Old-school programmer, cybersecurity expert, analyst.
Miguel is a corporate consultant who often spends his time educating people and companies on cybersecurity-related subjects and breaking down complex themes into bite-sized and easily-digestible nibblets. He speaks with over 11 years of experience doing market and cybersecurity research, as well as nearly 15 years of experience developing software, behind him.
- Dark Web Price Index 2020Read Guide
The dark web has a longstanding reputation as a haven for the worst kinds of criminal activity. This reputation is not wholly unjustified, as there are indeed terrible things happening around the world that can be bought and sold on the dark web. The privacy offered by software such as TOR creates an environment where […]
- A Small Guide for Whistleblowers: Rules to Live ByRead Guide
There may come a time in your career, working in a corporate environment or for your government, when you realize that something’s not right. You may find out that who you’re working for is betraying the principles they espouse when there were other more honorable ways to achieve their means. All of your colleagues are […]
- A Look Back at GDPR: Did it Accomplish its Goals?Read Guide
Since the General Data Protection Regulation (GDPR) was created in mid-April 2016, the EU had hopes of creating an internet where the privacy of its users is more valued by making businesses implement an opt-in framework for their tracking cookies. In addition to establishing these goals, the GDPR has also inspired things like the California […]
- A Comprehensive Comparison of VPNs and Onion Routing (TOR)Read Guide
Although VPNs have long been associated with private and secure browsing, those who have a keen interest in this particular subject may also have come across the concept of onion routing, albeit perhaps not with that exact name. Also known as Tor, onion routing (OR) has been a way to navigate the web in virtual […]
- Exposing The Myth of The Invulnerable Air Gapped SystemRead Guide
Saying that air gapping a system is anything but the most secure and invulnerable way to protect data is bound to burst some bubbles. After all, this is the gospel truth among IT professionals who live in a world of clean, sanitized, statistics that don’t always account for how dirty the real world can be. […]