PID Perspectives

Stay in the Know with Our Blog

START READING

Latest Articles

Cybercrime

Cyberwarfare: the invisible war

Traditional wars still destroy the Earth and too many lives. However, the most strategic battles are carried out behind a keyboard. Welcome to the world of governmental espionage and disruption…

Read More »
Computer Forensics

OSs for cybersecurity professionals

If you work in cybersecurity in a technical capacity, you probably operate with a few different operating systems. And while you might immediately think of Kali Linux, there’s much more…

Read More »
Cybersecurity

An Introduction to CMMC

If you work as a contractor for the United States Government, you must comply with stricter security rules than standard companies. One of these frameworks is CMMC (Cybersecurity Maturity Model…

Read More »
Cybersecurity

A beginner’s guide to Blockchain

Everybody talks about Bitcoin and Blockchain. In recent years, they have become a common topic in tech, finance, cybersecurity, and even politics. But what do they really mean? If you…

Read More »
Compliance and Regulations

What is GDPR?

If you’ve ever browsed a website from a European country, you have probably noticed the “cookie banner.” That’s one of the requirements for compliance with GDPR, the General Data Protection…

Read More »
Compliance and Regulations

An Introduction to ZTA

Once upon a time, the network perimeter was considered a solid defence against external threats. However, the evolution of attack vectors over the last twenty years has led to a…

Read More »
Register to access our content

Create Your Account

Focus Topics

Featured Articles

For beginners and non-technical audience
Geek Zone
Life at Negative PID
All topics
Click to access the login or register cheese
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO