Profile picture

Writing on cybersecurity, software, and more.

All of my long-form thoughts on programming, leadership, cybersecurity, and more, collected in chronological order.

Legality of Pentesting and Vulnerability Research

So, you've been learning different pentesting techniques and tools, and you are eager to apply them in the wild. As exciting as this sounds, thou shall restrain thyself! It's very likely that you will...

HTTPS and the False Sense of Security

Hypertext Transfer Protocol When you're navigating the Internet, your browser (client) is communicating with other computers that serve content (servers). This is thanks to the fact that both clients...

Empowering Teams Through Mission, Purpose, and Values

One key aspect of good leaders is that they mentor and empower their team members. Empowering employees has multiple benefits for members of the organization, the organization itself, and its customer...

ABC of Leadership: Always Be Caring

If you search in your favorite search engine () what Caring Leadership is, you'll find out that most articles refer to the way established leaders within an organization can motivate and inspire their...