As a manager, my primary responsibility is to create an environment where my team can thrive. The views I’m about to share are purely my own, derived not from management textbooks or theories, but from my many years of hands-on experience managing people in both large and small organizations. Over the years, I’ve come to understand that the best way to achieve success is by focusing on the people rather than the company. This might sound counterintuitive and is certainly… https://andreafortuna.org/2024/07/16/fostering-growth-and-comfort-a-balanced-approach-to-people-management.html?utm_source=dlvr.it&utm_medium=mastodon
17.7.2024 06:30As a manager, my primary responsibility is to create an environment where my team can thrive. The views I’m about to share are purely my...Cloudflare offers a good VPN solution called Cloudflare Warp: this article delves into the intricacies of Cloudflare Warp, its foundation in Wireguard technology, and explores how users can harness its power using standard Wireguard clients, providing a flexible approach to secure connectivity. Understanding Cloudflare Warp Cloudflare Warp represents a modern approach to Virtual Private Networks (VPNs), designed to address the shortcomings of traditional VPN solutions… https://andreafortuna.org/2024/07/14/using-cloudflare-warp-with-wireguard-clients.html?utm_source=dlvr.it&utm_medium=mastodon
15.7.2024 06:30Cloudflare offers a good VPN solution called Cloudflare Warp: this article delves into the intricacies of Cloudflare Warp, its foundation in...Our digital lives are an integral part of our overall existence. From social media and online banking to cloud storage and smart home devices, we constantly interact with digital systems that process and store our personal information. While these technologies offer tremendous benefits, they also expose us to various privacy and security risks. To effectively protect ourselves in this digital landscape, it’s crucial to develop a personal threat model. What is Threat… https://andreafortuna.org/2024/07/09/personal-threat-modeling-safeguarding-your-digital-life.html?utm_source=dlvr.it&utm_medium=mastodon
10.7.2024 06:30Our digital lives are an integral part of our overall existence. From social media and online banking to cloud storage and smart home...Okay, let’s chat about something that’s been bugging me lately - and I bet it’s been on your mind too. You know how it feels like every time you turn around, some big tech company is trying to sneak a peek at your data? It’s like, “Dude, back off! That’s my personal stuff!” Well, I’ve got some good news for you. I’ve set up a bunch of free services on my site that’ll let you do all your favorite online stuff without feeling like you’re being watched 24/7. Cool, right?… https://andreafortuna.org/2024/07/08/hey-there-privacy-fans-check-out-these-cool-free-services-i-ve-got-for-you.html?utm_source=dlvr.it&utm_medium=mastodon
9.7.2024 06:31Okay, let’s chat about something that’s been bugging me lately - and I bet it’s been on your mind too. You know how it feels like...In the shadowy world of digital espionage and cyber warfare, knowledge is power. But in an era where data flows like water through the vast networks of our interconnected world, how do we separate the signal from the noise? Enter the world of SIGINT, COMINT, and ELINT - the unsung heroes of modern cybersecurity and threat intelligence. These cryptic acronyms may sound like something out of a spy thriller, but they represent real-world techniques that form the backbone of… https://andreafortuna.org/2024/07/03/sigint-comint-and-elint-pillars-of-modern-cybersecurity-and-threat-intelligence.html?utm_source=dlvr.it&utm_medium=mastodon
4.7.2024 06:31In the shadowy world of digital espionage and cyber warfare, knowledge is power. But in an era where data flows like water through the vast...Disclaimer: This post is entirely satirical and should not be taken seriously under any circumstances. Any resemblance to actual management advice is purely coincidental and probably a sign that you need to reevaluate your leadership style. Reader discretion (and a sense of humor) is advised. Welcome, fellow managers and team leaders, to the wonderful world of remote work! Gone are the days when we could casually stroll up to our colleagues’ desks, observe their work in… https://andreafortuna.org/2024/07/02/the-art-of-dodging-feedback-a-remote-manager-s-guide-to-saying-nothing-while-talking-a-lot.html?utm_source=dlvr.it&utm_medium=mastodon
3.7.2024 06:30Disclaimer: This post is entirely satirical and should not be taken seriously under any circumstances. Any resemblance to actual management...As I closed the final pages of “Death’s End,” the concluding volume of Cixin Liu’s mind-bending “The Three-Body Problem” trilogy, I found myself awash in a sea of emotions and ideas. This epic saga, which had taken me on a journey across vast stretches of time and space, left me not only in awe of its grand cosmic vision but also struck by its surprising relevance to our more earthbound concerns. In the quiet moments after finishing the book, as I reflected on the… https://andreafortuna.org/2024/06/29/unpredictable-chaos-and-strategic-thinking-cybersecurity-lessons-from-the-three-body-problem.html?utm_source=dlvr.it&utm_medium=mastodon
1.7.2024 06:30As I closed the final pages of “Death’s End,” the concluding volume of Cixin Liu’s mind-bending “The Three-Body Problem”...In a dynamic and ever-evolving field like cybersecurity it’s easy to get engrossed in the technical complexities and overlook the human element. However, over the years I’ve come to realize that kindness is not just a soft skill; it’s an essential tool for effective leadership and team management. Fostering a Culture of Psychological Safety: A Haven in the Face of Pressure Cybersecurity professionals are often under immense pressure to perform, constantly dealing with… https://andreafortuna.org/2024/06/26/human-connection-in-the-digital-world-fostering-kindness-in-the-workplace.html?utm_source=dlvr.it&utm_medium=mastodon
27.6.2024 06:30In a dynamic and ever-evolving field like cybersecurity it’s easy to get engrossed in the technical complexities and overlook the human...The workplace can be a whirlwind of overflowing inboxes, demanding deadlines, and the expectation of constant availability. This relentless pressure can lead to burnout, resentment, and a longing for a better balance between your professional and personal life. The key to achieving this balance is setting clear boundaries. This means understanding your limits and communicating them effectively to your colleagues and managers. Far from being selfish, setting boundaries is… https://andreafortuna.org/2024/06/18/thriving-not-just-surviving-why-setting-boundaries-is-essential-for-workplace-well-being.html?utm_source=dlvr.it&utm_medium=mastodon
19.6.2024 06:30The workplace can be a whirlwind of overflowing inboxes, demanding deadlines, and the expectation of constant availability. This relentless...In the cybersecurity domain, incident responders act as the secret agents on the front lines of digital conflict. They engage in relentless mitigation efforts against cyber adversaries who exploit vulnerabilities that have the potential to cripple organisational infrastructure. While their dedication is commendable, it’s important to acknowledge the detrimental effects such high-pressure environments can have on their psychological well-being. I vividly recall attending… https://andreafortuna.org/2024/06/17/protecting-the-protectors-mental-health-practices-for-incident-responders.html?utm_source=dlvr.it&utm_medium=mastodon
18.6.2024 06:31In the cybersecurity domain, incident responders act as the secret agents on the front lines of digital conflict. They engage in relentless...Performing forensic analysis on mobile devices necessitates a suite of specialized tools to ensure that data acquisition, analysis, and reporting are conducted in a forensically sound manner. In this post I’ll try to delve into the technical aspects of several essential tools used in mobile forensics, providing expert analysts with a detailed understanding of their functionalities, applications, and methodologies. Overview of Mobile Forensics Mobile forensics is a branch… https://andreafortuna.org/2024/06/12/mobile-forensics-tools-and-techniques.html?utm_source=dlvr.it&utm_medium=mastodon
13.6.2024 06:31Performing forensic analysis on mobile devices necessitates a suite of specialized tools to ensure that data acquisition, analysis, and...Open Source Intelligence (OSINT) investigations serve as indispensable tools for uncovering valuable insights and mitigating potential risks. However, the efficacy of these investigations hinges upon the precision and clarity of the questions posed. Ambiguous or poorly formulated inquiries can derail efforts, leading to inefficiencies and irrelevant findings. In this comprehensive guide, we delve into the strategies and methodologies essential for developing precise… https://andreafortuna.org/2024/06/07/enhancing-osint-investigations-crafting-precise-questions-for-effective-results.html?utm_source=dlvr.it&utm_medium=mastodon
10.6.2024 06:30Open Source Intelligence (OSINT) investigations serve as indispensable tools for uncovering valuable insights and mitigating potential...Back in 2017, I shared a detailed post about the configuration of my Linux laptops on my blog (you can find it here). Since then, not only has my tech setup evolved, but my understanding and awareness of security and privacy issues have significantly deepened. This journey has led me to adopt new tools and practices to enhance my digital security and protect my privacy. In this updated post, I will walk you through my current hardware, the operating systems I use, the… https://andreafortuna.org/2024/05/27/exploring-my-tech-setup-from-hardware-to-software-and-security-practices.html?utm_source=dlvr.it&utm_medium=mastodon
28.5.2024 06:30Back in 2017, I shared a detailed post about the configuration of my Linux laptops on my blog (you can find it here). Since then, not only...Welcome, dear readers, to the frenetic world of modern work, where the rush is glorified and the only thing that matters is the end result. Ah, the culture of results! It’s as if we’re all running on a hamster wheel, desperately trying to grab that elusive piece of cheese. But let’s take a step back, shall we? Let’s explore, with a generous dose of irony, how we’ve become so obsessed with results that we’ve forgotten to enjoy the journey. The Great Race to Nowhere… https://andreafortuna.org/2024/05/25/chasing-numbers-finding-joy-in-the-journey-of-work.html?utm_source=dlvr.it&utm_medium=mastodon
27.5.2024 06:30Welcome, dear readers, to the frenetic world of modern work, where the rush is glorified and the only thing that matters is the end result....The world of work today if full of tasks, emails, meetings, and personal projects: In this situation, you may feel overwhelmed. But the Getting Things Done (GTD), a productivity system developed by David Allen, may helps you! GTD is not just a method but a comprehensive approach to capturing, organizing, and prioritizing everything that demands your attention. The GTD Workflow: A Roadmap to Clarity At its core, GTD is about creating a clear, systematic way to handle all… https://andreafortuna.org/2024/05/21/unlocking-productivity-with-the-gtd-method.html?utm_source=dlvr.it&utm_medium=mastodon
22.5.2024 06:30The world of work today if full of tasks, emails, meetings, and personal projects: In this situation, you may feel overwhelmed. But the...For several years I have been using Jekyll as a platform for my site, and for publication I use a simple GitHub Action which converts an issue into a markdown file which is then processed by Jekyll (in one of the next posts I will also explain this method). I recently had to make some changes to the layout and, to test the changes locally I needed to install Ruby and Jekyll: but since I don't like doing things in a simple way, I decided to try making the changes from a… https://andreafortuna.org/2024/05/20/how-to-install-ruby-and-jekyll-on-chromebook/?utm_source=dlvr.it&utm_medium=mastodon
21.5.2024 06:30For several years I have been using Jekyll as a platform for my site, and for publication I use a simple GitHub Action which converts an...In the past I have often spoken (1,2) about Pegasus, the spyware originally produced and distributed by the Israeli company NSO, which has been used by various states to spy on activists, opponents and journalists. Now, with the upcoming European elections, the issue of spyware use in Europe is once again in the spotlight, raising concerns about privacy and the integrity of democratic processes. https://andreafortuna.org/2024/05/13/poland-investigates-use-and-misuse-of-pegasus/?utm_source=dlvr.it&utm_medium=mastodon
14.5.2024 06:30In the past I have often spoken (1,2) about Pegasus, the spyware originally produced and distributed by the Israeli company NSO, which has...As a website owner, I’ve always grappled with the balance between monetization and user privacy. AdSense, Google’s advertising platform, has been the go-to choice for many publishers due to its ease of use and revenue potential. https://andreafortuna.org/2024/04/28/why-i-ditched-adsense-for-liberapay-a-privacy-first-journey/?utm_source=dlvr.it&utm_medium=mastodon
30.4.2024 06:30As a website owner, I’ve always grappled with the balance between monetization and user privacy. AdSense, Google’s advertising platform,...The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of websites, which can be a valuable tool for OSINT investigations. https://andreafortuna.org/2024/04/26/osint-investigations-using-the-wayback-machine/?utm_source=dlvr.it&utm_medium=mastodon
29.4.2024 06:30The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of...Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being actively exploited by forensic companies. These zero-day flaws, which haven't yet been patched, could potentially allow unauthorised access to user data. https://andreafortuna.org/2024/04/03/is-your-pixel-safe-google-acknowledges-exploited-vulnerabilities/?utm_source=dlvr.it&utm_medium=mastodon
4.4.2024 06:31Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being...