Overcoming Imposter Syndrome

Imposter Syndrome is a common feeling among people who work in cybersecurity. It is the feeling of not being good enough, despite having the necessary skills and experience. As a security professional, I have felt this way many times. I have been taking some steps to overcome this feeling and build my confidence lately.

Psychological Challenges of Cybersecurity: Dunning-Kruger Effect and Imposter Syndrome

Psychological Challenges of Cybersecurity: Dunning-Kruger Effect and Imposter Syndrome

Cybersecurity is a field that aims to protect computer systems, networks, and digital information from bad guys who want to get in and cause damage. Despite its importance, the job can be incredibly demanding and stressful due to long hours, tight deadlines, and the critical nature of the work. Cybersecurity professionals are under constant pressure to safeguard infrastructure from cyber threats and are required to maintain a high level of vigilance and alertness at all times, which can lead to physical and emotional exhaustion over time.

Many cybersecurity professionals I’ve encountered have been impacted by either Imposter Syndrome or the Dunning-Kruger effect, two common psychological phenomena. These problems can lead workers to either doubt their abilities and feel inadequate or develop a biased way of looking at a situation. Both of these problems can have negative consequences on the workers’ performance and well-being in the long run.

Therefore, it is crucial for cybersecurity workers to be aware of these psychological problems and take steps to overcome them. This will help them avoid making mistakes, prevent burnout, and maintain a high level of job performance.

An Overview of Fuzzing Tools: Gobuster, Ffuz, Wfuzz and Burp Suite

Web applications are widely used by businesses and individuals, but they are vulnerable to attacks from hackers. Fuzzing is a technique used to find security vulnerabilities by sending a large number of random inputs to an application and observing its response. In this article, we will discuss four tools that can be used for fuzzing: Gobuster, Ffuz, Wfuzz, and Burp Suite.

How does container get random names?

When creating a container without specifying a name, have you wondered how Docker assigns random names to it? Primary identifier for containers is the container ID, you can do almost every operation with that but for us, for humans, using a name is less robotic. Container-based system employs randomly generated strings, consisting lowercase letters. This however have a pattern, with the first part being an adjective and the second part being the surname of a notable scientist or hacker.
Read more →

Event Report: Ansible Meetup (June 2019)

Event Report: Ansible Meetup (June 2019)

I had the opportunity to attend Ansible June meetup hosted by Tavisca Solutions. The agenda for the meetup was to cover popular open-source products, including Ansible, Foreman, ManageIQ, AWX, and their integration with one another.