6 Great Chess Books to Read for Strategy and Tactics

Chess is the quintessential game of strategy. It pits 2 players against each other on a 64 square board with neither player having an advantage in pieces and without luck playing any role. Despite the simplicity of the game’s rules, it’s still one of the most studied games, and one of the hardest to truly master.

While chess tactics and strategy can be divided into multiple levels (openings, middlegame, endgame, etc.),… Read the rest

Understanding Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is the post-security answer to traditional antivirus and response tools. EDR is the evolution and successor to traditional antivirus, anti-malware, anti-ransomware and similar solutions. It helps make the move from worrying about the origin or type of threat and worrying about what it can do to you economically. Hacking isn’t motivated by damage or exploration as much, it’s motivated by capitalistic gains.… Read the rest

How to Learn About Front-End Development

The front-end web development stack is made up of a number of tools that help you build the front-end of your application. This is what your end users see and interact with, and what they’ll (more often than not) judge you the harshest on. We’ll look at what (some of) these tools are, how they work together, and what you can expect to need as a front-end developer.… Read the rest

The Easiest Guide to Installing and Managing the Windows Subsystem for Linux (WSL)

The Windows Subsystem for Linux (WSL) is a powerful addition to Windows 10 and Windows 11. It allows you to run a full Linux distribution without the hassle of a traditional VM setup. For a lot of development tasks, it’s (almost) as good as running on bare metal.

There are two versions of WSL, there’s WSL 1 which is the classic mode most people are used to, and WSL 2 which offers a host of advancements but is more in line with traditional virtualization without the same shortcomings (it leverages Hyper-V and a full Linux kernel).… Read the rest

Next Generation SIEM for Security

SIEM stands for Security Information and Event Management and is a platform which collects and collates data in a central repository from multiple sources, devices, etc. A SIEM platform is going to collect some combination of system logs (e.g. Windows event logs, Linux logs, etc.), application or service logs (e.g. SQL, ERP solutions, etc.), networking equipment (firewalls, smart switches, etc.), security solution logs (e.g.… Read the rest

What Is Post-Security and How Does It Impact You?

Post-security is an abstract concept which refers to the move from traditional preventative security to meta-security and security as a strategy. The move takes you from focusing on just preventing an attack to the attack, the fallout, the purpose of an attack, and everything in between. You focus on the game rather than the individual moves in the game. How the opponent plays, or even might play, affects how you perform as well.… Read the rest