Paul Scarlett Personal Website
open-menu closeme
AWS Proof of Concepts
Cyber Security
Commodore 64
github youtube linkedin tryhackme
  • The Human Factor – Why People Remain the Weakest Link in Cybersecurity (An In‑Depth Exploration)

    calendar Nov 22, 2025 · 6 min read

    Introduction When a breach headline reads “X Company Breached via Phishing,” the immediate reaction is to blame a technical flaw—a mis‑configured firewall, an unpatched server, or a vulnerable third‑party library. Yet, post‑mortem reports from the past decade consistently reveal a different story: the attacker’s first …


    Read More
  • Info Stealers: The Hidden Threat Lurking Behind Everyday Digital Interactions

    calendar Nov 15, 2025 · 7 min read

    Info stealers (sometimes called “information stealers”) are a subclass of credential‑stealing malware whose primary objective is data exfiltration, not disruption.


    Read More
  • Zero Trust in cyber security

    calendar Nov 8, 2025 · 4 min read

    In the early days of network security, the prevailing mindset was simple: protect the perimeter. Firewalls, intrusion‑prevention systems, and VPN gateways formed a virtual wall that kept “bad actors” out while allowing trusted employees free access inside.


    Read More
  • The  3 A’s of Cybersecurity: Building Trust, Control, and Visibility

    calendar Nov 1, 2025 · 5 min read

    In today’s hyper‑connected world, protecting digital assets isn’t just about keeping the bad guys out—it’s also about ensuring that legitimate users can do what they need, when they need it, and that every action is traceable.


    Read More
  • The Onion Router (Tor): How It Works

    calendar Oct 25, 2025 · 8 min read

    When privacy‑savvy internet users talk about “the onion,” they’re usually referring to Tor, the open‑source network that routes traffic through multiple encrypted layers


    Read More
  • The CIA Triad: Why Confidentiality, Integrity, and Availability Matter to Everyone

    calendar Oct 18, 2025 · 5 min read

    When you hear “CIA,” you probably think of espionage. In information security, however, the CIA triad stands for Confidentiality, Integrity, and Availability


    Read More
  • The UK’s Cyber Essentials Scheme: An Overview

    calendar Oct 18, 2025 · 4 min read

    In today’s hyper‑connected world, cyber‑threats are no longer a niche concern—they affect businesses of every size, public sector organisations, and even individual citizens.


    Read More
  • The Evolution of Hacking: From Curious Explorers to Modern Cyber‑Criminals

    calendar Oct 11, 2025 · 10 min read

    Hacking began as a form of playful curiosity—people probing the limits of emerging computer systems.


    Read More
  • Beginners guide to VPNs

    calendar Oct 4, 2025 · 5 min read

    In today’s hyper‑connected world, our online activities leave a trail of data that can be harvested, tracked, or intercepted at almost any point along the route.


    Read More
  • Understanding Firewalls 101

    calendar Sep 28, 2025 · 5 min read

    In today’s hyper‑connected world, a firewall is often the first line of defense against unwanted traffic, malware, and data breaches.


    Read More
    • ««
    • «
    • 1
    • 2
    • »
    • »»

Featured Posts

  • About Me
  • Cyber Security 101
  • AWS Intro

Recent Posts

  • The Human Factor – Why People Remain the Weakest Link in Cybersecurity (An In‑Depth Exploration)
  • Info Stealers: The Hidden Threat Lurking Behind Everyday Digital Interactions
  • Zero Trust in cyber security
  • The  3 A’s of Cybersecurity: Building Trust, Control, and Visibility
  • Unleashing the Unexpected – How the VIC‑II’s Quirks Powered the C‑64 Demo Scene
  • The Onion Router (Tor): How It Works
  • The CIA Triad: Why Confidentiality, Integrity, and Availability Matter to Everyone
  • The UK’s Cyber Essentials Scheme: An Overview
  • The SID Chip
  • The Evolution of Hacking: From Curious Explorers to Modern Cyber‑Criminals
Copyright © 2023–2025, Paul Scarlett and the Hugo Authors; all rights reserved.

Copyright  COPYRIGHT © 2023–2025, PAUL SCARLETT AND THE HUGO AUTHORS; ALL RIGHTS RESERVED.. All Rights Reserved

to-top