cyber security
Cloud Security (Part 1): Passive Security Monitoring in RackSpace
This is Part 1 of our “Cloud Security” series, with a goal of setting up a simple passive security monitoring capability in the cloud. Future posts will show how to…
BSidesCharm 2018
We had such a great time at BSidesCharm 2018 – so much so that I felt compelled to write about it. Over the past couple years I have attended this…
Host Based Risk Scoring (Part 1): How do you calculate Risk?
Hey all! This is the first post in a series about the concepts of a Host Based Risk Scoring System. This is an idea I had a few years ago,…
How to Change Password in a Nested RDP Session
Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step. Even though I…
Luck isn’t a Cyber Security Strategy
Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today…