we can suffer by trying to resist the weakness and change ourselves. - 吉田 松陽
What do I do?
I’m an Information Security Professional and Cybersecurity Specialist with years of experience in Ethical Hacking, Red Teaming, Cloud Security and GRC (Governance, Risk & Compliance). This blog contains my views, thoughts and tutorials on different topics about InfoSec, IT/OT, Cloud and of course, to Rethink Security in general.
Business & Contact
For details about my daily rates and scope of service, please contact me via (encrypted) email: email@example.com
If you whish to use email encryption, you can use the following GPG key:
pub rsa4096 2021-03-11 [SC] [expires: 2024-03-10] 5EF49B59E579CB3FD33779ACBED7977009FBA18E uid Ioannis Gkourgkoutas <firstname.lastname@example.org> sub rsa4096 2021-03-11 [E] [expires: 2024-03-10]
You can also use the following shell command to download the key:
gpg --recv-keys 0x09FBA18E