Establishing an Information Security Governance

Posted on May 01, 2022 in Cybersecurity

Information security aspects, decision-making and overall practices within an organization must be fostered through corporate governance practices. However, creating a governance framework for enacting policies in large enterprises is indeed challenging. Especially, when lots of subsidiaries belongs to an entity, the concern company is geographically distributed (multinational corporations), or heterogeneous …


Continue reading

Master's thesis: Social Engineering Awareness using Serious Games

Posted on January 02, 2021 in Cybersecurity

Last year I have attained my master's degree in Computer Science majoring in IT-Security. It has been a very long journey, but in the end I passed with distinction. I have to admit, I am especially proud of my master's thesis, which was jointly written with my fellow-student Saed Alavi …


Continue reading

Review: Attacking and Defending Active Directory

Posted on June 18, 2020 in Cybersecurity

Today I have finished the Attacking and Defending Active Directory course by passing the CRTP examination. At the moment, this course is relatively unknown. This is why I decided to write a review about it, since I really like the course. As its title already says, all the basics about …


Continue reading

Writing a Penetration Testing Report

Posted on April 30, 2020 in Cybersecurity

At the end of the day, the penetration test report is what is delivered to a client after performing the penetration test. For this reason, the report is really important. In this blog post I want to show you a good report writing methodology and I will share a sample …


Continue reading

Write-up: HTB Ghoul

Posted on October 05, 2019 in Cybersecurity

This was the first box on Hack The Box I've completed, that has the difficulty hard. It was released on May 4, 2019 and it's a Linux-based machine. Hacking Ghoul was really fun, though, I needed a few hints by other people. The box is now retired, which means I …


Continue reading