defense Build a Free Private Mesh Network for Secure DevOps Move away from hub-and-spoke VPN servers for DevOps over distributed networks. Use a free, secure P2P mesh network instead!
forensics Auditing GSuite Login Activity An analysis tool that enhances the Login Activity reports made available by the GSuite Admin console by adding and plotting geographic data.
web #JOLT Hackathon 2017 I recently had the great opportunity to participate in the annual #JOLT Hackathon held by the Venture Center in Little Rock, Arkansas. Our team, /dev/null, was even fortunate enough to place 1st
web When Browser Extensions Go Rogue So it's a random Wednesday night and I'm studying for my GIAC GCFE exam (which I just passed recently, woohoo!) and I take a quick break to read a news article or two.
defense Slacking at Security Operations Header image: Telenor SOC, Jan 19 2016 Running a Security Operations Center requires fighting a constant battle to increase analyst efficiency, speed and accuracy. Fast and effective communication coupled with automation is the
macro Macro Security for Enterprise Defenders In my experience, one of those most prevalent and common threats to today’s enterprise networks comes in the form of malicious email attachments (shocker!). Attackers leverage document types that are most likely