Malik Girondin

Cybersecurity Professional

My Blogs

Browser Breadcrumbs: Private Browsing Footprints Tell Their Tales

Browser Forensics is a niche field. Learn how to spot and analyze 'private browsing' sessions with ease.

Read Full Article

Investigating Insider Threats: RDP Activity with Magnet Forensics

We decided to experiment: How effective is data exfiltration via RDP? What can be tracked on the victim's system?

Read Full Article

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

This blog covers best practice for live acquisition of digital artifacts with bonus lab included.

Read Full Article

A Conversation with Content Engineer Malik Girondin

I did a collaborative interview with HackerAsk.com about my journey into cybersecurity and my role as a content engineer.

Read Full Article

Mental RAM: Optimizing Cognitive Load for Learning and Productivity in Cybersecurity

Cybersecurity professionals should strive to manage their Mental RAM wisely, avoiding the pitfalls of cognitive overload and multitasking.

Read Full Article

Specialist or Generalist? Navigating Cybersecurity Careers with the T-Concept

The T-shaped analyst: This model blends generalist breadth with specialist depth, and in this post, we’ll explore why it’s especially suited to cybersecurity careers.

Read Full Article

Ebb and Flow: Navigating the Ups and Downs of the IT/Cybersecurity Job Market

Much like the tech downturns of 2000 and 2008, today’s job market is marked by uncertainty and mixed signals. Learn why this is happening and what it means for your career.

Read Full Article

Slicing Your Way to Cybersecurity Success: The P.I.E. Theory

Learn how to advance your cybersecurity career using the P.I.E. Theory. The three tenets are: Performance, Image, and Exposure.

Read Full Article

Time Travel with Timeline Explorer: Exposing Insider Threats

Insider threats can lead to significant financial and reputational damage for any organization. Learn how to detect them using Timeline Explorer.

Read Full Article

Cybersecurity Careers & The Importance of Mentorship

Learn about the importance of mentorship in cybersecurity careers and how it can impact your professional growth.

Read Full Article

Understanding SMTP Traffic in Plaintext Using Wireshark

Dive into the world of network analysis as we explore how to use Wireshark to understand SMTP traffic in plaintext.

Read Full Article

Day in the Life of a Content Engineer

Ever wondered what it's like to be a cybersecurity content engineer? This article gives you a glimpse into the daily life, challenges, and rewards of this exciting role.

Read Full Article

Phishers Feast on CrowdStrike Chaos: Exploiting Global Outage for Cyber Scams

Learn about how cybercriminals exploited a global outage of CrowdStrike's services to launch phishing campaigns.

Read Full Article

Harness the Power of Scripting: Why PowerShell is a MUST in Cybersecurity!

Discover why PowerShell skills are essential for a career in cybersecurity and how it can enhance your effectiveness as a professional.

Read Full Article

So You Want to Get into Cybersecurity?

Explore the current state of cybersecurity and how aspiring students can land a role in this lucrative yet competitive field.

Read Full Article

Is Coding Necessary for a Career in Cybersecurity?

Explore the role of coding skills in cybersecurity careers and how programming knowledge can enhance your cybersecurity toolkit.

Read Full Article

Cracking the Code: Exploring the Power of CVSS 4.0

Delve into the world of vulnerability assessment with this comprehensive look at CVSS 4.0 and how it helps prioritize security vulnerabilities.

Read Full Article