PID Perspectives

Stay in the Know with Our Blog

START READING

Latest Articles

Compliance and Regulations

The Edward Snowden Leaks

In May 2013, a group of journalists at The Guardian started receiving classified information through encrypted channels from an anonymous source. On June 5, after verifying its validity, the newspaper…

Read More »
Cybersecurity

An introduction to SSH

How do you access a computer without physically having access to it? How can you execute commands from another computer? Secure Shell (SSH) is one of the first tools you…

Read More »
Cybersecurity

A quick-start guide to Unix commands

Unix is a powerful, multiuser operating system that serves as the foundation for Linux and MacOS. The Unix command-line interface (CLI) allows you to control your system efficiently by typing…

Read More »
Cybersecurity

An Introduction to CMMC

If you work as a contractor for the United States Government, you must comply with stricter security rules than standard companies. One of these frameworks is CMMC (Cybersecurity Maturity Model…

Read More »
Cybersecurity

How to become a bug bounty hunter

Many people entering the cybersecurity field believe that the only way to demonstrate their skills to a prospective employer is to hack into their systems. Unless unsolicited, that’s a bad…

Read More »
Cybersecurity

A beginner’s guide to Blockchain

Everybody talks about Bitcoin and Blockchain. In recent years, they have become a common topic in tech, finance, cybersecurity, and even politics. But what do they really mean? If you…

Read More »
Cybersecurity

An introduction to Windows CMD

When you enter Windows security and administration, you will eventually have to learn how to use the command line. While a lot can be done through a graphical interface, the…

Read More »
Compliance and Regulations

What is GDPR?

If you’ve ever browsed a website from a European country, you have probably noticed the “cookie banner.” That’s one of the requirements for compliance with GDPR, the General Data Protection…

Read More »
Compliance and Regulations

An Introduction to ZTA

Once upon a time, the network perimeter was considered a solid defence against external threats. However, the evolution of attack vectors over the last twenty years has led to a…

Read More »
Register to access our content

Create Your Account

Focus Topics

Featured Articles

For beginners and non-technical audience
Geek Zone
Life at Negative PID
All topics
Click to access the login or register cheese
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO