The Security Cafe

The Security Cafe

Home
Notes
Chat
Getting Into Infosec
Breaking IN
Work With Ayman
Archive
About

Sitemap - 2022 - The Security Cafe

Explaining Risk To A 5 Yro (ELI5) by ChatGPT

Top 10 Curated Security Takeaways From AWS re:Invent 2022

5 Reasons NOT To Give All Your Users Admin Privileges

Symptoms of Broken Authentication & How to Prevent it?

Shifting Left Your Appsec Program

Step 0: Create A Risk Register

5 Places To Find Cybersecurity Talent 🕵🏽‍♂️

Enterprise Logging Guide

Uber Hack: Get RID Of ALL Your Admin Static Creds

The Role Of The CISO🔥👉🏼👈🏼

I Read So Many IR Posts This Week, Here Are My Thoughts

Cybersecurity and Polyvagal Theory

DEFCON: A Beginner's Guide

Is Your Security Glamping, Car Camping, or Backpacking?

Complete Guide To Securing Internal SaaS Admin Tools

A Quick And Dirty Guide To Starting SOC2

Ancient Authentication and Integrity Checking

Five Common Smart Contract Bugs

What IS A vCISO???

Early Warning System In Security

The IT Shuffle

What A Week In Cybersecurity!

Do You Really Need A Ciso?

3 CISO's Walk Into A Startup...

Cybersecurity Is Easy.

Is Compliance.... Security?

To Pentest or Not To Pentest…

Data Classification 101

10 Information Security Reflections From 2021

© 2026 Ayman Elsawah · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture