Skip to content

CISO.pm

  • Privacy Policy
Search

CISO.pm

Close menu
  • Privacy Policy

CISO.pm

Search Toggle menu

Category: Workarounds

November 18, 2022November 18, 2022Phishing and Scams, Workarounds

Browser Isolation: Running a browser as another user

The notion of separating the user context from the browser (and possibly the email client) is not new; I discussed this as […]

November 7, 2022November 7, 2022Workarounds

Solving the BSOD on a Microsoft Surface Pro 7, Part 2

Because Part 1 did not solve it! It’s been years since the BSODs started on my Surface. It was so annoying that […]

September 16, 2022October 13, 2022Technology, Workarounds

Solving the BSOD on a Microsoft Surface Pro 7

I’ve been the happy owner of a Microsoft Surface Pro 7 for 3 years now and, due to semi-regular Blue Screens of […]

August 15, 2022Workarounds

Just Enough Security to Perform

Living near a lake where people can go and sunbathe is nice, especially in the summer. At my local spot, someone has […]

June 28, 2022August 17, 2022Workarounds

Time Machine network backups via Tailscale

Every good security guy or gal likes his or her backups.  Being the proud owner of an M1 MacBook Air, it was […]

Tag Cloud

ai images Azure bitcoin blockchain browser BSOD certifications Chatbot ChatGPT cissp complexity CPE crypto extensions fiction GCP hacking hashing homegate scam home search scam Hyper-V incident ISC2 isolation IT 1.0 LastPass logging malware OCI opencanary passwords patching phishing porn proxy Scam secure browsing social engineering splunk stupid emails Surface Pro BSOD tailscale VPN vulnerabilities Windows

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022

Categories

  • Blockchain
  • Certifications and CPEs
  • Emerging Tech
  • Hacking
  • Honeypot
  • Incidents
  • Information
  • Introduction
  • Network
  • Phishing and Scams
  • Security
  • Technology
  • Uncategorized
  • Virtualisation
  • Vulnerabilities
  • Webhosting
  • Workarounds

.© CISO.pm 2023.