Comments
-
Great reads as usual.
-
I'm a Hexenbiest, your outlook is Grimm
-
Thank you. Sharing with my team.
-
DanielleH, could it be that TFTP server has received false accolades? Looks like the Real Time Netflow Analyzer should have won. Possible Steve Harvey moment?
-
If there isn't a report, it never happened.
-
The Spam video was great. I have done the same thing with unsolicited phone calls telling me my computer was infected. I had so much fun with the callers, that my wife has started doing it, If I chew up their clock cycles, that is fewer people they can call.
-
Got introduced to deep fried turkey in Ingleside, TX. Best ever.
-
Good article
-
As we inch forward towards our own version of a hybrid cloud solution, I am working feverishly to educate myself, with AWS training and certs. I am still wrapping my brain around the immensity of the project and how we are going to secure it. I completely agree with @"Jfrazier". Logging for audit purposes needs to exist to…
-
Always enjoy a new mission. Thank you.
-
Best answer so far.
-
Well written. I look forward to the follow on installments of this series.
-
or the Chunkin is the end result when the pumpkin lands? Great way to start a pumpkin patch.
-
I'm here wondering if, when, and how these devices will be migrated over to SIPRNET. Right now we don't have to worry too much about it, but I'm sure it's coming.
-
As I was reading this I picturing myself going off on management for wanting to implement it. Thank you for providing your experience.
-
I suppose that most of us are a cross between versatilist and specialist
-
Yes it is. Makes you wonder what the next tidal wave will look like.
-
Good read
-
Good reads. Especially the spear phishing link. I wonder what level of training their IT staff has?
-
c1ph3r_qu33n_3, good write up. Awareness is everything.
-
Looking forward to this thread. We are moving in the DEVOPS direction.
-
KITT was science fiction when Knight Rider aired. It would be closer to science fact now.
-
Some high level managers love the the hype surrounding shiny new objects. Then they expect us to secure it their shiny new object, which isn't always possible. Then they get to explain to their boss why they spent 6-7 figures on the new toy and it can't be used as advertised.
-
This is so true. Any system that is used for monitoring should be tailored to the site. In the Intrusion Analysis field, an untailored monitoring system(IDS,IPS,firewall, log server, SIEM) will have you chasing your tail endlessly. Tailoring your monitoring systems will allow you to see the grass through the weeds.
-
Well written piece. All of this advice could apply to life in general.
-
fudgit2016 we block ICMP as well. Only certain admin machines and SolarWinds can ping through the firewall and then only to the border router, no further.
-
Purchase for the team, not a single individual.
-
Just got done watching the YouTube version of Ending the Tyranny of Experience Security Tools. Awesomeness!! Ending the Tyranny of Expensive Security Tools - YouTube
-
Good read. Thank you.
-
Great read. Educating users always the first step.