Leal Da Silva
Thoughts, stories and ideas from a passionate IT professional, geek and comercial aviation enthusiast.

Latest

Apr
06
Understanding and Overcoming Breach Fatigue.

Understanding and Overcoming Breach Fatigue.

Data breaches have become common in the ever-evolving landscape of cyber threats. For IT leaders, the constant barrage of news
2 min read
Mar
26
Understanding Domain Permutation and Protecting Your Brand with Dnstwist

Understanding Domain Permutation and Protecting Your Brand with Dnstwist

In the digital age, the security of a brand's domain name is paramount. Cybercriminals often exploit similar-looking domain
2 min read
Mar
16
The Dark Side of Shiny: Why Cybersecurity Experts are Moonlighting for the Bad Guys

The Dark Side of Shiny: Why Cybersecurity Experts are Moonlighting for the Bad Guys

Imagine this: a seasoned security professional, let's call him Alex, sits down at his computer after a long
3 min read
Mar
06
How to Monitor Your Network with LibreNMS and SNMP

How to Monitor Your Network with LibreNMS and SNMP

LibreNMS is a free and open-source network monitoring system that automatically discovers your network devices using various protocols provides customisable
7 min read
Mar
03
How to Protect Your Business from Email Compromise in a Changing Cybersecurity Landscape

How to Protect Your Business from Email Compromise in a Changing Cybersecurity Landscape

Business email compromise (BEC) is a cyberattack that targets organisations to steal money or critical information. The attacker impersonates a
2 min read
Mar
02
NVMe vs. Regular SSDs: What You Need to Know

NVMe vs. Regular SSDs: What You Need to Know

Solid-state drives (SSDs) are popular for many computer users who want faster and more reliable storage than traditional hard disk
4 min read
Feb
22
How to Avoid Being Scammed with Fake Calls

How to Avoid Being Scammed with Fake Calls

Fake calls are a common and dangerous form of fraud that can cost you money, time, and peace of mind.
4 min read
Feb
11
Why You Should Run Tabletop Exercises for Cybersecurity

Why You Should Run Tabletop Exercises for Cybersecurity

Cybersecurity is not just about having the right tools and policies in place. It is also about how you and
2 min read
Feb
04
How to Migrate Docker Containers from One Server to Another

How to Migrate Docker Containers from One Server to Another

Docker is a popular tool for creating and running containerised applications. It allows you to deploy your code in a
5 min read
Jan
24
Running Multiple Commands in Linux

Running Multiple Commands in Linux

If you are a Linux user, you may have wondered how to run multiple commands simultaneously, in sequence, in parallel or in other ways. In this post, I will show you some useful tips and tricks to do just that. Let's get started!
1 min read