Skip to main content
Hashnode
shesecures
Open search (press Control or Command and K)
Toggle theme
Open menu
Hashnode
shesecures
about
achievements
events
Open search (press Control or Command and K)
Toggle theme
Write
Command Palette
Search for a command to run...
Archive
17 posts published so far
Apr 30, 2025
OWASP Top 10 (2021)
Megha BL
Apr 26, 2025
Penetration Testing: A Beginner’s Guide to Ethical Hacking
Megha BL
Apr 24, 2025
Understanding the NIST Cybersecurity Framework: A Simple Guide
Megha BL
Apr 19, 2025
SAST vs. DAST: Understanding the Difference with Tool Examples
Megha BL
Apr 10, 2025
Understanding DAST: A Simple Guide with Tool Examples
Megha BL
Apr 5, 2025
Understanding SAST: A Simple Guide with Tool Examples
Megha BL
Mar 12, 2025
The OWASP Top 10: A Simple Guide to Common Security Risks (2017 Edition)
Megha BL
Mar 5, 2025
Understanding the MITRE Framework and MITRE ATT&CK: A Simple Guide
Megha BL
Mar 4, 2025
Vulnerability Management vs. Vulnerability Assessment: What's the Difference?
Megha BL
Mar 4, 2025
Cybersecurity vs. Information Security: What's the Difference?
Megha BL
Mar 3, 2025
Understanding Cybersecurity: A Simple Guide to Basic Terms
Megha BL
Mar 2, 2025
A Beginner’s Guide to Vulnerability Management
Megha BL
Feb 22, 2025
Building Correlation Rules That Don't Cry Wolf
Megha BL
Feb 15, 2025
Cisco FTD vs FMC: Understanding the Management Plane for Security Engineers
Megha BL
Jan 11, 2025
Log Source Onboarding in QRadar: A Practical Checklist
Megha BL
Dec 25, 2024
QRadar to Sentinel Migration: What No One Tells You Before You Start
Megha BL
Nov 4, 2024
Security Operation Center
Megha BL