Comments
-
Man, what a party.
-
Gilligan's Island
-
Very well written sqlrockstar. All good points. Sometimes we need a refresher.
-
Good way of looking at it.
-
Thank you for a well written article.
-
Instead of a bar graph, perhaps it should be a circle. Adding a lessons learned in the process.
-
As a retired sailor, USN 1982-2002, I would still put to sea with Quint before even entertaining the though of putting to sea with Morgan.
-
Congrats idaman22
-
Nice read. Think I will stay with my Surly Long Haul Trucker.
-
I see people, process, and technology in the same way I look at the CIA triad for network security. It's all about balance.
-
I have to agree with tcbene on this. The only thing I have to add is the difference between a Generalist and a Versatiist. A Generalist has a skill set that has kept them afloat for a while. They may not really enjoy what we do and so they have no interest in learning any more. They are satisfied with where they are. A…
-
Great reads as usual.
-
Always an adventure. That's why I am here.
-
I have to agree. Stick with the standard content for an ICMP packet. Tregg
-
Good write up. Food for thought
-
The only problem I see is learning new things. Why would you want to do that?
-
Knowledge is power.
-
"How does someone breach a network an leave with 2.5Tb of data?" There are any number methods that can be used to breach the network. Once inside, the tool calls home on HTTPS. Most firewalls allow all outbound 443. If you keep your exfilltration below IDS alert levels, you can slow stream data for months.
-
Not a commodity, just a tool.
-
Prescreened during the technical interview.
-
Totally on board with hacking the John Deere tractors. Having grown up in rural Western Iowa, I still have many friends and family, living and working on the farm. A farmer has to be as independent as possible. Locking down the ability to repair your farm equipment is bad business. There are several other farm implement…
-
Yes! Always worth the time to tune in and participate!
-
Ensure that the backups are not mapped. If connected to the network, protect with ACL's and authentication.
-
Wish we had ASA's
-
The government contract I support just changed hands to a new contracting company. My new title has nothing to do with what I actually do.
-
Our IoT strategy - not allowed, not even cell phones manage - 0 I guess the rest of these questions are moot. I work as a defense contractor for the US Air Force, maintaining security on a classified network.
-
I think these people are opening themselves to a potential lawsuit. Just sleazy.
-
I know my curriculum had a whole semester on cyber law. We covered privacy, PPI, and the ethics of securing other peoples data.
-
DREN and SDREN always seemed to be cutting edge. Maybe why other .mil networks are afraid of them.
-
We have multiple DEV environments. Two are on a stand alone network with no firewalls or ACL's. I love it when admins from our Windows team or Linux\Solaris team come tell me that they think the firewall is blocking their traffic on that network.