Untitled conversation
Cybersecurity Companion
Donald Yanito-Duncan
40+
Conversations
Cybersecurity expert for professional advice and scenario simulations
How do I implement a secure firewall configuration?
What's the best approach for a CISO in risk management?
Can you simulate a phishing attack scenario?
What certifications are essential for a Pentester?