cyber security

Cloud Security (Part 1): Passive Security Monitoring in RackSpace

This is Part 1 of our “Cloud Security” series, with a goal of setting up a simple passive security monitoring capability in the cloud. Future posts will show how to…

Learn More

BSidesCharm 2018

We had such a great time at BSidesCharm 2018 – so much so that I felt compelled to write about it.  Over the past couple years I have attended this…

Learn More

Host Based Risk Scoring (Part 1): How do you calculate Risk?

Hey all! This is the first post in a series about the concepts of a Host Based Risk Scoring System. This is an idea I had a few years ago,…

Learn More

How to Change Password in a Nested RDP Session

Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step.  Even though I…

Learn More

Luck isn’t a Cyber Security Strategy

Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today…

Learn More