Welcome to CyberVerse

A hub of cybersecurity projects and insights from my professional journey.

Open Web Application Security Project (OWASP)

Understand OWASP and discover its vital role in web application security. This article explains how OWASP’s tools, resources, and best practices help software developers and cybersecurity professionals enhance their skills and safeguard digital environment.

The Guide to ISC2 and Its Role in Cybersecurity

This comprehensive guide covers ISC2's history, core values, certification paths, and the real-world impact of becoming certified.

Top 10 Well-Known Cyber Attacks

Cybersecurity isn't just about protecting data; it's a high-stakes game where politics, business, and global power collide. Threats have grown significantly over the years, with several high-profile cyber attacks making headlines worldwide. Discover the top 10 most well-known cyber attacks that shook the digital world.

blue and black mask illustrationblue and black mask illustration

The Role of Tools in Cybersecurity

Curious about how cybersecurity tools work and why they matter? This article explains the importance of these essential tools in cybersecurity, their roles, and everything related to it.

Pillars of Cybersecurity Strategy: Governance, Risk, and Compliance

Explore the essential concepts of Governance, Risk, and Compliance (GRC) in cybersecurity. Understand its need and how it aligns security with business goals and ensures legal and regulatory compliance.

ISO 27001 vs. NIST

Discover the key differences and complementary benefits of ISO 27001 and the NIST Cybersecurity Standards. Learn how these framework/standards can work together to fortify organisation's security posture.

Breaking Down Australia's Intelligence Agencies: A Cybersecurity Perspective

Australia's intelligence agencies play a crucial role in safeguarding national security, each with distinct focuses and responsibilities. Whether dealing with foreign intelligence, domestic security, cyber operations, or criminal intelligence, understanding the roles of ASIS, ASIO, ASD, and ACIC is essential—especially for cybersecurity professionals and aspirants looking to work for the government.