Port 22

Where are My Keys?

We often take for granted that things just work without considering how we got to where we are now. Its easy to complain. I can find a myriad of issues with any computer programming, but I also acknowledge the benefits of cyber innovation and the need to support new ideas, growth, and participation in the field. Digital Forensics and Incident Response focus on confirming malicious threats, identifying threat actors, and shedding the light on vulnerabilities. In this field of cyber investigation, Ive come across the smoking gun with fingerprints on it. You may not always know the name of the threat actor but its rewarding to discover the fingerprint that identifies a threat or breach. At that moment, you better have your happy dance perfected!