, endpoints, cloud platforms, authentication services.</p><p>But logs are useless if they live in isolation.</p><p>That&#8217;s where <strong>SIEM</strong> comes in.</p><h3>Technical Definition &#8212; SIEM</h3><p>A Security Information and Event Management (SIEM) system aggregates, normalizes, correlates, and analyzes log data from multiple sources to detect potential security incidents.</p><h3>Simple Definition</h3><p>A SIEM collects logs from everywhere and connects the dots.</p><p>For example:</p><ul><li><p>Multiple failed logins</p></li><li><p>Followed by a successful login</p></li><li><p>From an unusual geographic location</p></li></ul><p>Individually harmless. Together suspicious.</p><p>That pattern recognition is correlation &#8212; a core SIEM function.</p><p>For the exam, remember:</p><p><strong>SIEM detects and alerts.</strong><br>It does not primarily automate full response workflows.</p><div><hr></div><h1>SOAR: Automating the Response</h1><p>Now let&#8217;s say the SIEM flags suspicious behavior.</p><p>What happens next?</p><p>Without automation, an analyst must:</p><ul><li><p>Investigate</p></li><li><p>Enrich the alert</p></li><li><p>Block IPs</p></li><li><p>Disable accounts</p></li><li><p>Open tickets</p></li></ul><p>With SOAR, that workflow can be automated.</p><h3>Technical Definition &#8212; SOAR</h3><p>Security Orchestration, Automation, and Response (SOAR) platforms integrate security tools and automate incident response workflows through predefined playbooks.</p><h3>Simple Definition</h3><p>SOAR automatically handles the response after detection.</p><p>It might:</p><ul><li><p>Block a malicious IP</p></li><li><p>Isolate an endpoint</p></li><li><p>Disable a compromised account</p></li><li><p>Notify the team</p></li></ul><p>If SIEM finds the problem, SOAR executes the plan.</p><p>For CySA+, this distinction is critical.</p><div><hr></div><h1>SIEM vs SOAR (At a Glance)</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QZaB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QZaB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 424w, https://substackcdn.com/image/fetch/$s_!QZaB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 848w, https://substackcdn.com/image/fetch/$s_!QZaB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 1272w, https://substackcdn.com/image/fetch/$s_!QZaB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QZaB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png" width="1456" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;https://www.logsign.com/uploads/13_1_6cb8094ab7.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="https://www.logsign.com/uploads/13_1_6cb8094ab7.png" title="https://www.logsign.com/uploads/13_1_6cb8094ab7.png" srcset="https://substackcdn.com/image/fetch/$s_!QZaB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 424w, https://substackcdn.com/image/fetch/$s_!QZaB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 848w, https://substackcdn.com/image/fetch/$s_!QZaB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 1272w, https://substackcdn.com/image/fetch/$s_!QZaB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9508bd92-4ec7-4760-b076-5d03978389f0_1920x942.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SW5R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SW5R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 424w, https://substackcdn.com/image/fetch/$s_!SW5R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 848w, https://substackcdn.com/image/fetch/$s_!SW5R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 1272w, https://substackcdn.com/image/fetch/$s_!SW5R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SW5R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png" width="500" height="281" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:281,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;https://www.balbix.com/app/uploads/The-SOAR-Workflow-500x281.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="https://www.balbix.com/app/uploads/The-SOAR-Workflow-500x281.png" title="https://www.balbix.com/app/uploads/The-SOAR-Workflow-500x281.png" srcset="https://substackcdn.com/image/fetch/$s_!SW5R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 424w, https://substackcdn.com/image/fetch/$s_!SW5R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 848w, https://substackcdn.com/image/fetch/$s_!SW5R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 1272w, https://substackcdn.com/image/fetch/$s_!SW5R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd499d9f9-97dd-4861-9b3a-702135b5a513_500x281.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Oi92!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oi92!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Oi92!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Oi92!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Oi92!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oi92!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg" width="1456" height="476" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:476,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;https://images.openai.com/static-rsc-3/4dUhidjgGR0g7HRswxoKMGX8FKxttyU0Grew7Tw8MdzimISf_3TAOJSiXvSWTNox32hq6g05qTVBRz21BHKwn3V9gRZ7cs0RKTz7iDxX354?purpose=fullsize&amp;v=1&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="https://images.openai.com/static-rsc-3/4dUhidjgGR0g7HRswxoKMGX8FKxttyU0Grew7Tw8MdzimISf_3TAOJSiXvSWTNox32hq6g05qTVBRz21BHKwn3V9gRZ7cs0RKTz7iDxX354?purpose=fullsize&amp;v=1" title="https://images.openai.com/static-rsc-3/4dUhidjgGR0g7HRswxoKMGX8FKxttyU0Grew7Tw8MdzimISf_3TAOJSiXvSWTNox32hq6g05qTVBRz21BHKwn3V9gRZ7cs0RKTz7iDxX354?purpose=fullsize&amp;v=1" srcset="https://substackcdn.com/image/fetch/$s_!Oi92!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Oi92!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Oi92!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Oi92!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94174198-f029-41be-b7ad-164eb6371f90_3028x990.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>4</p><p>Think of it like this:</p><ul><li><p><strong>SIEM</strong> = Detection and visibility</p></li><li><p><strong>SOAR</strong> = Orchestrated response and automation</p></li></ul><p>Both work together in mature security operations.</p><div><hr></div><h1>Threat Intelligence in Action</h1><p>Back in Lesson 2, we introduced <strong>Indicators of Compromise (IOCs).</strong></p><h3>Technical Definition &#8212; IOC</h3><p>An Indicator of Compromise is forensic data that identifies potentially malicious activity on a system or network.</p><h3>Simple Definition</h3><p>An IOC is a clue that something bad may be happening.</p><p>Examples:</p><ul><li><p>Malicious IP addresses</p></li><li><p>Known bad file hashes</p></li><li><p>Suspicious domains</p></li></ul><p>Lesson 4 shows how automation makes intelligence actionable.</p><p>Instead of manually checking IOCs, a SIEM can:</p><ul><li><p>Ingest threat feeds</p></li><li><p>Compare them against internal logs</p></li><li><p>Trigger alerts automatically</p></li></ul><p>That&#8217;s operationalized intelligence.</p><div><hr></div><h1>Enrichment and Correlation: Adding Context</h1><p>An alert without context is noise.</p><h3>Technical Definition &#8212; Data Enrichment</h3><p>The process of combining data from multiple disparate sources to add context and improve understanding of an event.</p><h3>Simple Definition</h3><p>Enrichment adds extra information to make alerts smarter.</p><h3>Technical Definition &#8212; Correlation</h3><p>The process of identifying relationships between events across systems to detect patterns of malicious activity.</p><h3>Simple Definition</h3><p>Correlation connects separate events into one bigger story.</p><p>Together, enrichment and correlation transform raw logs into meaningful intelligence.</p><p>These are high-value exam terms &#8212; know them well.</p><div><hr></div><h1>Single Pane of Glass</h1><p>As organizations adopt more tools, visibility becomes fragmented.</p><p>A <strong>Single Pane of Glass</strong> solves that.</p><h3>Technical Definition</h3><p>A unified interface that provides centralized monitoring and visibility across multiple systems.</p><h3>Simple Definition</h3><p>One dashboard to see everything.</p><p>It reduces friction, improves response speed, and increases operational awareness.</p><div><hr></div><h1>APIs and Webhooks: The Integration Backbone</h1><p>None of this automation works without integration.</p><h3>Technical Definition &#8212; API</h3><p>An Application Programming Interface (API) is a defined set of rules that allows applications to communicate and exchange data.</p><h3>Simple Definition</h3><p>An API lets security tools talk to each other.</p><h3>Technical Definition &#8212; Webhook</h3><p>An event-driven HTTP callback that automatically sends data to another application when a predefined event occurs.</p><h3>Simple Definition</h3><p>A webhook sends an automatic message when something happens.</p><p>Example:<br>Alert triggers &#8594; webhook sends data &#8594; SOAR playbook starts immediately.</p><p>This is orchestration in action.</p><div><hr></div><h1>Orchestration: Coordinated Automation</h1><h3>Technical Definition</h3><p>Orchestration is the coordinated management of automated workflows across multiple integrated security tools.</p><h3>Simple Definition</h3><p>Orchestration makes all the tools work together in one smooth process.</p><p>SIEM detects.<br>SOAR responds.<br>Firewalls block.<br>Endpoints isolate.<br>Tickets open automatically.</p><p>That&#8217;s operational maturity.</p><div><hr></div><h1>The Bigger Picture</h1><p>Lesson 4 is where everything connects.</p><ul><li><p>Governance defines expectations.</p></li><li><p>Threat intelligence identifies risks.</p></li><li><p>Logging provides visibility.</p></li><li><p>Automation enforces consistency.</p></li></ul><p>Security maturity isn&#8217;t about having the most tools.</p><p>It&#8217;s about:</p><ul><li><p>Defined processes</p></li><li><p>Integrated platforms</p></li><li><p>Intelligent automation</p></li><li><p>Continuous improvement</p></li></ul><p>For CySA+, focus on understanding relationships:</p><ul><li><p>SIEM vs SOAR</p></li><li><p>What enrichment and correlation mean</p></li><li><p>What an IOC is</p></li><li><p>How APIs and webhooks enable automation</p></li><li><p>Why automation reduces detection and response time</p></li></ul><p>If you can explain those clearly &#8212; both technically and simply &#8212; you&#8217;re solid for this section.</p><h1>Conclusion</h1><p>Security operations is not just about finding threats &#8212; it&#8217;s about responding to them quickly, consistently, and intelligently.</p><p>Lesson 4 shows us that mature security programs rely on more than alerts. They rely on structured processes, integrated tools, and automation that reduce human error and speed up response time. SIEM provides visibility. SOAR executes the response. Enrichment and correlation add context. APIs and webhooks connect everything together.</p><p>When governance defines the rules, intelligence identifies the risks, and logging provides visibility, automation is what turns strategy into action.</p><p>That&#8217;s what operational maturity looks like.</p><p>And that&#8217;s what CySA+ expects you to understand.</p>]]></content:encoded></item><item><title><![CDATA[Cyber Mythbusters:
Myth #2 — “I’m Not a Target.”]]></title><description><![CDATA[Many everyday internet users &#8212; people who don&#8217;t consider themselves wealthy, high&#8209;profile, or interesting &#8212; believe they aren&#8217;t worth a hacker&#8217;s time.]]></description><link>https://blog.netizen.watch/p/cyber-mythbusters-myth-2-im-not-a</link><guid isPermaLink="false">https://blog.netizen.watch/p/cyber-mythbusters-myth-2-im-not-a</guid><dc:creator><![CDATA[CJ White]]></dc:creator><pubDate>Mon, 09 Feb 2026 19:05:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SDUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SDUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SDUL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!SDUL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!SDUL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!SDUL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SDUL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76633635-39dc-4079-8894-10e312e91051_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3207320,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/187430839?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SDUL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!SDUL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!SDUL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!SDUL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76633635-39dc-4079-8894-10e312e91051_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br><br>Many everyday internet users &#8212; people who don&#8217;t consider themselves wealthy, high&#8209;profile, or interesting &#8212; believe they aren&#8217;t worth a hacker&#8217;s time. It&#8217;s a comforting idea, but it&#8217;s not supported by the actual data behind modern cyberattacks.</p><p>Today&#8217;s attacks do not rely on who you are. They rely on how easy you are to compromise.</p><p>This myth persists because people picture cybercriminals manually choosing high&#8209;value targets. But in reality, most attacks are automated, indiscriminate, and designed to hit as many ordinary users as possible.</p><p>What follows is a clear, fact&#8209;driven breakdown of why &#8220;I&#8217;m not a target&#8221; is no longer a safe assumption online.&nbsp;</p><h3>The Myth</h3><blockquote><p>The belief usually sounds like:</p><p>&#8220;Hackers only go after big companies.&#8221;</p><p>&#8220;I don&#8217;t store anything sensitive online.&#8221;</p><p>&#8220;If I&#8217;m not rich, why would someone bother with me?&#8221;</p><p>&#8220;Cybercriminals don&#8217;t know who I am.&#8221;</p></blockquote><p>This reasoning misunderstands how attacks actually work in 2026.</p><h3>The Reality: Automated Attacks Target Everyone</h3><ol><li><p>Most cyberattacks are automated &#8212; not personal. Automated bots now make up over 50% of all web traffic, surpassing human activity for the first time in a decade according to the 2025 Imperva Bad Bot Report. Fastly&#8217;s 2025 Threat Insights Report also found that 37% of all global internet traffic is bot-driven, with much of it classified as malicious or unwanted activity, including account takeovers and data theft </p></li></ol><ol start="2"><li><p>These automated systems scan the entire internet constantly. They don&#8217;t target individuals &#8212; they target any device, account, or service with a weakness.</p></li></ol><blockquote><p>You are not attacked because of who you are.</p><p>You are attacked because bots never stop looking for vulnerabilities.</p></blockquote><p>&nbsp;</p><p>3. Phishing campaigns hit everyone, not specific people</p><p>Phishing remains the world&#8217;s dominant initial access vector. According to aggregated data from IBM, Verizon, and other major cybersecurity reports, over 3.4 billion malicious emails are sent every day worldwide.</p><p>Additionally, the human element, including phishing or credential theft, played a role in approximately 60% of all confirmed breaches in recent data from Verizon&#8217;s DBIR.</p><p>This scale is only possible because attackers send massive waves of messages to millions of people at once. Anyone with an email address is inside the blast radius.</p><blockquote><p>Phishing works because it doesn&#8217;t need to be personal.</p></blockquote><p></p><p>4. Attackers rely on old, leaked, and reused passwords</p><p>The 2025 Verizon DBIR reported that 68% of breaches involved the human element, including reused or compromised credentials.</p><p>Attackers use automated tools to:</p><p>Test old leaked passwords against new accounts</p><p>Attempt logins across multiple platforms</p><p>Exploit reused credentials across banking, email, and social media</p><blockquote><p>If a password you used in 2016 leaked in a public breach, bots are still testing it today. This has nothing to do with your profile &#8212; it&#8217;s simply automation doing its job.</p></blockquote><p>&nbsp;</p><p>5. Your devices are scanned constantly</p><p>Web scanner bots often represent the first and most frequent visitors to any new website, sometimes accounting for up to 70% of early traffic during initial days, as reported by HUMAN Security&#8217;s threat intelligence research.</p><p>The same automated scanning happens on home networks. Bots try to exploit:</p><p>Outdated routers</p><p>Unpatched smart devices</p><p>Exposed ports</p><p>Weak home Wi&#8209;Fi passwords</p><p>Old operating system versions</p><p>If a device is online, it is being tested for weaknesses &#8212; typically within minutes of connecting.</p><blockquote><p>You don&#8217;t need to be hunted.</p><p>Your IP address is already checked routinely.</p></blockquote><p>&nbsp;</p><h3>Why Everyday Users Are Easier Targets</h3><p>Ironically, ordinary users are often more profitable to attackers than high&#8209;profile targets.</p><p>Attackers know that the average person:</p><p>Reuses passwords</p><p>Rarely audits old online accounts</p><p>Doesn&#8217;t update devices promptly</p><p>Is more likely to click a convincing message</p><p>Doesn&#8217;t expect to be attacked</p><p>Lacks enterprise&#8209;grade monitoring or protections</p><blockquote><p>This combination makes everyday users easy and efficient opportunities for cybercriminals operating at scale.</p></blockquote><p>&nbsp;</p><h3>How to Make Yourself a Harder Target</h3><blockquote><p>You don&#8217;t need to be unhackable &#8212; just harder to hack than the lowest&#8209;effort targets automated systems are built to exploit.</p></blockquote><p>A few high&#8209;impact habits include:</p><ol><li><p>Use unique passwords</p></li><li><p>Prevents attackers from reusing leaked credentials.</p></li><li><p>Enable multi&#8209;factor authentication (MFA) everywhere</p></li><li><p>Dramatically reduces account takeover attempts.</p></li><li><p>Keep devices updated</p></li><li><p>Patches close vulnerabilities bots routinely scan for.</p></li><li><p>Be skeptical of unexpected messages</p></li></ol><blockquote><p>Phishing remains successful because it exploits human reaction, not technical flaws.</p></blockquote><ol start="8"><li><p>Remove or secure outdated accounts</p></li></ol><blockquote><p>Old login credentials are among attackers&#8217; favorite entry points.</p></blockquote><p>Small actions change your risk profile significantly</p><p>&nbsp;</p><h3>Final Takeaway</h3><p>The idea that &#8220;I&#8217;m not a target&#8221; made sense twenty years ago, when cyberattacks were largely manual. But in 2026, the numbers tell a different story:</p><ul><li><p>Most web traffic is automated bot activity </p></li><li><p>Over one&#8209;third of global traffic is malicious automation </p></li><li><p>Billions of phishing emails are sent daily </p></li><li><p>Human error contributes to the majority of breaches </p></li></ul><blockquote><p>Attackers do not need to know who you are.</p><p>They only need you to be unprepared.</p></blockquote><p>But with simple, consistent habits, everyday users can protect themselves better than most &#8212; and avoid becoming the low&#8209;effort targets automated attacks are designed to exploit.</p><p>&nbsp;</p><h3>Next Week on Cyber Mythbusters</h3><p>Myth #3 &#8212; &#8220;Strong Passwords Are Enough.&#8221;</p><p>We&#8217;ll explore why even the strongest password can fail on its own &#8212; and what truly protects your accounts in 2026.</p>]]></content:encoded></item><item><title><![CDATA[Hackers Don't Care You're Small—But an MSP Can Stop Them Cold]]></title><description><![CDATA[Running a small business is a nonstop hustle&#8212;winning customers, managing cash flow, handling inventory, and chasing growth.]]></description><link>https://blog.netizen.watch/p/hackers-dont-care-youre-smallbut</link><guid isPermaLink="false">https://blog.netizen.watch/p/hackers-dont-care-youre-smallbut</guid><dc:creator><![CDATA[Mason Ross]]></dc:creator><pubDate>Sun, 01 Feb 2026 21:52:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xM2I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>Running a small business is a nonstop hustle&#8212;winning customers, managing cash flow, handling inventory, and chasing growth. The last thing you need is to moonlight as a full-time IT or cybersecurity expert. But let&#8217;s face it: in today&#8217;s world, hackers don&#8217;t discriminate. Small businesses are prime targets because they often lack the deep defenses that big corporations can afford.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>That&#8217;s where a <strong>Managed Service Provider (MSP)</strong> changes the game. These aren&#8217;t just outsourced help desks; they&#8217;re your proactive partner in keeping tech running smoothly and threats at bay&#8212;without the massive overhead of building your own IT team.</p><p>Here&#8217;s why teaming up with a solid MSP is a must-have move for small businesses right now.</p><h4>1. Enterprise-Level Protection at Small-Business Prices</h4><p>Building an in-house IT or security team? That&#8217;s easily $100K+ annually in salaries, training, tools, and benefits&#8212;completely out of reach for most small operations.</p><p>An MSP flips that equation. You get access to advanced tools like 24/7 monitoring, endpoint protection, threat detection, vulnerability scanning, and more&#8212;all through a predictable monthly subscription. It&#8217;s like renting a top-tier security operations center without the full-time commitment or massive upfront costs. No more surprise &#8220;emergency fix&#8221; bills that wreck your budget.</p><h4>2. Shift from Reactive Fixes to Proactive Defense</h4><p>Most small business breaches happen because no one&#8217;s watching closely enough. A single unpatched vulnerability, clever phishing email, or weak password can lead to stolen data, locked systems, and weeks of downtime.</p><p>MSPs flip the script with continuous monitoring, real-time threat intelligence, and proactive risk management. They spot and neutralize issues before they become disasters&#8212;handling everything from firewall management and malware protection to employee behavior monitoring. In an era where most attacks start with email or exploit outdated software, having experts on watch 24/7 means far fewer sleepless nights.</p><h4>3. Reclaim Your Time for What Actually Grows Your Business</h4><p>Your hours are gold. Spending them troubleshooting slow computers, resetting passwords, patching systems, or stressing over the next potential breach? That&#8217;s time stolen from serving customers, innovating, or scaling.</p><p>An MSP takes that burden off your plate&#8212;managing updates, backups, network health, and security&#8212;so you can focus on running and growing the business. Many MSPs also include employee training on cyber basics, turning your team into a stronger first line of defense without you having to become the expert.</p><h4>4. Easier Compliance and Stronger Customer Trust</h4><p>Handling customer data? Regulations around privacy and security (like GDPR, HIPAA, PCI DSS, or state laws) keep getting tougher. Fines, lost contracts, or damaged reputation from non-compliance can be devastating.</p><p>A good MSP helps with risk assessments, implementing compliant controls, audit-ready documentation, and ongoing reporting. It keeps you on the right side of the rules without the headache. Customers feel the difference when a business takes security seriously&#8212;it builds loyalty and sets you apart from competitors still winging it.</p><h4>5. Scalable, Affordable, and Built for Tomorrow&#8217;s Threats</h4><p>Cyber threats evolve lightning-fast&#8212;AI-powered scams, ransomware-as-a-service, supply-chain attacks. MSPs stay ahead by leveraging shared expertise, the latest tools, and economies of scale across clients.</p><p>Their services grow with you: start small and affordable, then scale as your business expands&#8212;no painful overhauls or hiring sprees required. Predictable pricing beats the unpredictability of going it alone.</p><h4>The Bottom Line: Don&#8217;t Wait for a Crisis to Get Serious About Tech and Security</h4><p>In 2026, handling IT and cybersecurity solo is like running a business without insurance&#8212;risky, expensive when things go wrong, and entirely preventable.</p><p>Partnering with a reliable MSP gives your small business the expertise, protection, and peace of mind it needs&#8212;at a fraction of the cost of doing it in-house.</p><p>Ready to stop firefighting and start thriving? Research local or specialized MSPs that fit your industry and size. Your operations (and your sanity) will thank you.</p><p>What&#8217;s holding your business back from better IT and security support? Drop a comment below&#8212;I&#8217;d love to hear your thoughts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xM2I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xM2I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!xM2I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!xM2I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!xM2I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xM2I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xM2I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!xM2I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!xM2I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!xM2I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F109dec8d-a634-41a6-bbcc-318ef30a7502_1024x608.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">cybersecurity related</figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series (part 3)]]></title><description><![CDATA[Lesson 2-Threat Actors, Threat Intelligence, and Threat Hunting]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series-f84</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series-f84</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Thu, 29 Jan 2026 19:05:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!G9W0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>Lesson 2-Threat Actors, Threat Intelligence, and Threat Hunting</strong></h1><p>In <strong>Lesson 1</strong>, we focused on <em>why</em> cybersecurity programs exist&#8212;governance, risk management, policy, and organizational decision-making. Security starts with leadership choices, not tools.</p><p>In <strong>Lesson 3</strong>, we move into <em>what</em> we are protecting&#8212;operating systems, cloud environments, identity, logging, and Zero Trust architectures.</p><p>This lesson sits <strong>between those two</strong> for a reason.</p><p>Before we talk about systems and architecture, we need to understand <strong>who is attacking them and how defenders identify malicious activity</strong>. That is the purpose of Lesson 2.</p><p>This lesson introduces the <strong>human and intelligence-driven side of cybersecurity</strong>: attackers, their motivations, their behaviors, and the methods defenders use to detect and stop them.</p><p>But, First I want to Introduce Watch . The Spokesman to go over this Lesson with you. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G9W0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G9W0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!G9W0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!G9W0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!G9W0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G9W0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png" width="350" height="525" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:350,&quot;bytes&quot;:2298062,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G9W0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!G9W0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!G9W0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!G9W0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38b80496-2b01-406b-ae05-96fc5a971dc4_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Threat Actor Types</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hHXN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hHXN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!hHXN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!hHXN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!hHXN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hHXN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png" width="350" height="525" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:350,&quot;bytes&quot;:2346591,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hHXN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!hHXN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!hHXN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!hHXN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00bbd6e4-896d-4e0c-b80b-0e1434ddcc5d_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3></h3><p><strong>The Technical definition of A threat actor is an individual or group that conducts malicious activity against systems, networks, or data.</strong></p><p><strong>Now we can keep this in a simple definition </strong>Threat actors are the people behind cyberattacks.</p><p>Threat intelligence is not just about malware signatures or IP addresses. It is about understanding <em>who</em> is attacking, <em>why</em> they are attacking, and <em>how</em> they tend to operate.</p><div><hr></div><h3><strong>Opportunistic vs Targeted Attacks</strong></h3><p>Attacks generally fall into two categories:</p><ul><li><p><strong>Opportunistic attacks<br></strong></p><ul><li><p>Low sophistication<br></p></li><li><p>Little planning<br></p></li><li><p>Use publicly available tools<br></p></li><li><p>No specific target<br></p></li></ul></li><li><p><strong>Targeted attacks<br></strong></p><ul><li><p>Highly planned and researched<br></p></li><li><p>Often use custom tools<br></p></li><li><p>Backed by funding and skilled personnel<br></p></li><li><p>Focus on a specific organization or sector<br></p></li></ul></li></ul><p><strong>Exam reminder:</strong></p><blockquote><p>Targeted attacks = higher risk, higher sophistication, higher impact</p></blockquote><div><hr></div><h2><strong>Common Threat Actor Categories (Know These)</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u8mh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u8mh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!u8mh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!u8mh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!u8mh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u8mh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png" width="436" height="654" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:436,&quot;bytes&quot;:2756381,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u8mh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!u8mh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!u8mh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!u8mh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F871af7f6-b88e-4a92-b51d-e302389e41c9_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here are the 6 main Threat Actors that are dealt with and are on many CompTIA Security Tests.</p><h3><strong>The First is a Nation-State Actors</strong></h3><p><strong>Technical definition:<br></strong> Nation-state actors are government-sponsored groups that use cyber capabilities to achieve political, military, or economic objectives.</p><p><strong>Simple definition:<br></strong> Nation-states are <strong>countries hacking for power, espionage, or advantage</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CzjF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CzjF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!CzjF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!CzjF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!CzjF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CzjF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png" width="230" height="345" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:230,&quot;bytes&quot;:2512119,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CzjF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!CzjF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!CzjF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!CzjF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b0e7434-71c6-4447-a651-66fce778cc0a_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Key traits:</strong></p><ul><li><p>Extremely well-funded </p><p> </p></li><li><p>Long-term campaigns<br></p></li><li><p>Focus on espionage, disruption, or strategic gain<br></p></li><li><p>Often associated with <strong>Advanced Persistent Threats (APTs)<br></strong></p><p><strong>Exam focus:<br></strong> Nation-state is not a random hacker. Think <strong>patience, persistence, and resources</strong>.</p></li></ul><div><hr></div><h3><strong>Moving on to Organized Crime</strong></h3><p><strong>Technical definition:<br></strong> Organized cybercrime groups conduct attacks primarily for financial gain.</p><p><strong>Simple definition:<br></strong> Organized crime = <strong>hacking for money</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mVBq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mVBq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!mVBq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!mVBq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!mVBq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mVBq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png" width="230" height="345" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:230,&quot;bytes&quot;:2335775,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mVBq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!mVBq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!mVBq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!mVBq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24177b5c-6fcb-486d-81f0-fa1f17b61614_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Common activities:</strong></p><ul><li><p>Financial fraud<br></p></li><li><p>Ransomware<br></p></li><li><p>Extortion and blackmail<br></p><p>These groups often operate across borders, making prosecution difficult.</p></li></ul><div><hr></div><h3><strong>Hacktivists</strong></h3><p><strong>Technical definition:<br></strong> Hacktivists use cyberattacks to promote political, ideological, or social causes.</p><p><strong>Simple definition:<br></strong> Hacktivists = <strong>hacking to send a political message</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g26L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g26L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!g26L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!g26L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!g26L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g26L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png" width="230" height="345" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:230,&quot;bytes&quot;:2366752,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g26L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!g26L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!g26L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!g26L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F446efaaf-209e-4aed-a6fe-d5d00851ad07_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Common tactics:</strong></p><ul><li><p>Website defacement<br></p></li><li><p>Data leaks<br></p></li><li><p>Denial-of-service (DoS) attacks<br></p></li><li><p>Phishing<br></p></li></ul><div><hr></div><h3><strong>Insider Threats </strong></h3><p><strong>Technical definition:<br></strong> An insider threat originates from an individual who has legitimate access to an organization&#8217;s systems.</p><p><strong>Simple definition:<br></strong> Insiders are <strong>already inside the building</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JrtS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JrtS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!JrtS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!JrtS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!JrtS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JrtS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png" width="230" height="345" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:230,&quot;bytes&quot;:2114360,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JrtS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!JrtS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!JrtS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!JrtS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b3d4a48-93ca-4720-bbda-43679dbf5a16_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Types:</strong></p><ul><li><p><strong>Intentional insiders</strong> &#8211; malicious actions<br><br></p></li><li><p><strong>Unintentional insiders</strong> &#8211; mistakes, phishing, misconfigurations<br></p><p><strong>Exam tip:<br></strong> Unintentional insiders are <strong>one of the most common causes of breaches</strong>.</p></li></ul><div><hr></div><h3><strong>Script Kiddies</strong></h3><p><strong>Technical definition:<br></strong> A script kiddie uses existing tools or scripts without fully understanding how they work.</p><p><strong>Simple definition:<br></strong> Script kiddies = <strong>push-button attackers</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V9bS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V9bS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!V9bS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!V9bS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!V9bS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V9bS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png" width="230" height="345" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:230,&quot;bytes&quot;:799558,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!V9bS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!V9bS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!V9bS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!V9bS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a3d904-917c-41bf-b121-6ee03fde1ac2_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Low skill does not mean low impact. Poor defenses can still be exploited.</p><div><hr></div><h3><strong>Supply Chain Threats</strong></h3><p><strong>Technical definition:<br></strong> Supply chain attacks compromise trusted vendors, software, or services to gain access to a target organization.</p><p><strong>Simple definition:<br></strong> Supply chain attacks = <strong>attacking who you trust</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!woKK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!woKK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!woKK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!woKK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!woKK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!woKK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png" width="180" height="270" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:180,&quot;bytes&quot;:1161766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!woKK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!woKK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!woKK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!woKK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63d17d5-46af-4a6c-99ff-df2124d5e67b_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Examples include:</p><ul><li><p>compromised software updates<br></p></li><li><p>malicious vendor access<br></p></li><li><p>infected hardware or firmware<br><br></p></li></ul><h2><strong>Advanced Persistent Threats (APT)</strong></h2><p><strong>Technical definition:<br></strong> An <strong>APT</strong> describes long-term, stealthy, and well-resourced cyber campaigns, often conducted by nation-states or organized groups.</p><p><strong>Simple definition:<br></strong> APTs are <strong>quiet, patient attackers who want to stay hidden</strong>.</p><p><strong>Key characteristics:</strong></p><ul><li><p>Custom tools<br></p></li><li><p>Anti-forensics<br></p></li><li><p>Long dwell time<br></p></li><li><p>Strong focus on <strong>persistence<br></strong></p></li></ul><p><strong>Exam reminder:</strong></p><blockquote><p>&#8220;Persistent&#8221; means they want to <strong>stay</strong>, not smash and grab.</p></blockquote><div><hr></div><h2><strong>Tactics, Techniques, and Procedures (TTPs)</strong></h2><p><strong>Technical definition:<br></strong> <strong>TTPs</strong> describe how threat actors plan, execute, and maintain attacks.</p><p><strong>Simple definition:<br></strong> TTPs are an attacker&#8217;s <strong>playbook</strong>.</p><p>Security teams use TTPs to:</p><ul><li><p>identify attackers<br></p></li><li><p>attribute activity<br></p></li><li><p>improve detection<br></p></li></ul><p>The <strong>MITRE ATT&amp;CK Framework</strong> organizes TTPs and is heavily referenced in CySA+.Tactics, Techniques, and Procedures (TTPs)</p><div><hr></div><h2> TTPs? (Simple Breakdown)</h2><ul><li><p><strong>Tactics</strong> &#8211; <em>What the attacker is trying to achieve</em><br>(example: gaining access, stealing data)</p></li><li><p><strong>Techniques</strong> &#8211; <em>How the attacker tries to achieve it</em><br>(example: phishing, credential theft)</p></li><li><p><strong>Procedures</strong> &#8211; <em>The exact steps or tools used</em><br>(example: a specific phishing email or script)</p></li></ul><blockquote><p><strong>Tactics = goal, Techniques = method, Procedures = steps</strong></p></blockquote><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5hwV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5hwV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!5hwV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!5hwV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!5hwV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5hwV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png" width="300" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:300,&quot;bytes&quot;:2297505,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5hwV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!5hwV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!5hwV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!5hwV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba2fffa1-8a94-4fe1-a997-6619a8ea15fd_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2></h2><p>Cybersecurity analysts analyze and document TTPs used by known threat actors to create <strong>attack fingerprints</strong>. These fingerprints help defenders:</p><ul><li><p>Identify who may be attacking</p></li><li><p>Predict the attacker&#8217;s next move</p></li><li><p>Strengthen defenses against common attack patterns</p></li></ul><p>TTPs also help security teams connect attacks to known groups and prioritize defenses.</p><div><hr></div><h2>MITRE ATT&amp;CK and TTPs</h2><p>The <strong>MITRE ATT&amp;CK</strong> framework organizes real-world attacker TTPs into a structured matrix. It shows:</p><ul><li><p>Common attacker goals (tactics)</p></li><li><p>The techniques used to reach them</p></li></ul><p>Security teams use ATT&amp;CK to track attacks across multiple stages instead of viewing alerts in isolation.</p><div><hr></div><h2>TTPs and Behavior Detection</h2><p>Modern security tools focus on <strong>behavior</strong>, not just files. Tools like <strong>UEBA</strong> use TTPs to detect abnormal activity and identify potential attacks by comparing actions against known attacker patterns.</p><div><hr></div><h2>Exam &amp; Real-World Takeaway</h2><p>For <strong>Security+ and CySA+</strong>:</p><ul><li><p>Attackers follow patterns</p></li><li><p>TTPs help defenders recognize those patterns</p></li><li><p>Understanding TTPs helps detect and stop attacks earlier</p></li></ul><blockquote><p>If you understand how attackers behave, you can defend against them more effectively</p></blockquote><div><hr></div><h2><strong>Open-Source Intelligence (OSINT)</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3pwd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3pwd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!3pwd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!3pwd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!3pwd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3pwd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png" width="282" height="423" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:282,&quot;bytes&quot;:2274593,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3pwd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!3pwd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!3pwd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!3pwd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef3e0ade-6f07-4afc-8302-e33162f86468_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now we are going to get into OSNIT. </p><p><strong>Technical definition:<br></strong> OSINT is intelligence collected from publicly available sources.</p><p><strong>Simple definition:<br></strong> OSINT is <strong>what attackers learn about you online</strong>.</p><p><strong>Common sources:</strong></p><ul><li><p>social media<br></p></li><li><p>public records<br></p></li><li><p>DNS and WHOIS<br></p></li><li><p>metadata in documents<br></p></li></ul><p>OSINT works both ways: attackers use it to plan attacks, and defenders use it to understand threats.</p><p><strong>Defensive OSINT</strong> is about finding threats <strong>before</strong> they turn into attacks. It helps organizations understand who might attack them and how those attacks could happen, so defenses can be prepared early.</p><h3>Common Defensive OSINT Sources</h3><ul><li><p><strong>Government alerts</strong> &#8211; Warnings and guidance about current cyber threats</p></li><li><p><strong>CERT / CSIRT teams</strong> &#8211; Share information about active and trending attacks</p></li><li><p><strong>Dark web monitoring</strong> &#8211; Reveals stolen data, malware sales, and attack planning</p></li><li><p><strong>Internal logs</strong> &#8211; System and user activity that may show early signs of an attack</p></li></ul><h3>Simple Takeaway</h3><blockquote><p>Defensive OSINT helps defenders <strong>stay ahead of attackers instead of reacting after damage is done</strong>.</p></blockquote><div><hr></div><h2><strong>Threat Intelligence Sources</strong></h2><p>Threat intelligence can be:</p><ul><li><p><strong>Open-source</strong> (free, public)<br></p></li><li><p><strong>Closed-source</strong> (paid, proprietary)<br></p></li></ul><h3><strong>Key Attributes of Good Threat Intelligence</strong></h3><ul><li><p><strong>Timeliness</strong> &#8211; up to date<br></p></li><li><p><strong>Relevancy</strong> &#8211; applicable to your environment<br></p></li><li><p><strong>Accuracy</strong> &#8211; reliable and validated<br><strong>Exam focus:<br></strong> Threat intelligence must be <strong>actionable</strong>, not just interesting.</p></li></ul><div><hr></div><h2><strong>Threat Intelligence Sharing and ISACs</strong></h2><p><strong>Information Sharing and Analysis Centers (ISACs)</strong> allow organizations in the same sector to share threat data safely.</p><p><strong>Why this matters:</strong></p><ul><li><p>Faster detection<br></p></li><li><p>Better incident response<br></p></li><li><p>Reduced attacker success<br></p><p>This collective defense model is critical for <strong>critical infrastructure sectors</strong> like healthcare, finance, energy, and aviation.</p></li></ul><div><hr></div><h2><strong>Threat Hunting Concepts&#8230;</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sOBV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sOBV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!sOBV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!sOBV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!sOBV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sOBV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png" width="360" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:360,&quot;bytes&quot;:2403463,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sOBV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!sOBV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!sOBV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!sOBV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11537591-b135-4433-9c85-f3fc61f46c38_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now look I got some real hunting to do I like to keep it simple but my partner insist on give you more technical examples&#8230;.what a drag.</p><p><strong>Technical definition:<br></strong> Threat hunting is a proactive, systematic process of searching for malicious activity inside a network.- &#8220;  bunch of jargon &#8220;</p><p><strong>Simple definition:<br></strong> Threat hunting = <strong>assuming the attacker is already inside</strong>.</p><p><strong>Threat hunting:</strong></p><ul><li><p>is largely manual<br></p></li><li><p>relies on analyst skill<br></p></li><li><p>focuses on behavior, not alerts<br></p></li></ul><p><strong>Assume breach</strong> is a core CySA+ mindset.</p><div><hr></div><h3><strong>Threat Hunting Focus Areas</strong></h3><ul><li><p><strong>Misconfiguration hunting</strong> &#8211; weak passwords, open ports, missing patches<br></p></li><li><p><strong>Isolated network hunting</strong> &#8211; air-gapped or restricted environments<br></p></li><li><p><strong>Business-critical asset hunting</strong> &#8211; high-value systems and processes<br><br></p></li></ul><div><hr></div><h2><strong>Indicators of Compromise (IoCs)</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XAzu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XAzu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!XAzu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!XAzu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!XAzu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XAzu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png" width="300" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:300,&quot;bytes&quot;:2520805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XAzu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!XAzu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!XAzu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!XAzu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8454c-0949-44a1-893c-364e4ef345d3_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Technical definition:<br></strong> IoCs are pieces of forensic data that suggest a potential intrusion.</p><p><strong>Simple definition:<br></strong> IoCs are <strong>clues that something bad may have happened</strong>.</p><p>Examples:</p><ul><li><p>suspicious IPs or domains<br></p></li><li><p>unusual login behavior<br></p></li><li><p>unexpected system changes<br></p></li></ul><p><strong>Exam reminder:<br></strong> IoCs &#8800; proof of breach. They require <strong>validation</strong>.</p><div><hr></div><h2><strong>Decoy Methods and Honeypots</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NTLB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NTLB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!NTLB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!NTLB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!NTLB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NTLB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png" width="318" height="477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:318,&quot;bytes&quot;:2424716,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NTLB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!NTLB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!NTLB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!NTLB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c4fbab5-3450-4a28-9d80-f72d1b5141ba_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I am setting up some decoys. Honey pots to be exact to capture potential threats.</p><p><strong>Technical definition:<br></strong> Decoy systems intentionally attract attackers to observe their behavior.</p><p><strong>Simple definition:<br></strong> Honeypots are <strong>fake targets to catch attackers early</strong>.</p><p><strong>Why they matter:</strong></p><ul><li><p>early detection<br></p></li><li><p>attacker intelligence<br></p></li><li><p>training defenders</p></li></ul><p><strong>They supplement detection</strong> &#8212; they do not replace it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!klJh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!klJh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!klJh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!klJh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!klJh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!klJh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png" width="398" height="597" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:398,&quot;bytes&quot;:2397355,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185902125?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!klJh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!klJh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!klJh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!klJh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce89a5-3796-4328-99e7-a921fde682ae_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><h2><strong>What to Remember for the Exams</strong></h2><p>If you remember nothing else from Lesson 2, remember this:</p><ul><li><p>Threat actors differ by <strong>motivation and resources<br></strong></p></li><li><p>APTs = <strong>persistent and stealthy<br></strong></p></li><li><p>TTPs describe <strong>how attackers operate<br></strong></p></li><li><p>OSINT is <strong>public information weaponized<br></strong></p></li><li><p>Threat hunting assumes <strong>breach<br></strong></p></li><li><p>IoCs are <strong>signals, not certainty<br></strong></p></li><li><p>Sharing intelligence improves <strong>defense speed<br></strong></p></li></ul><div><hr></div><h2><strong>Closing the Gap to Lesson 3</strong></h2><p>Lesson 2 explains <strong>who attacks and how defenders detect them</strong>.<br> Lesson 3 builds on this by explaining <strong>what systems exist and how they are secured</strong>.</p><p>Together, these lessons bridge the gap between <strong>policy</strong>, <strong>people</strong>, and <strong>technology</strong>&#8212;which is exactly how cybersecurity works in the real world. Thank you for your time and see you in the next part of this series.</p><h2>Intellectual Property &amp; Creative Disclaimer</h2><p>All characters, names, visuals, concepts, and story elements featured in this blog&#8212;including <strong>Netizen</strong>, <strong>Watch</strong>, and the associated cybersecurity universe&#8212;are original creative works and are the intellectual property of the author.</p><p>These characters and visual representations are created for <strong>educational and creative purposes</strong> and are not affiliated with, endorsed by, or representative of any real organization, company, government entity, or individual.</p><p>Unauthorized reproduction, redistribution, or commercial use of the characters, artwork, or unique creative concepts presented here without explicit permission is not permitted.</p><p>Educational references (such as cybersecurity frameworks, tools, and terminology) are used for instructional purposes only and remain the property of their respective owners.</p><p>&#169; [Anthony Velazquez/ Netizen.Watch LLC] &#8211; All Rights Reserved.</p>]]></content:encoded></item><item><title><![CDATA[The Biggest Cybersecurity Risk in Your Business Isn't Technical... It's You]]></title><description><![CDATA[Why leadership behavior, not hackers or tools, is the weakest link in most security stacks.]]></description><link>https://blog.netizen.watch/p/the-biggest-cybersecurity-risk-in</link><guid isPermaLink="false">https://blog.netizen.watch/p/the-biggest-cybersecurity-risk-in</guid><dc:creator><![CDATA[Arie Kiana]]></dc:creator><pubDate>Wed, 28 Jan 2026 16:02:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oOul!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oOul!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oOul!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!oOul!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!oOul!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!oOul!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oOul!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1925168,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185988170?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oOul!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!oOul!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!oOul!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!oOul!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb552455a-fa1f-4134-8e24-f52e1a7f40de_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><p>When business owners think about cybersecurity risk, they usually imagine an external threat. <br><br>A hacker. </p><p>A phishing email. </p><p>A data breach that comes out of nowhere. </p><p></p><p>What they rarely consider is the quieter truth: </p><p></p><p><strong>Most security failures don&#8217;t come from malicious outsiders &#8212; they come from stressed, overloaded operators making reasonable decisions in broken systems.</strong></p><p></p><p>And in most businesses, the primary operator is the owner.</p><p></p><h2>Security Doesn&#8217;t Fail at the Edge &#8212; It Fails at the Center</h2><p></p><p>Cybersecurity tools are stronger than they&#8217;ve ever been.</p><p>Firewalls. Endpoint protection. Password managers. Monitoring software.</p><p>Yet breaches continue to rise.</p><p></p><p>Why?</p><p></p><p>Because tools don&#8217;t make decisions.</p><p>People do.</p><p></p><p>And when decision-making lives inside a single overwhelmed founder &#8212; without clear operational guardrails &#8212; security becomes fragile by default. </p><p></p><p>Not because the founder is careless.</p><p>But because human memory, attention, and energy are unreliable infrastructure.</p><p></p><h2>The Operator Layer: The Most Overlooked Risk Surface</h2><p>Every business has multiple layers of security:</p><p></p><ul><li><p>Technical tools </p></li><li><p>Policies and permissions</p></li><li><p>Data protection</p></li><li><p>Monitoring and response</p></li></ul><p></p><p>But sitting above all of them is the operator layer &#8212; the habits, decisions, and hehaviors of the people running the system.</p><p></p><p>This is where most risk accumulates.</p><p></p><p>Examples look mundane: </p><p></p><ul><li><p>Reusing a password because &#8220;it&#8217;s temporary&#8221;</p></li><li><p>Giving full access instead of scoped access &#8220;for speed&#8221;</p></li><li><p>Skipping updates during a busy week</p></li><li><p>Ignoring alerts because there are too many</p></li><li><p>Storing credentials in a notes app &#8220;just for now&#8221;</p></li></ul><p></p><p>None of these feel dangerous in isolation.</p><p></p><p>Together, they form an environment where breaches don&#8217;t need brilliance &#8212; only opportunity.</p><p></p><h2>Leadership Sets the Security Culture (Whether Intentionally or Not)</h2><p></p><p>In early-stage and growing businesses, the owner&#8217;s behavior <em>becomes the blueprint. </em></p><p></p><p>Teams don&#8217;t follow written policies &#8212; they follow observed behavior. </p><p></p><p>If leadership: </p><p></p><ul><li><p>bypasses systems &#8594; systems get bypassed</p></li><li><p>avoids documentation &#8594; knowledge becomes tribal</p></li><li><p>delay decisions &#8594; risks stack quietly</p></li><li><p>treats security as a nuisance &#8594; it stays underdeveloped</p></li></ul><p></p><p>This isn&#8217;t a moral failure. </p><p>It&#8217;s an operational one. </p><p></p><p>And it&#8217;s why leadership discipline matters more than technical knowledge.</p><p></p><h2>&#8220;I&#8217;m Too Small to Be a Target&#8221; Is an Operational Myth</h2><p></p><p>Cybercriminals don&#8217;t prioritize businesses based on brand recognition. </p><p></p><p>They prioritize: </p><p></p><ul><li><p>weak access controls</p></li><li><p>predictable behavior</p></li><li><p>poor segmentation</p></li><li><p>lack of monitoring</p></li><li><p>slow response times</p></li></ul><p></p><p>Small businesses are often <em>more </em>exposed because:</p><p></p><ul><li><p>one person wears every hat</p></li><li><p>access grows faster than oversight</p></li><li><p>tools are added without integration</p></li><li><p>recovery plans don&#8217;t exist yet</p></li></ul><p></p><p>Security threats scale <em>down </em>beautifully. </p><p></p><p>Operational maturity rarely does.</p><p></p><h2>Why Tools Without Structure Create False Confidence</h2><p></p><p>Security tools are essential &#8212; but only when paired with operational clarity. </p><p></p><p>Without structure: </p><p></p><ul><li><p>alerts create noise, not insight</p></li><li><p>permissions sprawl unchecked</p></li><li><p>accountability blurs</p></li><li><p>response becomes reactive</p></li><li><p>founders burn out managing exceptions</p></li></ul><p>This is why <strong><a href="https://www.netizen.watch/">Netizen Watch</a></strong> approaches protection through an operational lens first. </p><p></p><p>Because real security is not something you <em>install.</em></p><p></p><p>It&#8217;s something you <em>run.</em></p><p></p><h2>The Shift Secure Business Owners Make</h2><p></p><p>Secure leaders don&#8217;t try to do more. </p><p></p><p>They reduce reliance on memory, urgency, and heroics. </p><p></p><p>They design for: </p><p></p><ul><li><p>tired days </p></li><li><p>missed details</p></li><li><p>growth</p></li><li><p>delegation </p></li><li><p>human error</p></li></ul><p></p><p>They understand that <strong>security is a leadership system</strong>, not a technical chore. </p><h2></h2><h2>A Simple Operational Reframe</h2><p></p><p>Instead of asking: </p><blockquote><p><em>&#8220;Do I have enough security tools?&#8221;</em></p></blockquote><p></p><p>Ask: </p><blockquote><p><em>&#8220;If I stepped away for two weeks, would my business still know how to protect itself?&#8221;</em></p></blockquote><p></p><p>That question revels everything:</p><p></p><ul><li><p>clarity vs chaos</p></li><li><p>systems vs dependency</p></li><li><p>resilience vs luck</p></li></ul><h2></h2><h2>Final Thought: Security Is an Extension of Leadership</h2><p></p><p>Strong security isn&#8217;t loud. </p><p>It isn&#8217;t dramatic. </p><p>It doesn&#8217;t demand constant attention.</p><p></p><p>It feels quiet. Stable. Boring &#8212; in the best way. </p><p></p><p>And it starts with leaders who understand that: </p><p></p><blockquote><p><strong>Structure is not restrictive. It&#8217;s protective.</strong></p></blockquote><p></p><p>When operations are clear, security stops being stressful. </p><p>It simply becomes part of how the business is run.</p><p></p><h3>Coming Next This Month</h3><p>Next week we'&#8216;ll unpack why operational security is not paranoia &#8212; it&#8217;s peace of mind, and how calm systems create both safety <em>and </em>speed.</p>]]></content:encoded></item><item><title><![CDATA[Cyber Mythbusters: Debunking One Myth at a Time]]></title><description><![CDATA[Myth #1 &#8212; &#8220;Incognito Mode Makes You Anonymous&#8221;]]></description><link>https://blog.netizen.watch/p/cyber-mythbusters-debunking-one-myth</link><guid isPermaLink="false">https://blog.netizen.watch/p/cyber-mythbusters-debunking-one-myth</guid><dc:creator><![CDATA[CJ White]]></dc:creator><pubDate>Mon, 26 Jan 2026 21:36:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UV93!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UV93!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UV93!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UV93!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UV93!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UV93!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UV93!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0178de38-3751-494f-bca7-58140bb58663_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2018574,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185894211?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UV93!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UV93!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UV93!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UV93!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0178de38-3751-494f-bca7-58140bb58663_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>Myth #1 &#8212; &#8220;Incognito Mode Makes You Anonymous&#8221;</h3><blockquote><p>If you&#8217;ve ever opened a private browsing window and felt a little safer online&#8230; you&#8217;re not alone.</p></blockquote><p></p><p>Incognito mode (or private browsing) is one of the most widely used and misunderstood features on the internet. For years, people have assumed that clicking that shadowy window with the hat&#8209;and&#8209;glasses icon somehow makes them invisible.</p><p></p><h4>But here&#8217;s the truth most browsers don&#8217;t explain clearly:</h4><blockquote><p>Incognito mode does not make you anonymous.</p><p>It only hides activity from your own device.</p></blockquote><p></p><p>Let&#8217;s break down what this myth gets wrong&#8212;and what incognito mode actually does.</p><p></p><h4>The Myth</h4><p>The belief usually sounds like this:</p><blockquote><p>&#8220;Incognito mode hides what I do online.&#8221;</p><p>&#8220;Websites can&#8217;t track me if I&#8217;m using private browsing.&#8221;</p><p>&#8220;My ISP/employer/school can&#8217;t see this.&#8221;</p><p>&#8220;It keeps hackers from spying on me.&#8221;</p></blockquote><p></p><p>This myth is incredibly common&#8212;and understandable.</p><p>After all, the browser literally tells you:</p><p>&#8220;You&#8217;ve gone incognito.&#8221;</p><p>That sounds pretty anonymous, right?</p><p></p><h4>Why People Believe This</h4><p>There are a few reasons this myth refuses to die:</p><ul><li><p>The wording is vague and misleading</p></li><li><p>The iconography feels stealthy</p></li><li><p>Influencers oversimplify privacy concepts</p></li><li><p>Many people confuse local privacy with online anonymity</p></li><li><p>Browser warnings focus on what incognito does, not what it doesn&#8217;t</p></li></ul><p>None of this makes you careless&#8212;it makes you human.</p><p>But misunderstanding incognito mode can lead to risky assumptions.</p><p></p><h4>What Incognito Mode Actually Does</h4><blockquote><p>Incognito mode is helpful. Just not in the way most people think.</p></blockquote><p></p><p>When you use incognito/private browsing, your browser does:</p><ul><li><p>Stop saving your browsing history</p></li><li><p>Delete cookies when the session closes</p></li><li><p>Prevent autofill and stored passwords</p></li><li><p>Keep downloads and bookmarks separate</p></li><li><p>Allow you to log into multiple accounts at once</p></li><li><p>Provide a &#8220;clean&#8221; browser session for testing</p></li></ul><p></p><p>In short:</p><blockquote><p>Incognito mode protects you from your own device.</p></blockquote><p></p><p>It&#8217;s great for shared computers, testing logins, or keeping casual browsing private from other users of the same machine.</p><p></p><h4>What Incognito Mode Does Not Do</h4><blockquote><p>This is where the myth falls apart.</p></blockquote><p></p><p>Incognito mode does not:</p><ul><li><p>Hide your IP address</p></li><li><p>Make you anonymous online</p></li><li><p>Stop websites from tracking you</p></li><li><p>Hide activity from your ISP</p></li><li><p>Hide activity from your employer or school network</p></li><li><p>Protect you from malware</p></li><li><p>Prevent browser fingerprinting</p></li><li><p>Encrypt your traffic</p></li><li><p>Stop law enforcement or companies from logging activity</p></li><li><p>If someone else controls or monitors the network&#8212;they can still see what&#8217;s happening.</p></li></ul><p></p><h4>What Actually Happens Behind the Scenes</h4><p>Here&#8217;s what&#8217;s still visible when you use incognito:</p><p></p><ul><li><p>Your IP Address</p></li></ul><blockquote><p>Websites still see your IP. This reveals approximate location and can uniquely identify you.</p></blockquote><ul><li><p>Your Internet Provider or Network Admin</p></li></ul><blockquote><p>Your ISP, workplace, or school can still log traffic and DNS requests.</p></blockquote><ul><li><p>Browser Fingerprinting</p></li></ul><p>Websites can identify you based on:</p><blockquote><ul><li><p>Operating system</p></li><li><p>Screen size</p></li><li><p>Fonts</p></li><li><p>Language</p></li><li><p>Hardware details</p></li><li><p>Browser version</p></li><li><p>This works even without cookies.</p></li></ul></blockquote><p></p><h4>Logged&#8209;In Services</h4><p>If you log into Google, Meta, or another account while in incognito, those companies can still associate activity with you.</p><blockquote><p>incognito mode doesn&#8217;t block observation&#8212;it just clears local traces after.</p></blockquote><p></p><h4>Real&#8209;World Examples</h4><ul><li><p>Schools still detect students browsing in incognito</p></li></ul><ul><li><p>Employers still log traffic through firewalls</p></li></ul><ul><li><p>Websites can detect private browsing via scripts</p></li></ul><ul><li><p>ISPs still record destinations and timing</p></li></ul><p></p><blockquote><p>If incognito truly made users anonymous, it would break most of the modern internet. It doesn&#8217;t&#8212;and it can&#8217;t.</p></blockquote><p></p><h4>&nbsp;So&#8230; How Do You Increase Privacy Online?</h4><p>If your goal is actual privacy (not invisibility), here&#8217;s what helps:</p><ul><li><p>Use a VPN</p></li></ul><blockquote><p>Protects traffic from your ISP and local networks.</p><p>Does not make you anonymous&#8212;but adds a layer.</p></blockquote><ul><li><p>Privacy&#8209;Focused Browsers</p></li></ul><blockquote><p>Firefox and Brave allow stronger privacy controls than default Chrome settings.</p></blockquote><ul><li><p>Separate Browser Profiles</p></li></ul><blockquote><p>Keep work, personal, and testing activity isolated.</p></blockquote><ul><li><p>Reduce Logged&#8209;In Tracking</p></li></ul><blockquote><p>Avoid staying logged into Google or Meta while browsing.</p></blockquote><ul><li><p>Understand the Limits</p></li></ul><blockquote><p>True anonymity requires tools like Tor&#8212;and tradeoffs.</p></blockquote><p></p><h4><strong>Privacy isn&#8217;t a switch&#8212;it&#8217;s a system.</strong></h4><p></p><p>TL;DR</p><blockquote><p>Incognito mode = local privacy only.</p><p>It hides activity from your device, not the internet.</p><p>It&#8217;s useful&#8212;but it&#8217;s not invisibility.</p></blockquote><p></p><h4>Final Takeaway</h4><p>Incognito mode isn&#8217;t broken.</p><p>It&#8217;s just misunderstood.</p><p>The real danger isn&#8217;t using it&#8212;it&#8217;s overestimating what it protects you from.</p><p>Cybersecurity myths stick around because technology often hides complexity.</p><p>This series exists to pull the curtain back&#8212;without fear&#8209;mongering or jargon.&nbsp;</p><p></p><h2>Next Week on Cyber Mythbusters</h2><p>Myth #2 &#8212; &#8220;I&#8217;m Not a Target.&#8221;</p><blockquote><p>(Why attackers don&#8217;t need to know who you are to exploit you.)</p></blockquote><p></p><p>If this post surprised you, consider subscribing and sharing it with someone who still believes incognito mode makes them invisible.</p><p></p><p>Because in cybersecurity, clarity is protection.</p>]]></content:encoded></item><item><title><![CDATA[Career Management Tactics From North Korean Hackers]]></title><description><![CDATA[North Korean threat actors are called &#8220;Advanced Persistent Threats&#8221; for a reason&#8212;and that persistence shows up in how their IT worker operations get people hired. This article turns that uncomfortable reality into a clean, legal career blueprint: visibility, stacked experience through projects, high-volume applications, and the mindset shift of letting them tell you no.]]></description><link>https://blog.netizen.watch/p/career-management-tactics-from-north</link><guid isPermaLink="false">https://blog.netizen.watch/p/career-management-tactics-from-north</guid><dc:creator><![CDATA[Akyl]]></dc:creator><pubDate>Mon, 26 Jan 2026 17:01:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CG4L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>2025 has been a record year for the employment of North Korean citizens within corporate America. That is not a sign of DEI making strides for disenfranchised Americans. It is a testament to the perseverance and ingenuity by people who literally have their backs against the pavement. North Korean Hackers are referred to by U.S. CyberCOM (United States Cyber Command) as an APT, Advanced Persistent Threat. APTs are groups of hackers with nation state missions, backing, and funding. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.reddit.com/r/technology/comments/1ebgbe4/north_korean_hacker_got_hired_by_us_security/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KwVj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 424w, https://substackcdn.com/image/fetch/$s_!KwVj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 848w, https://substackcdn.com/image/fetch/$s_!KwVj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!KwVj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KwVj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg" width="500" height="250" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:250,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;r/technology - North Korean hacker got hired by US security vendor, immediately loaded malware&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.reddit.com/r/technology/comments/1ebgbe4/north_korean_hacker_got_hired_by_us_security/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="r/technology - North Korean hacker got hired by US security vendor, immediately loaded malware" title="r/technology - North Korean hacker got hired by US security vendor, immediately loaded malware" srcset="https://substackcdn.com/image/fetch/$s_!KwVj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 424w, https://substackcdn.com/image/fetch/$s_!KwVj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 848w, https://substackcdn.com/image/fetch/$s_!KwVj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!KwVj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff58d5f28-fee6-48a9-a5af-ba0b85ec5b3a_500x250.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the case of North Korean APTs the mission is to help the country avoid sanctions. These hackers are actually really good at that task. In Dec of 2025 Chain Analysis reported a record year for North Korean Hackers stealing $2Billion from various crypto theft attacks. Unfortunately for most of the individuals participating in these operations if pride in their countries mission is not enough of a motivation many of my friends that monitor this behavior will tell you they have &#8220;unplanned moments of silence&#8221; when APT groups go dark.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6A-H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6A-H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 424w, https://substackcdn.com/image/fetch/$s_!6A-H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 848w, https://substackcdn.com/image/fetch/$s_!6A-H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 1272w, https://substackcdn.com/image/fetch/$s_!6A-H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6A-H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png" width="530" height="355" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/915a3d32-4e11-4292-b63d-315a0639903c_530x355.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:355,&quot;width&quot;:530,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:289707,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/180820980?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6A-H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 424w, https://substackcdn.com/image/fetch/$s_!6A-H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 848w, https://substackcdn.com/image/fetch/$s_!6A-H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 1272w, https://substackcdn.com/image/fetch/$s_!6A-H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F915a3d32-4e11-4292-b63d-315a0639903c_530x355.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>So what can we learn about career success from the very motivated hackers that have to pay dues to make up for sanctions:</p><ol><li><p>Don&#8217;t just master your craft; Tell the Internet About it</p><p></p><p>Many of the DPRK ITWs (Information Technology Workers) have publicly available resumes and we aren&#8217;t just talking about LinkedIn. The industry has observed profiles on various freelance websites that serve to give the ITW the presence of an expert in the field. You can use this principle by developing your LinkedIn profile, writing articles for multiple sources, and making your own profile on freelance websites that showcase your experience. Your resume is like the poster for your rock band/music career/breakout movie. Your poster needs to be everywhere that eyes drift to. Above urinals, behind the heads of boring people, laminated and bolted to bathroom floors in-between stalls so that people throwing up can read your skills while they contemplate life decisions. <em>Metaphorically speaking of course - just think outside the box</em>.</p><p></p></li><li><p>Stack Your Resume with Experience</p><p><br>The resumes of these sanction dodging professionals are stacked with experience in the fields they are looking to work in. At this point you&#8217;re probably wondering <strong>how do I gain experience without a job? </strong>That&#8217;s a simple one to remedy; experience comes from work not the job. You just have to do the work, and lucky for you the tech industry respects projects that you can prove. Find a project to engineer, maintain, or improve. Write a blog on it and add it to your resume. Truth is that plenty of tech experts got hired because of the work they did when no one is looking. Side projects documented on Github, Youtube, and blogs can turn into talks, which add to your rapport within the industry. Imagine someone walking up to a construction site and asking for a job whilst admitting they never swung a hammer and thinks a stud finder is how you find handsome lesbians. Unless they plan on blowing up the jobsite for insurance money that someone isn&#8217;t getting a job. The hobbyist building furniture and doing handy man side project will be labeled a &#8220;self starter&#8221; that people want to work with. <br></p></li><li><p>Mass Apply is a more superior strategy than Intentional Applications</p><p><br>Have you ever stared at job posting and wanted it so bad you crafted your resume around that job posting just to get the sinking feeling in the pit of your stomach that they never even look at your resume? DPRK Hackers don&#8217;t have that problem at all. They mass apply to all of the available job listing that meet a certain criteria. Every job listing is lined up in rows like audience members of the <a href="https://www.forbes.com/sites/kellyphillipserb/2016/09/13/a-look-back-at-oprahs-ultimate-car-giveaway/">Oprah Winfrey show in November 2010 and handed the same exact stock 2012 Volkswagen Beetle with color swaps</a> (the car is your resume in this analogy). As opposed to modifying your resume for each job listing which will waste your <strong>JOBLESS</strong> time just so someone with a <strong>JOB </strong>can have an easier time selecting a candidate. If you modify your resume for each job posting you may get to apply to 15-30 position in a week. Just to be completely honest in 2026 if you tell me you are looking for a job and you&#8217;ve submitted less than 100 applications in a week I don&#8217;t believe that you want a job.<br></p></li><li><p>Let them tell you no before you tell yourself no (Don&#8217;t Qualify Apply Anyway)</p><p><br>Do you think that fraudulent ITWs are burdened by the thought of career rejection from corporations posting job listings? DPRK hackers don&#8217;t care about being rejected within their job search and maybe you should be the same way. Apply to the job even if you think they&#8217;ll say no apply anyway. You don&#8217;t meet the qualifications, who cares, apply anyway. A Microsoft employee once broke it down to me like this: most of the people that get the job have some skills but most of the time the organization is training you on the job; so most of the new hires had no experience. Using the lens of <em><strong>LET THEM TELL YOU NO,</strong></em> how many opportunities have you missed by giving yourself the no?</p></li></ol><p>There you have it; 4 easy steps on how to get the job learned from some fraudulent IT workers who actually stole your job. This is $2Billion advice to North Korean hackers and it could be lifetime career advice for you if you let it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CG4L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CG4L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CG4L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CG4L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CG4L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CG4L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2603163,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/180820980?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CG4L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CG4L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CG4L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CG4L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2abce36-87e8-467f-8a48-5333d7bc33b9_1536x1024.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p> </p><p>Read more about DPRK ITWs<br><br>https://www.fbi.gov/wanted/cyber/dprk-it-workersurluser</p><p>https://reports.dtexsystems.com/DTEX-Exposing+DPRK+Cyber+Syndicate+and+Hidden+IT+Workforce.pdf</p><p>https://www.reddit.com/r/technology/comments/1ebgbe4/north_korean_hacker_got_hired_by_us_security/</p><p>https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series (Part 2)]]></title><description><![CDATA[Architecture, IAM(Identity and Access Management), and Visibility &#8212; &#8220;What Are We Actually Protecting?&#8221;]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series-8e3</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series-8e3</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Thu, 22 Jan 2026 18:17:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!v285!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong> Architecture, IAM(Identity and Access Management), and Visibility &#8212; &#8220;What Are We Actually Protecting?&#8221;</strong></h1><p>In Lesson 1, we covered the <em>why</em> behind cybersecurity: governance, policy, risk, and vulnerability response. Now we&#8217;re moving into the <em>what</em> and <em>how</em>:</p><blockquote><p><strong>What systems exist in a modern environment, how they&#8217;re structured, and how defenders maintain visibility.</strong></p></blockquote><p>If you&#8217;re studying <strong>Security+</strong>, this lesson gives you the core language you&#8217;ll see on exams. If you&#8217;re aiming for <strong>CySA+</strong>, this lesson matters because it shows up in real analyst work every day: hardening systems, understanding cloud designs, validating identity controls, and interpreting logs.</p><p>This post is based on <strong>CompTIA CySA+ (CS0-003) Lesson 3</strong>.</p><div><hr></div><h2><strong>The &#8220;Big Idea&#8221; of Lesson 3 (Exam + Real Life)</strong></h2><p>If Lesson 1 is the <strong>rulebook</strong> (policy + risk), Lesson 3 is the <strong>map of the city</strong>.</p><ul><li><p><strong>Operating Systems</strong> = where attackers live once they get in</p></li><li><p><strong>Virtualization/Cloud</strong> = where your systems <em>actually run now</em></p></li><li><p><strong>Zero Trust</strong> = why &#8220;inside vs outside&#8221; doesn&#8217;t work anymore</p></li><li><p><strong>IAM</strong> = who is allowed to do what</p></li><li><p><strong>DLP/PKI/Logging</strong> = how you prevent loss, prove trust, and see what happened</p></li></ul><p>CompTIA even frames it this way through the objectives: system/architecture, OS concepts, cloud models, IAM, and data protection/visibility.</p><div><hr></div><h1><strong>1) Operating System Concepts (Where Security Gets Real)</strong></h1><h2><strong>System Hardening</strong></h2><p><strong>Textbook definition:<br>System hardening</strong> is the process of securely configuring an OS, application, device, or service by reducing its attack surface&#8212;disabling unnecessary features, restricting access, applying secure baselines, and enforcing least privilege.</p><p><strong>Simple definition:<br></strong>Hardening = <strong>turn off what you don&#8217;t need and lock down what you do.</strong></p><p><strong>Remember for tests (and life):</strong></p><ul><li><p>Hardening is about <strong>reducing attack surface</strong></p></li><li><p>Use secure baselines like <strong>CIS Benchmarks</strong> and <strong>DoD STIGs</strong></p></li><li><p>Defaults are usually built for <strong>convenience</strong>, not security</p></li></ul><p><strong>Memory hook:</strong></p><blockquote><p><em>&#8220;If you&#8217;re not using it, disable it.&#8221;</em></p></blockquote><div><hr></div><h2><strong>Windows Registry (and why defenders care)</strong></h2><p><strong>Textbook definition:<br></strong>The <strong>Windows Registry</strong> is a hierarchical database that stores OS, device, and application configuration settings.</p><p><strong>Simple definition:<br></strong>The registry is <strong>Windows&#8217; settings brain</strong>.</p><h3><strong>Root keys (high exam value)</strong></h3><p>CompTIA lists five root keys (know these names):</p><ul><li><p><strong>HKCR</strong> &#8211; HKEY_CLASSES_ROOT - <strong>what program opens what file</strong>.</p></li><li><p><strong>HKCU</strong> &#8211; HKEY_CURRENT_USER</p></li><li><p><strong>HKLM</strong> &#8211; HKEY_LOCAL_MACHINE</p></li><li><p><strong>HKU</strong> &#8211; HKEY_USERS - <strong>settings for every user on the computer</strong>.</p></li><li><p><strong>HKCC</strong> &#8211; HKEY_CURRENT_CONFIG - <strong>the hardware setup Windows is using right now</strong>.</p></li></ul><p><strong>Quick &#8220;what matters most&#8221;</strong></p><ul><li><p><strong>HKLM</strong> = system-wide settings (big for persistence and malware changes)<br><br></p></li><li><p><strong>HKCU</strong> = settings for the currently logged-in user (user-level changes)<br><br></p></li></ul><h3><strong>Windows Registry Files (more exam terms)</strong></h3><h3>CompTIA calls out these registry hive files:</h3><ul><li><p><strong>SAM</strong></p></li><li><p><strong>SECURITY</strong></p></li><li><p><strong>SOFTWARE</strong></p></li><li><p><strong>SYSTEM</strong></p></li><li><p><strong>DEFAULT</strong></p></li></ul><p><strong>Memory hook:</strong></p><blockquote><p>&#8220;Windows keeps secrets in the registry&#8212;attackers love it, defenders audit it.&#8221;</p></blockquote><div><hr></div><h2><strong>Linux Configuration Files (no registry here)</strong></h2><p><strong>Textbook definition:<br></strong>Linux typically stores configuration as <strong>text-based config files</strong> rather than a centralized registry database.</p><p><strong>Simple definition:<br></strong>Linux settings live in <strong>files, not a database</strong>.</p><p><strong>Memory Hook:</strong></p><ul><li><p>Linux config files are commonly in <strong>/etc<br><br></strong></p></li></ul><div><hr></div><h2><strong>Configuration File Formats (know these)</strong></h2><p>CompTIA highlights common config standards:</p><ul><li><p><strong>INI</strong> &#8211; key=value</p></li><li><p><strong>XML</strong> &#8211; tag-based</p></li><li><p><strong>YAML</strong> &#8211; indentation + &#8220;:&#8221;</p></li><li><p><strong>JSON</strong> &#8211; structured data (brackets/braces)</p></li></ul><p><strong>Simple definition:<br></strong>These are <strong>ways apps store settings</strong>&#8212;and misconfigurations often become vulnerabilities.</p><div><hr></div><h1><strong>2) Virtualization, Containers, and Emulation (Modern Infrastructure)</strong></h1><h2><strong>Virtualization &amp; Hypervisors</strong></h2><p><strong>Textbook definition:<br>Virtualization</strong> uses a <strong>hypervisor</strong> to abstract physical hardware so multiple virtual machines (VMs) can run on one host.</p><p><strong>Simple definition:<br></strong>Virtualization = <strong>one big computer pretending to be many computers.</strong></p><h3><strong>Type I vs Type II Hypervisor (high exam value)</strong></h3><p>CompTIA breaks it down like this:</p><ul><li><p><strong>Type I (bare metal)</strong>: enterprise-grade, purpose-built</p></li><li><p><strong>Type II (hosted)</strong>: runs on top of a normal OS (great for labs)</p></li></ul><p><strong>Memory hook:</strong></p><blockquote><p>Type I = &#8220;I run the show.&#8221;<br>Type II = &#8220;I run inside the show.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v285!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v285!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 424w, https://substackcdn.com/image/fetch/$s_!v285!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 848w, https://substackcdn.com/image/fetch/$s_!v285!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 1272w, https://substackcdn.com/image/fetch/$s_!v285!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v285!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32968,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185441269?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v285!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 424w, https://substackcdn.com/image/fetch/$s_!v285!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 848w, https://substackcdn.com/image/fetch/$s_!v285!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 1272w, https://substackcdn.com/image/fetch/$s_!v285!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5450d72-9289-4053-8f4c-f1bf2ec4e77a_1456x728.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></blockquote><div><hr></div><h2><strong>Containers vs Virtual Machines</strong></h2><p><strong>Textbook definition:<br>Containerization</strong> packages applications and dependencies while sharing the host OS kernel, making it lighter than full VMs.</p><p><strong>Simple definition:<br></strong>VMs are <strong>houses</strong>. Containers are <strong>apartments</strong>.</p><p>CompTIA includes a visual showing VMs each have a Guest OS, while containers share the host OS through a container engine (like Docker). (See the &#8220;Containers vs. Virtual Machines&#8221; graphic on page 12.)</p><p><strong>What to remember for the test:</strong></p><ul><li><p>VMs = heavier, separate guest OS</p></li><li><p>Containers = lighter, share kernel, faster deployment<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FT7K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FT7K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 424w, https://substackcdn.com/image/fetch/$s_!FT7K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 848w, https://substackcdn.com/image/fetch/$s_!FT7K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 1272w, https://substackcdn.com/image/fetch/$s_!FT7K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FT7K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp" width="1456" height="856" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:856,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:48092,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185441269?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FT7K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 424w, https://substackcdn.com/image/fetch/$s_!FT7K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 848w, https://substackcdn.com/image/fetch/$s_!FT7K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 1272w, https://substackcdn.com/image/fetch/$s_!FT7K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0888e811-7545-4a8d-ac7e-9a501cec4cdc_1456x856.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br></p></li></ul><div><hr></div><h1><strong>3) Cloud Deployment Models (Know the 3)</strong></h1><p><strong>Textbook definition:<br></strong>A <strong>cloud deployment model</strong> defines where cloud resources run and who controls them.</p><p><strong>Simple definition:<br></strong>Cloud models explain <strong>where your stuff lives</strong> and <strong>who manages it</strong>.</p><p>CompTIA&#8217;s three models:</p><h2><strong>Public cloud</strong></h2><p><strong>Technical definition:<br></strong>A <strong>public cloud</strong> is a cloud deployment model where computing resources (servers, storage, databases, networking, apps) are owned and operated by a third-party provider and delivered over the internet to multiple customers (multi-tenant).</p><p><strong>Simple definition:<br></strong>Public cloud = <strong>renting IT from a provider online</strong>.</p><p><strong>Examples (providers + services):</strong></p><ul><li><p><strong>AWS</strong>: EC2 (VMs), S3 (storage), RDS (databases), Lambda (serverless)</p></li><li><p><strong>Microsoft Azure</strong>: Virtual Machines, Blob Storage, Azure SQL, Azure Functions</p></li><li><p><strong>Google Cloud</strong>: Compute Engine, Cloud Storage, Cloud SQL, Cloud Functions</p></li></ul><p><strong>When organizations choose it:</strong></p><ul><li><p>fast deployment, easy scaling, lower upfront cost</p></li><li><p>good for web apps, dev/test, burst workloads, startups</p></li></ul><div><hr></div><h2><strong>Private cloud</strong></h2><p><strong>Technical definition:<br></strong>A <strong>private cloud</strong> is a cloud deployment model where cloud infrastructure is dedicated to a single organization, providing greater control over security, compliance, and configuration. It can be hosted on-premises or hosted by a provider but remains single-tenant.</p><p><strong>Simple definition:<br></strong>Private cloud = <strong>your own cloud&#8212;only your organization uses it</strong>.</p><p><strong>Examples (what it looks like in real life):</strong></p><ul><li><p>An enterprise data center running <strong>VMware vSphere/NSX</strong> as an internal cloud</p></li><li><p><strong>OpenStack</strong> used to deliver self-service VMs/storage internally</p></li><li><p>Government/DoD environment where systems run in a <strong>dedicated</strong> cloud environment for compliance</p></li></ul><p><strong>When organizations choose it:</strong></p><ul><li><p>strict compliance needs (regulated industries, government)</p></li><li><p>high control requirements</p></li><li><p>predictable workloads + strong internal IT capability</p></li></ul><div><hr></div><h2><strong>Hybrid cloud</strong></h2><p><strong>Technical definition:<br></strong>A <strong>hybrid cloud</strong> combines private cloud (or on-prem/on-premises infrastructure) with public cloud services, allowing data and workloads to move between them as needed.</p><p><strong>Simple definition:<br></strong>Hybrid cloud = <strong>some systems stay &#8220;in-house,&#8221; some run in the public cloud&#8212;connected together</strong>.</p><p><strong>Examples (common patterns):</strong></p><ul><li><p><strong>Sensitive data</strong> (PII/PHI) stays on a private cloud, while the public website runs on <strong>AWS/Azure</strong></p></li><li><p>On-prem Active Directory + cloud apps in <strong>Microsoft 365/Azure</strong>, using federation/SSO</p></li><li><p>Disaster recovery: on-prem primary systems + backups/replicas in the public cloud</p></li><li><p>&#8220;Cloud burst&#8221;: normal traffic handled on-prem, spikes handled in public cloud</p></li></ul><p><strong>When organizations choose it:</strong></p><ul><li><p>want cloud scalability but must keep certain data/systems private</p></li><li><p>gradual cloud migration (most common real-world approach)</p></li></ul><div><hr></div><h3><strong>Quick memory trick for the exam</strong></h3><ul><li><p><strong>Public</strong> = shared provider infrastructure</p></li><li><p><strong>Private</strong> = dedicated to one org</p></li><li><p><strong>Hybrid</strong> = mix of private + public working together</p></li></ul><p><strong>Exam tip:<br></strong>If asked &#8220;which is most common?&#8221;&#8212;CompTIA frequently pushes <strong>public cloud adoption</strong> as the norm. (Also appears in their review questions.)</p><div><hr></div><h2><strong>Serverless Computing (why it&#8217;s a big deal)</strong></h2><p><strong>Textbook definition:<br>Serverless</strong> is a cloud model where the provider manages the infrastructure and applications run as functions&#8212;removing the need to manage server operating systems.</p><p><strong>Simple definition:<br></strong>Serverless = <strong>you deploy code, not servers.</strong></p><p><strong>Security reality check (what students forget):</strong></p><ul><li><p>Less patching of servers by you&#8230;</p></li><li><p>But <strong>identity, permissions, and code security become even more critical</strong>.</p></li></ul><div><hr></div><h1><strong>4) SDN, Deperimeterization, and Zero Trust (Why &#8220;Inside/Outside&#8221; Is Dead)</strong></h1><h2><strong>Software-Defined Networking (SDN)</strong></h2><p><strong>Textbook definition:<br>SDN</strong> abstracts physical network devices and uses a centralized control plane to manage traffic policies dynamically.</p><p><strong>Simple definition:<br></strong>SDN = <strong>software controls the network instead of manually configuring every box.</strong></p><p><strong>Exam memory hook:</strong></p><blockquote><p>SDN is automation for networking.</p></blockquote><div><hr></div><h2><strong>Deperimeterization</strong></h2><p><strong>Textbook definition:<br>Deperimeterization</strong> describes the shift away from a clearly defined internal (&#8220;trusted&#8221;) network perimeter.</p><p><strong>Simple definition:<br></strong>The perimeter is gone because <strong>work happens everywhere</strong>.</p><p>CompTIA lists trends driving it: cloud, remote work, mobile, outsourcing, Wi-Fi.</p><div><hr></div><h2><strong>Zero Trust (ZT)</strong></h2><p><strong>Textbook definition:<br>Zero Trust</strong> is an architecture that assumes no implicit trust and requires continuous verification of users, devices, and access requests.</p><p><strong>Simple definition:<br></strong>Zero Trust = <strong>trust nothing, verify everything.</strong></p><p>CompTIA highlights key components like IAM, policy enforcement, segmentation, visibility, data protection, and threat detection.</p><p><strong>Exam tip:<br></strong>If asked what Zero Trust focuses on, CompTIA points to users/assets/resources&#8212;not static perimeters.</p><div><hr></div><h1><strong>5) IAM (Identity &amp; Access Management)</strong></h1><p>IAM is where &#8220;security policy&#8221; turns into &#8220;who can do what.&#8221;</p><h2><strong>Authentication Factors (high exam value)</strong></h2><p><strong>Textbook definition:<br></strong>Authentication factors are categories of evidence used to verify identity.</p><p><strong>Simple definition:<br></strong>Factors are <strong>proof you&#8217;re you</strong>.</p><p>CompTIA&#8217;s three factors:</p><ul><li><p><strong>Something you know</strong> (password/PIN)</p></li><li><p><strong>Something you have</strong> (token/smart card)</p></li><li><p><strong>Something you are</strong> (biometrics)</p></li></ul><h3><strong>MFA vs 2FA vs 2-Step Verification</strong></h3><p>CompTIA lists these terms explicitly: MFA, 2FA, 2-step verification, passwordless, SSO.</p><p><strong>Simple definitions:</strong></p><ul><li><p><strong>2FA</strong>: exactly two factors</p></li><li><p><strong>MFA</strong>: two or more factors</p></li><li><p><strong>2-step verification</strong>: often &#8220;out-of-band&#8221; codes (like SMS) &#8212; sometimes called 2FA but not always equally strong<br> cysa lesson 03</p></li></ul><p><strong>Exam memory hook:</strong></p><blockquote><p>MFA makes stolen passwords <em>incomplete</em>.</p></blockquote><div><hr></div><h2><strong>Single Sign-On (SSO)</strong></h2><p><strong>Textbook definition:<br>SSO</strong> allows a user to authenticate once and access multiple systems without re-entering credentials.</p><p><strong>Simple definition:<br></strong>SSO = <strong>one login opens many doors.</strong></p><p><strong>Test-worthy tradeoff:</strong></p><ul><li><p>Great usability</p></li><li><p>Higher impact if credentials are compromised &#8594; pair with MFA</p></li></ul><div><hr></div><h2><strong>Privileged Access Management (PAM)</strong></h2><p><strong>Textbook definition:<br>PAM</strong> controls, secures, monitors, and audits privileged identities and credentials.</p><p><strong>Simple definition:<br></strong>PAM = <strong>extra locks and cameras for admin accounts.</strong></p><p>CompTIA points out PAM often stores privileged creds securely and logs who used them.</p><p><strong>Memory hook:</strong></p><blockquote><p>&#8220;Admin accounts are the boss keys&#8212;PAM tracks the boss keys.&#8221;</p></blockquote><div><hr></div><h2><strong>Federated Trust (Federation, SAML, OpenID, Transitive Trust)</strong></h2><p><strong>Textbook definition:<br>Federation</strong> allows one organization/system to trust another for identity assertions (logins and permissions).</p><p><strong>Simple definition:<br></strong>Federation = <strong>&#8220;I trust your login system, so I&#8217;ll accept your users.&#8221;</strong></p><p>Key exam terms CompTIA lists:</p><ul><li><p><strong>OpenID</strong></p></li><li><p><strong>SAML</strong></p></li><li><p><strong>Transitive Trust</strong> (If A trusts B and B trusts C, then A trusts C)</p></li></ul><p><strong>Memory hook:</strong></p><blockquote><p>Transitive trust is &#8220;friend-of-my-friend&#8221; trust.</p></blockquote><div><hr></div><h1><strong>6) Cloud Security &amp; Data Protection (Visibility and Control)</strong></h1><h2><strong>CASB (Cloud Access Security Broker)</strong></h2><p><strong>Textbook definition:<br></strong>A <strong>CASB</strong> is enterprise software that mediates and enforces security policy for user access to cloud services.</p><p><strong>Simple definition:<br></strong>CASB = <strong>the security bouncer between your users and the cloud.</strong></p><p>CompTIA lists what CASBs do: enforce SSO/access controls, scan for malware/rogue devices, audit activity, and prevent unauthorized cloud use.</p><p><strong>Exam tip:<br></strong>If you see &#8220;mediate cloud access,&#8221; think <strong>CASB</strong>.</p><div><hr></div><h2><strong>DLP (Data Loss Prevention)</strong></h2><p><strong>Textbook definition:<br>DLP</strong> solutions detect, classify, and prevent unauthorized movement or exposure of sensitive data.</p><p><strong>Simple definition:<br></strong>DLP = <strong>stop sensitive data from walking out the door.</strong></p><p>CompTIA calls out core components: Policy server, endpoint agents, network agents.</p><p>Examples CompTIA lists: blocking USB media, print blocking, RDP copy/paste, clipboard controls, classification blocking.</p><div><hr></div><h2><strong>Data Types You Must Know (high exam value)</strong></h2><p>CompTIA names these directly:</p><ul><li><p><strong>PII</strong> &#8212; Personally Identifiable Information</p></li><li><p><strong>PHI</strong> &#8212; Protected Health Information</p></li><li><p><strong>PIFI</strong> &#8212; Personally Identifiable Financial Information</p></li><li><p><strong>CHD</strong> &#8212; Cardholder Data</p></li><li><p><strong>IP</strong> &#8212; Intellectual Property</p></li></ul><p><strong>Simple memory hook:</strong></p><blockquote><p>PII = &#8220;who you are&#8221;<br>PHI = &#8220;your health&#8221;<br>PIFI = &#8220;your money identity&#8221;<br>CHD = &#8220;your card details&#8221;<br>IP = &#8220;your ideas and inventions&#8221;</p></blockquote><div><hr></div><h2><strong>PKI and SSL Inspection</strong></h2><p><strong>Textbook definition:<br>PKI</strong> is a framework for managing public/private keys and digital certificates to support encryption, authentication, integrity, and non-repudiation.</p><p><strong>Simple definition:<br></strong>PKI = <strong>the trust system behind HTTPS.</strong></p><h3><strong>SSL Inspection (super testable concept)</strong></h3><p>CompTIA explains the problem: encrypted traffic can hide threats, so organizations may use SSL inspection to decrypt, inspect, and re-encrypt traffic for security enforcement.</p><p><strong>Simple definition:<br></strong>SSL inspection = <strong>opening the sealed envelope to scan it, then resealing it.</strong></p><div><hr></div><h1><strong>7)Logging: Your Security &#8220;Time Machine&#8221;</strong></h1><h2><strong>Log Ingestion</strong></h2><blockquote><p><strong>Textbook definition:<br>Log ingestion</strong> is collecting logs from multiple sources and centralizing them for analysis.</p><p><strong>Simple definition:<br></strong>Log ingestion = <strong>pulling all evidence into one place.</strong></p><p>CompTIA examples: auth servers, app servers, web servers, databases.</p></blockquote><div><hr></div><h2><strong>Time Synchronization (don&#8217;t skip this)</strong></h2><blockquote><p><strong>Textbook definition:<br>Time synchronization</strong> ensures systems share accurate time so analysts can establish correct event order.</p><p><strong>Simple definition:<br></strong>Time sync = <strong>making sure everyone agrees what time it is.</strong></p><p><strong>Exam/real-world point:<br></strong>If clocks are off, your timeline is wrong&#8212;and investigations fall apart.</p></blockquote><div><hr></div><h2><strong>Logging Levels (know these for tests)</strong></h2><blockquote><p>CompTIA lists common levels: DEBUG, INFO, WARNING, ERROR, CRITICAL.</p><p>And Syslog 0&#8211;7 severity levels (0 = emergency, 7 = debug).</p><p><strong>Simple definition:<br></strong>Logging levels = <strong>how serious the message is</strong>.</p><h1><strong>Logging Levels (Complete List for Tests)</strong></h1><h2><strong>Common Application Logging Levels</strong></h2><blockquote><p>These are the <strong>standard levels</strong> you&#8217;ll see in applications, APIs, and security tools:</p></blockquote><ul><li><p><strong>DEBUG</strong> &#8211; Detailed diagnostic information (used for troubleshooting)</p></li><li><p><strong>INFO</strong> &#8211; Normal operations and routine events</p></li><li><p><strong>WARNING (WARN)</strong> &#8211; Something unexpected, but not yet an error</p></li><li><p><strong>ERROR</strong> &#8211; An operation failed; system still running</p></li><li><p><strong>CRITICAL</strong> &#8211; Severe failure; system may be unusable</p></li></ul><div><hr></div><h2><strong>Syslog Severity Levels (0&#8211;7)</strong></h2><blockquote><p>Syslog uses <strong>numeric severity levels</strong>, where <strong>0 is the most severe</strong> and <strong>7 is the least</strong>:</p></blockquote><blockquote><p>LevelNameMeaning</p></blockquote><blockquote><p><strong>0-</strong>Emergency (emerg)System is unusable</p></blockquote><blockquote><p><strong>1-</strong>Alert (alert)Immediate action required</p></blockquote><blockquote><p><strong>2-</strong>Critical (crit)Critical conditions</p></blockquote><blockquote><p><strong>3-</strong>Error (error)Error conditions</p></blockquote><blockquote><p><strong>4-</strong>Warning (warn)Warning conditions</p></blockquote><blockquote><p><strong>5-</strong>Notice (notice)Normal but significant</p></blockquote><blockquote><p><strong>6-</strong>Informational (info)Informational messages</p></blockquote><blockquote><p><strong>7-</strong>Debug (debug)Debug-level messages</p></blockquote><div><hr></div><h2><strong>Simple Definition (One Line)</strong></h2><blockquote><p><strong>Logging levels = how serious the message is.</strong></p></blockquote><div><hr></div><h2><strong>Memory Hooks (High-Value for Exams)</strong></h2><ul><li><p><strong>0</strong> = &#8220;Everything is on fire &#128293;&#8221;</p></li><li><p><strong>1&#8211;2</strong> = &#8220;Fix this NOW&#8221;</p></li><li><p><strong>3&#8211;4</strong> = &#8220;Something is wrong&#8221;</p></li><li><p><strong>5&#8211;6</strong> = &#8220;FYI&#8221;</p></li><li><p><strong>7</strong> = &#8220;Developer chatter&#8221;</p></li></ul></blockquote><div><hr></div><h1><strong>What You Really Need to Remember for Exams</strong></h1><p>If you&#8217;re cramming, prioritize these:</p><h3><strong>Must-memorize list</strong></h3><ul><li><p><strong>CIS Benchmarks vs DoD STIGs</strong> (hardening baselines)</p></li><li><p><strong>Linux configs live in /etc</strong></p></li><li><p><strong>Type I vs Type II hypervisors</strong></p></li><li><p><strong>VMs vs Containers</strong> (guest OS vs shared kernel)</p></li><li><p><strong>Public/Private/Hybrid cloud models</strong></p></li><li><p><strong>Deperimeterization</strong> + <strong>Zero Trust = trust nothing, verify everything</strong></p></li><li><p><strong>Auth factors</strong> (know/have/are), <strong>MFA</strong>, <strong>SSO</strong>, <strong>PAM</strong></p></li><li><p><strong>SAML/OpenID/Federation</strong>, <strong>Transitive trust</strong></p></li><li><p><strong>CASB vs DLP</strong> (cloud access control vs data movement control)</p></li><li><p><strong>PII/PHI/PIFI/CHD/IP</strong></p></li><li><p><strong>Log ingestion</strong>, <strong>time sync</strong>, <strong>logging levels<br><br></strong></p></li></ul><div><hr></div><h1><strong>Closing: Why This Lesson Matters in the Series</strong></h1><p>Lesson 1 taught you how organizations decide what &#8220;secure&#8221; means through governance, policy, and risk. Lesson 3 shows you the environment those decisions apply to&#8212;operating systems, cloud infrastructure, identity, data protection, and logging.</p><p>This foundation is essential because everything later in the series&#8212;threat hunting, SIEM analysis, incident response, and vulnerability management&#8212;depends on understanding <strong>how systems are built and how defenders maintain visibility</strong>.</p><p>In the next post, we will build on this architecture foundation and start connecting it directly to how attackers operate and how defenders detect them in practice.</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Foundations Series- A Practical Guide for Security+ and CySA+ Students]]></title><description><![CDATA[If you are new to cybersecurity&#8212;or preparing for certifications such as CompTIA Security+ or CompTIA CySA+ &#8212; this series is designed for you.]]></description><link>https://blog.netizen.watch/p/cybersecurity-foundations-series</link><guid isPermaLink="false">https://blog.netizen.watch/p/cybersecurity-foundations-series</guid><dc:creator><![CDATA[Anthony Velazquez]]></dc:creator><pubDate>Tue, 20 Jan 2026 17:43:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qADI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you are new to cybersecurity&#8212;or preparing for certifications such as <strong>CompTIA Security+</strong> or <strong>CompTIA CySA+ </strong>&#8212; this series is designed for you.</p><p>Many people enter cybersecurity expecting to start with tools: firewalls, SIEM dashboards, malware analysis, or threat hunting. While those skills are important, they are not where security actually begins. Real-world cybersecurity starts <strong>long before alerts, incidents, or attacks</strong>, with leadership decisions, policies, and risk management.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This series breaks down cybersecurity <strong>the way it works in practice</strong>, not just how it appears on an exam.</p><div><hr></div><h2><strong>Why This Series Starts with Governance and Risk</strong></h2><p>A common mistake among beginners is assuming that more technology automatically means better security. In reality, organizations frequently experience major breaches despite heavy investment in security tools.</p><p>The reason is simple:</p><blockquote><p><strong>Technology alone does not create security.<br> Management, policy, and risk decisions do.</strong></p></blockquote><p>Security tools only become effective when they are:</p><ul><li><p>selected based on real risks,<br><br></p></li><li><p>deployed intentionally,<br><br></p></li><li><p>governed by policy,<br><br></p></li><li><p>and measured through clear objectives.<br><br></p></li></ul><p>This series begins by establishing that foundation so everything that follows&#8212;vulnerability scanning, incident response, threat detection, and automation&#8212;has real context.</p><div><hr></div><h2><strong>Governance: How Security Decisions Are Made</strong></h2><p><strong>Technical definition:<br></strong> Governance is the structure by which leadership directs and oversees cybersecurity strategy through policies, processes, and accountability.</p><p><strong>Simple definition:<br></strong> Governance is <em>who decides what security looks like</em> and <em>how those decisions are enforced</em>.</p><p>Governance teams translate risk information into direction. They define priorities, approve policies, and determine acceptable levels of risk. Without governance, security becomes reactive, inconsistent, and ineffective&#8212;regardless of how advanced the technology may be.</p><div><hr></div><h2><strong>Policy: The Blueprint for Consistent Security</strong></h2><p><strong>Technical definition:<br></strong> A security policy is a formal document that defines rules, expectations, and required behaviors for protecting systems, users, and data.</p><p><strong>Simple definition:<br></strong> Policy is the rulebook that keeps security consistent&#8212;especially under pressure.</p><p>Well-defined policies:</p><ul><li><p>remove guesswork during incidents,<br><br></p></li><li><p>guide SOC analysts during high-stress situations,<br><br></p></li><li><p>ensure work is repeatable and auditable,<br><br></p></li><li><p>and form the foundation for compliance and accountability.<br><br></p></li></ul><p>In practice, strong policies allow security teams to act decisively instead of improvising during critical moments.</p><div><hr></div><h2><strong>Measuring Security: Service-Level Objectives (SLOs)</strong></h2><p>Security cannot improve if it is not measured.</p><p><strong>Technical definition:<br></strong> Security Service-Level Objectives (SLOs) are measurable performance targets used to assess the effectiveness of security operations.</p><p><strong>Simple definition:<br></strong> SLOs are how organizations know whether security is actually working.</p><p>Common examples include:</p><ul><li><p><strong>Mean Time to Detect (MTTD)<br><br></strong></p></li><li><p><strong>Mean Time to Respond or Recover (MTTR)<br><br></strong></p></li><li><p><strong>Time to Patch vulnerabilities<br><br></strong></p></li></ul><p>These metrics connect day-to-day security operations with leadership oversight and business expectations.</p><div><hr></div><h2><strong>Risk Management: The Core of Cybersecurity</strong></h2><h2><strong> You Can&#8217;t Eliminate Risk &#8212; Only Manage It</strong></h2><h3><strong>Technical definition</strong></h3><p><strong>Risk management</strong> is the process of identifying, assessing, prioritizing, and responding to risks to reduce their likelihood or impact to acceptable levels.</p><h3><strong>Simple definition</strong></h3><p><strong>Risk management is choosing which problems to fix now, later, or not at all.</strong></p><p>Every organization has risk. The goal is not perfection &#8212; it&#8217;s <strong>control</strong>.</p><div><hr></div><h2><strong>The Four Risk Responses (Memorize These)</strong></h2><h3><strong>1. Avoid</strong></h3><p><strong>Technical:</strong> Eliminate the activity causing the risk.<br> <strong>Simple:</strong> <em>&#8220;This isn&#8217;t worth it &#8212; shut it down.&#8221;</em></p><p>Example: Decommissioning a vulnerable legacy system.</p><div><hr></div><h3><strong>2. Accept</strong></h3><p><strong>Technical:</strong> Acknowledge the risk and continue operating.<br> <strong>Simple:</strong> <em>&#8220;We know the risk and we&#8217;re okay with it.&#8221;</em></p><p>Example: Low-impact vulnerabilities with no feasible fix.</p><div><hr></div><h3><strong>3. Mitigate</strong></h3><p><strong>Technical:</strong> Reduce risk using controls.<br> <strong>Simple:</strong> <em>&#8220;Make it safer.&#8221;</em></p><p>Example: Adding WAFs, MFA, patching, monitoring.</p><div><hr></div><h3><strong>4. Transfer</strong></h3><p><strong>Technical:</strong> Shift financial risk to a third party.<br> <strong>Simple:</strong> <em>&#8220;Someone else pays if this goes wrong.&#8221;</em></p><p>Example: Cyber insurance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qADI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qADI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 424w, https://substackcdn.com/image/fetch/$s_!qADI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 848w, https://substackcdn.com/image/fetch/$s_!qADI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 1272w, https://substackcdn.com/image/fetch/$s_!qADI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qADI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png" width="768" height="551" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:551,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.netizen.watch/i/185204861?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qADI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 424w, https://substackcdn.com/image/fetch/$s_!qADI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 848w, https://substackcdn.com/image/fetch/$s_!qADI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 1272w, https://substackcdn.com/image/fetch/$s_!qADI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b65566-d352-485b-85ee-0f3402bdaa42_768x551.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Security Controls: Not Just Firewalls</strong></h2><h3><strong>Control Categories (the </strong><em><strong>who</strong></em><strong>)</strong></h3><ul><li><p><strong>Technical</strong> &#8211; systems and software<br><br></p></li><li><p><strong>Operational</strong> &#8211; people and processes<br><br></p></li><li><p><strong>Managerial</strong> &#8211; oversight and governance<br><br></p></li></ul><h3><strong>Control Functional Types (the </strong><em><strong>when</strong></em><strong>)</strong></h3><ul><li><p><strong>Preventive</strong> &#8211; stop attacks<br><br></p></li><li><p><strong>Detective</strong> &#8211; notice attacks<br><br></p></li><li><p><strong>Corrective</strong> &#8211; fix damage<br><br></p></li><li><p><strong>Compensating</strong> &#8211; substitute controls<br><br></p></li><li><p><strong>Responsive</strong> &#8211; guide incident actions<br><br></p></li></ul><h3><strong>Simple takeaway</strong></h3><p><strong>Real security uses multiple controls, at multiple layers, for multiple purposes.</strong></p><p>One firewall is not a strategy.</p><p>These responses appear repeatedly in both <strong>Security+</strong> and <strong>CySA+</strong>, and understanding them early is critical.</p><div><hr></div><h2><strong>Threat Modeling: Thinking Before the Attack</strong></h2><p>Threat modeling identifies:</p><ul><li><p>who might attack an organization,<br><br></p></li><li><p>how those attacks are likely to occur,<br><br></p></li><li><p>and where defenses are most needed.<br><br></p></li></ul><p>By analyzing systems from both attacker and defender perspectives, threat modeling helps security teams build realistic monitoring, detection, and response strategies. This ensures defenses are aligned with <strong>actual threats</strong>, not theoretical ones.</p><p></p><h2><strong>Attack Surface Management: Reducing What Can Be Attacked</strong></h2><h3><strong>Technical definition</strong></h3><p>An <strong>attack surface</strong> is the total set of exposed systems, services, protocols, users, and configurations that could be exploited.</p><h3><strong>Simple definition</strong></h3><p><strong>The attack surface is everything an attacker can touch.</strong></p><p>This includes:</p><ul><li><p>Internet-facing systems<br><br></p></li><li><p>cloud resources<br><br></p></li><li><p>remote users<br><br></p></li><li><p>shadow IT<br><br></p></li><li><p>misconfigurations<br><br></p></li><li><p>weak passwords<br><br></p></li></ul><p>Reducing the attack surface means:</p><ul><li><p><strong>Asset inventory</strong>&#8212;Conducting an inventory of all hardware and software assets and user accounts in the environment. Once identified, the team must determine which assets are essential for business operations and which can be removed.</p></li><li><p><strong>Access control</strong>&#8212;Implementing strict access control measures, such as multifactor authentication, can reduce the attack surface significantly. Limiting access to sensitive data and systems reduces the risk of unauthorized access.</p></li></ul><ul><li><p><strong>Removing Unnecessary Systems</strong>-Removing hardware or software components reduces the attack surface. By removing software, the organization eliminates a pathway that attackers can exploit.<br></p></li><li><p><strong>Patching Aggressively</strong>-Regularly patching and updating software and firmware can prevent attackers from exploiting known vulnerabilities.<br><br></p></li><li><p><strong>Segmenting Networks</strong>-Segmenting a large network into smaller subnets can limit the damage an attacker can cause. Thereby reducing the attack surface.<br><br></p></li><li><p><strong>Training Users/Employees</strong>- Employee training can help reduce the attack surface by raising awareness of the potential risks and the importance of security measures. Regular training can help employees recognize and report potential security threats, reducing the likelihood of successful attacks.<br><br></p></li></ul><p><strong>Less exposure = fewer successful attacks.</strong></p><p>An organization&#8217;s attack surface includes every system, service, user, and configuration that could be exploited.</p><div><hr></div><p><strong>Patch &amp; Configuration Management: Boring but Critical</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.netizen.watch/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Technical definition</strong></h3><p><strong>Patch management</strong> ensures vulnerabilities are fixed consistently and safely.<br> <strong>Configuration management</strong> enforces secure system settings at scale.</p><h3><strong>Simple definition</strong></h3><p><strong>Patching fixes holes. Configuration keeps them from reopening.</strong></p><p>Key ideas:</p><ul><li><p>centralized management<br><br></p></li><li><p>testing before deployment<br><br></p></li><li><p>different priorities for critical systems<br><br></p></li><li><p>logging and verification<br><br></p></li></ul><p>Tools like Ansible, Chef, Puppet, and Terraform make security <strong>repeatable</strong>, not manual.</p><div><hr></div><h2><strong>Maintenance Windows: When Security Gets Tricky</strong></h2><h3><strong>Technical definition</strong></h3><p>A <strong>maintenance window</strong> is a scheduled period for system changes that comply with change management policies.</p><h3><strong>Simple definition</strong></h3><p><strong>Maintenance windows are planned chaos.</strong></p><p>Why they matter:</p><ul><li><p>alerts spike<br><br></p></li><li><p>systems restart<br><br></p></li><li><p>attackers may hide activity<br><br></p></li><li><p>SOC must know what&#8217;s expected vs suspicious<br><br></p></li></ul><p>Security doesn&#8217;t pause during maintenance &#8212; it must adapt.</p><p>Patch management and configuration management are foundational security practices. While often viewed as routine or unglamorous, they directly prevent many of the most common attacks.</p><p>Security does not pause during maintenance&#8212;it must adapt.</p><div><hr></div><h2><strong>Who This Series Is For</strong></h2><p>This series is intended for:</p><ul><li><p>individuals new to cybersecurity,<br><br></p></li><li><p>students preparing for <strong>CompTIA Security+</strong>,<br><br></p></li><li><p>professionals advancing toward <strong>CompTIA CySA+</strong>,<br><br></p></li><li><p>and anyone seeking a structured, real-world understanding of cybersecurity operations.<br><br></p></li></ul><p>The goal is not memorization, but <strong>comprehension</strong>&#8212;understanding how governance, risk, and technical controls work together to form an effective security program.</p><div><hr></div><h2><strong>Moving Forward</strong></h2><p>This introduction establishes the foundation for the rest of the series. Future entries will build on these concepts and explore vulnerability analysis, incident response, threat detection, automation, and secure development practices.</p><p>By the end of this series, readers should not only be prepared for certification exams, but also equipped with a practical understanding of how cybersecurity functions in modern organizations.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.netizen.watch/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Netizen Watch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>