Jessica Truong, Hacker Noon

Jessica Truong

Hacker Noon

Viet Nam

Contact Jessica

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Hacker Noon

Past articles by Jessica:

What is SOAR and How Does It Improve the Effectiveness of a SOC Team?

SOAR helps execute, coordinate, and automate tasks between people and tools. SOAR prioritizes alerts so security teams can focus their resources effectively. → Read More

5 Common Identity and Access Management Security Risks

IAM ensures that employees have the necessary permissions to perform their jobs. Read on to learn about the 5 common IAM security risks & how to mitigate them. → Read More

How to Ensure Data Integrity in an Organization

Ensuring data integrity is essential in an organization because it ensures data has not been altered or compromised. Understand how to preserve data integrity. → Read More

Security Best Practices for Removable Media and Devices

Removable media, like USB flash drives, are commonly used today. The uses of these devices increases the risk of data loss, data exposure, and network attacks. → Read More

Everything You Need To Know About A White Hat Hacker

White hat hackers find and exploit vulnerabilities within a company's network or system with the intention to provide remediation steps to mitigate these risks. → Read More

What is a DNS Attack and How Can You Protect Against It?

DNS is a protocol that translates human-friendly URLs into IP addresses and a DNS attack is when a hacker exploits vulnerabilities in the DNS service itself. → Read More

Is Apple Pay Secure? - Platform Security and Privacy Overview

Apple Pay is a secure feature that uses multiple layers of encryption to protect users credit card information. Read to learn how to make Apple Pay more secure! → Read More

What is Purple Teaming in Cybersecurity?

Purple teaming is maximizes the effectiveness of the Red and Blue team. It is a function that encourages the two teams to work together, exchange information. → Read More

What is the Difference between Telnet and SSH?

Telnet and SSH are network protocols used to manage and access devices remotely. SSH is more secure and preferred because it encrypts data sent over the network → Read More

Apple vs Microsoft: Who Offers Better Security?

Apple vs Microsoft, which one offers better security between? In this article you will get a detailed explanation how much security each of them have to offer. → Read More

Biometric Data and Privacy: Here’s What You Need to Know

Biometrics are metrics that can be used to identify a person. This article discusses biometric data and its privacy concerns & how to protect biometric data. → Read More

Red Team vs Blue Team in Cybersecurity: A Quick Crash Course

Red and Blue teams are simulated real-world attacks used in organizations to test a company's current security rules. Each team aids in improving the security. → Read More

Meet the Writer: HackerNoon Contributor Jessica Truong Talks Cybersecurity

Meet Jessica! She is a Cybersecurity enthusiast whose goal is to educate readers of the different topics within Cybersecurity. Check out her HN page for more! → Read More

An Unboring Guide to Endpoint Detection and Response (EDR)

EDR solutions detect, investigate & eliminate threats as quickly as possible. It generates alerts to notify security professionals so that they can investigate. → Read More

Is it Safe to Store Credit Card Information on Google Chrome?

Do not store your credit card information on Google Chrome! This article discusses why it's not safe to store your credit card information on Google chrome. → Read More

Pegasus Spyware: Here’s What You Need to Know

Pegasus is a spyware that was developed by an Israeli group called NSO. Once the spyware infiltrates the mobile device, it can monitor the device in real time. → Read More

Network Security 101: Everything You Need to Know

Network Security is Vital. Its purpose is to prevent unauthorized users from accessing an organization's network and devices. It is intended to keep data safe. → Read More

Jailbreaking an iPhone: Everything You Need to Know

Do you want more control of your iPhone? Then Jailbreak it. This is everything you need to know to jailbreak your device and the security risks you may face. → Read More

What is the Difference Between Antivirus and Anti-malware?

Anti-malware software defends against new malware you may encounter while antivirus software scans for known viruses and searches for any known threats. → Read More

How to Hack TikTok Accounts

As TikTok has become a popular platform, it has also become an easy target for hackers. These are the 5 common vulnerabilities that can be used to hack TikTok. → Read More