Paul Scarlett Personal Website
open-menu closeme
AWS Proof of Concepts
Cyber Security
Commodore 64
github youtube linkedin tryhackme
  • Zero Trust in cyber security

    calendar Nov 8, 2025 · 4 min read

    In the early days of network security, the prevailing mindset was simple: protect the perimeter. Firewalls, intrusion‑prevention systems, and VPN gateways formed a virtual wall that kept “bad actors” out while allowing trusted employees free access inside.


    Read More
  • The  3 A’s of Cybersecurity: Building Trust, Control, and Visibility

    calendar Nov 1, 2025 · 5 min read

    In today’s hyper‑connected world, protecting digital assets isn’t just about keeping the bad guys out—it’s also about ensuring that legitimate users can do what they need, when they need it, and that every action is traceable.


    Read More
  • Unleashing the Unexpected – How the VIC‑II’s Quirks Powered the C‑64 Demo Scene

    calendar Nov 1, 2025 · 16 min read

    When the Commodore 64 arrived in 1982, its graphics engine – the MOS Technology VIC‑II (Video Interface Chip II) – was already a marvel of cost‑effective engineering


    Read More
  • The Onion Router (Tor): How It Works

    calendar Oct 25, 2025 · 8 min read

    When privacy‑savvy internet users talk about “the onion,” they’re usually referring to Tor, the open‑source network that routes traffic through multiple encrypted layers


    Read More
  • The CIA Triad: Why Confidentiality, Integrity, and Availability Matter to Everyone

    calendar Oct 18, 2025 · 5 min read

    When you hear “CIA,” you probably think of espionage. In information security, however, the CIA triad stands for Confidentiality, Integrity, and Availability


    Read More
  • The UK’s Cyber Essentials Scheme: An Overview

    calendar Oct 18, 2025 · 4 min read

    In today’s hyper‑connected world, cyber‑threats are no longer a niche concern—they affect businesses of every size, public sector organisations, and even individual citizens.


    Read More
  • The SID Chip

    calendar Oct 12, 2025 · 9 min read

    When the Commodore 64 (C64) arrived in 1982, its most celebrated feature wasn’t the 64 KB of RAM or the colorful graphics—it was the Sound Interface Device (SID) chip


    Read More
  • The Evolution of Hacking: From Curious Explorers to Modern Cyber‑Criminals

    calendar Oct 11, 2025 · 10 min read

    Hacking began as a form of playful curiosity—people probing the limits of emerging computer systems.


    Read More
  • Beginners guide to VPNs

    calendar Oct 4, 2025 · 5 min read

    In today’s hyper‑connected world, our online activities leave a trail of data that can be harvested, tracked, or intercepted at almost any point along the route.


    Read More
  • Understanding Firewalls 101

    calendar Sep 28, 2025 · 5 min read

    In today’s hyper‑connected world, a firewall is often the first line of defense against unwanted traffic, malware, and data breaches.


    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • »
    • »»

Featured Posts

  • About Me
  • Cyber Security 101
  • AWS Intro

Recent Posts

  • User Awareness Training: The First Line of Defense in Modern Cyber‑Security
  • A Deep Dive into the CIA Triad – A Follow‑Up to “The CIA Triad: Why Confidentiality, Integrity, and Availability Matter to Everyone
  • From Benchmarks to Audits: A Complete Guide to CIS, NIST, European Regulations, and SOC 2
  • Regulatory Compliance and Cyber Security
  • Strengthening Cloud Security Management – A Comprehensive Guide for Modern Enterprises
  • Security Posture Management
  • Deep‑Dive – A Technical Primer on Everyday Cyber‑Security for the Savvy User
  • The Human Factor – Why People Remain the Weakest Link in Cybersecurity (An In‑Depth Exploration)
  • Info Stealers: The Hidden Threat Lurking Behind Everyday Digital Interactions
  • Zero Trust in cyber security
Copyright © 2023–2025, Paul Scarlett and the Hugo Authors; all rights reserved.

Copyright  COPYRIGHT © 2023–2025, PAUL SCARLETT AND THE HUGO AUTHORS; ALL RIGHTS RESERVED.. All Rights Reserved

to-top