Andrea Fortuna
AboutRss
  • Aug 15, 2024

    Digital Detectives vs. Android 14: overcoming new forensic challenges

    As smartphones continue to be an integral part of our daily lives, they also become increasingly valuable sources of digital evidence in investigations. Android, being one of the most widely used mobile operating systems, is often at the forefront of… read more »
  • Aug 14, 2024

    Talk is cheap, but silence is suspect: the paradox of the modern workplace

    Disclaimer: This post is purely satirical and should not be taken seriously. Any resemblance to actual management advice is purely coincidental. Discretion (and a sense of humour) is advised. Alert! A new plague sweeps through tech offices worldwide. Not malware,… read more »
  • Aug 4, 2024

    A Minimalist Approach to Clipboard Management in Linux: Crafting a Custom Solution

    A few days ago, while working on my highly customized Linux environment (which I detailed in my previous post about my tech setup), I realized that I was missing a key component: a robust clipboard manager. For those unfamiliar, a… read more »
  • Jul 30, 2024

    The enduring legacy of Pachelbel's canon in modern pop music

    In a departure from my usual topics of technology and cybersecurity, today I’d like to explore one of my other passions: music. While my blog typically delves into the intricacies of digital landscapes and security protocols, music has always held… read more »
  • Jul 25, 2024

    The Selfless Leader"s Manifesto: Putting Your Team in the Spotlight

    Leadership, like a fingerprint, is unique to each individual who practices it. There’s no universal playbook, no one-size-fits-all approach to being an effective manager. However, throughout my career journey - both as a team member yearning for inspiring leadership and… read more »
  • Jul 21, 2024

    The Gattopardo Strategy: a proposed approach to Cybersecurity through literary insight

    A few weeks ago, I wrote a post exploring how themes from Cixin Liu’s science fiction masterpiece, “The Three-Body Problem,” could be applied to cybersecurity. The response was overwhelming, with several readers contacting me to tell me how the article… read more »
  • Jul 19, 2024

    The Crowdstrike Incident: A Wake-Up Call for Digital Security

    On Friday, July 19, 2024, a software update to Crowdstrike’s Falcon security system triggered a cascading failure that affected millions of Microsoft Windows systems worldwide. This incident, which wasn’t the result of a malicious attack but rather an unforeseen bug… read more »
  • Jul 19, 2024

    Google's Potential Acquisition of Wiz: A Game-Changer in Cloud Security

    Recently Google has announced its intention to acquire Wiz, a prominent Israeli cybersecurity company, for a staggering $23 billion. This potential acquisition, if successful, would not only be Google’s largest to date but also the biggest ever in the cybersecurity… read more »
  • Jul 16, 2024

    Fostering Growth and Comfort: A Balanced Approach to People Management

    As a manager, my primary responsibility is to create an environment where my team can thrive. The views I’m about to share are purely my own, derived not from management textbooks or theories, but from my many years of hands-on… read more »
  • Jul 14, 2024

    Using Cloudflare Warp with Wireguard Clients

    Cloudflare offers a good VPN solution called Cloudflare Warp: this article delves into the intricacies of Cloudflare Warp, its foundation in Wireguard technology, and explores how users can harness its power using standard Wireguard clients, providing a flexible approach to… read more »
  • Jul 9, 2024

    Personal Threat Modeling: Safeguarding Your Digital Life

    Our digital lives are an integral part of our overall existence. From social media and online banking to cloud storage and smart home devices, we constantly interact with digital systems that process and store our personal information. While these technologies… read more »
  • Jul 8, 2024

    Hey There, Privacy Fans! Check Out These Cool Free Services I"ve Got for You

    Okay, let’s chat about something that’s been bugging me lately - and I bet it’s been on your mind too. You know how it feels like every time you turn around, some big tech company is trying to sneak a… read more »
  • Jul 3, 2024

    SIGINT, COMINT, and ELINT: Pillars of Modern Cybersecurity and Threat Intelligence

    In the shadowy world of digital espionage and cyber warfare, knowledge is power. But in an era where data flows like water through the vast networks of our interconnected world, how do we separate the signal from the noise? Enter… read more »
  • Jul 2, 2024

    The Art of Dodging Feedback: A Remote Manager's Guide to Saying Nothing While Talking a Lot

    Disclaimer: This post is entirely satirical and should not be taken seriously under any circumstances. Any resemblance to actual management advice is purely coincidental and probably a sign that you need to reevaluate your leadership style. Reader discretion (and a… read more »
  • Jun 29, 2024

    Unpredictable Chaos and Strategic Thinking: Cybersecurity Lessons from "The Three-Body Problem"

    As I closed the final pages of “Death’s End,” the concluding volume of Cixin Liu’s mind-bending “The Three-Body Problem” trilogy, I found myself awash in a sea of emotions and ideas. This epic saga, which had taken me on a… read more »
  • Jun 26, 2024

    Human Connection in the Digital World: Fostering Kindness in the Workplace

    In a dynamic and ever-evolving field like cybersecurity it’s easy to get engrossed in the technical complexities and overlook the human element. However, over the years I’ve come to realize that kindness is not just a soft skill; it’s an… read more »
  • Jun 18, 2024

    Thriving, Not Just Surviving: Why Setting Boundaries is Essential for Workplace Well-being

    The workplace can be a whirlwind of overflowing inboxes, demanding deadlines, and the expectation of constant availability. This relentless pressure can lead to burnout, resentment, and a longing for a better balance between your professional and personal life. The key… read more »
  • Jun 17, 2024

    Protecting the Protectors: Mental Health Practices for Incident Responders

    In the cybersecurity domain, incident responders act as the secret agents on the front lines of digital conflict. They engage in relentless mitigation efforts against cyber adversaries who exploit vulnerabilities that have the potential to cripple organisational infrastructure. While their… read more »
  • Jun 12, 2024

    Mobile Forensics: tools and techniques

    Performing forensic analysis on mobile devices necessitates a suite of specialized tools to ensure that data acquisition, analysis, and reporting are conducted in a forensically sound manner. In this post I’ll try to delve into the technical aspects of several… read more »
  • Jun 7, 2024

    Enhancing OSINT Investigations: Crafting Precise Questions for Effective Results

    Open Source Intelligence (OSINT) investigations serve as indispensable tools for uncovering valuable insights and mitigating potential risks. However, the efficacy of these investigations hinges upon the precision and clarity of the questions posed. Ambiguous or poorly formulated inquiries can derail… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician