Comments
-
I missed large portions this year. Looking forward to watching what I missed from the archives.
-
Emergency username and password are kept in a sealed envelope, and locked in a safe.
-
All right, what the heck. Answered correctly, Lenovo Legion 5 17.3" FHD gaming laptop computer, and it says I got it wrong by answering puppies. What gives?
-
Best to test on a few before full deployment. I know this isn't always possible, but good practice if you can.
-
As for the DARPA challenge, we have been battling over crowding of the electromagnetic spectrum for a long time. This research sounds promising. There has always been overlap, but that isn't always a bad thing. In the mid eighties, during my Navy days, we would sit off the coast of San Diego doing training operations. We…
-
My biggest beef most places I have been, is logs. We all keep them, but how often do we review them? I tend to be the only person who actually looks at the logs on a daily basis. Many of the most current breeches could have been much less disastrous if the logs had only been reviewed on a regular (Daily) basis.
-
Perhaps I should send my resume to Rudy Giuliani. Sounds like he could use the help.
-
When do we sign up.
-
Great visual on the Mississippi watershed.
-
awesomeness!
-
Good read. We don't use VTC in my current command since the base infrastructure team handles that. At my previous command, we used a series of gatekeepers for VTC and VOIP.
-
Ah yes, the good old days. If I remember correctly, there was less for me to know back then.
-
Don't forget those lunches.
-
The problem with certain types of licensing is connectivity to the internet. In the government, we maintain networks with different levels of classification. You can't connect to a license server that resides on the internet, with a firewall that resides on a Secret network. Sneakernet only.
-
In the planning process for two storage upgrades. Hopefully making the jump to SSD sooner rather than later.
-
Good read
-
Before any tools are purchased, requirements need to be defined. Prioritize those things of greatest need and focus your research based on those needs. If money is tight, be sure to take a look at open source tools.
-
Email for most alerts
-
Thank you adatole for this write up. Fortunately I can't bring my phone in to work. (Classified building) I have started leaving my phone in the bedroom when I get home in the evening. If I have it with me while reading or chatting with my wife, I will pick it up every few minutes. Nothing in my life is more important…
-
These six steps could apply across the board, anywhere in our field.
-
We're still getting points for posting here?
-
Having an accurate time source is critical if you want to use a SIEM for correlation. NTP is also a must if your logs are going to be used forensically in a court of law.
-
Nothing at all.
-
I am going to have to dig in deeper into Deep Clousd Monitoring. We are headed in that direction and of course, security is an after thought.
-
For some systems we use a centrally located YUM server. Other systems are vendor driven, firewall LINUX kernal, are updated manually.
-
I would relax the password policy. Every 60 days is a bit much.
-
Useful writeup.
-
Gave it a look. Maybe he doesn't like the NFL's product placement policy. Free Surface tablets looks like some really cheap advertising to me.
-
Well written. Thank you for the insight.
-
Cool beans