standard

Defensive Cyber Operations: Ground Zeroes

In an era plagued by thieves, criminals, and script kiddies, the need for securing information has increased exponentially. The market is teeming with products that are advertised to adequately secure your systems, data stores, sensitive information, etc. independently or in tandem with a bevy of other products. In the modern business world, global, interconnected networks pose a need for secure operations platforms and vehicles (confidentiality, integrity, availability).  Absence of these crucial platforms and vehicles could have a significantly adverse impact on an organization, especially as the world becomes more reliant on these networks to perform their intended functions. Systems administrators, programmers, security analysts, computer scientists, etc. are integral to preserving the functionality, efficiency, and security of these networks, as is constant maintenance and monitoring.

// read more

standard

AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?

The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row.  Having been rescheduled due to the Baltimore political climate in May, the event took place over three days from June 16-18 at the Convention Center in the heart of the city with an exceptional turn-out.  The location, a facility of immense capacity surrounded on all sides by lively intersections and corporate offices was wholly appropriate, symbolizing the collaboration of our vast government and the bustling, innovative industry that encompasses it; a partnership crucial to ensuring effective solutions to operate, secure, and defend our networks.

// read more

standard

BSides Charm City 2015 – The Power of Effective Communication

The scene on April 11th, 2015 at Howard Community College’s Gateway Building – Charles I. Ecker Business Training Center was packed with faded computer event t-shirts, beards, the occasional pirate hat, yet some of the most successful people in the information security industry were in attendance.

// read more

standard

How-To: Change Password in a Nested RDP Session

Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step.  Even though I don’t have an ideal tool for this task, I will show you how to rotate the local admin password on one of our servers.  So, let’s log in and change it:

// read more

standard

Luck isn’t a Cyber Security Strategy

Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today might be a good day to ask yourself this question: Are you relying on the luck of the Irish to keep your organization safe from cyber-attacks?

// read more