Comments
-
Working is a classified environment, we are exempt from wireless networking and the multitude of challenges that go with it.
-
Agreed that requirements are number one. Great job verbalizing my thought process when taking on a new project.
-
I really liked this post. I had not thought to use SED or AWK for SolarWind's logs, but why not? Time to dust these tools off and put them to work.
-
Oh yes, Know the Network, Be the Network on a T-shirt. That thought never occurred to me, seriously. Great idea silverbacksays
-
Great analogy. So we smile and press on.
-
As always, great reads. Thanks. Love the Apple store theft.
-
T'was fun! What's next?
-
Great write up. As a network security guy, my thoughts automatically turn to the dark side. Delta isn't the first airline in 2016 with a crippling outage and there are anti-capitalist groups out there that would love to take down an airline.
-
Good read. Thanks for posting.
-
Great for the home test bed.
-
More people in Austin? More reasons to own a good bike for commuting.
-
Love this. You can't identify abnormal, if you don't know what normal looks like. Also, get rid of the weeds. If the logs are showing a misconfigured server doing anything incorrectly, fix the problem! Get rid of the noise so you can see the grass through the weeds.
-
It has been proven that language does evolve over time. I think what we are seeing is a de-evolution of language. Cave paintings have been replaced by emotocons.
-
I did not make it the RSA conference, wrong coast. Thank you though for the threat intel link. It was a good read.
-
Love it!
-
Congratulations wthomashefsky
-
RTFM, Read the white paper, Read the tech forum, Read the security blog, Just read.
-
Absolutely right.
-
Awesome picture!
-
I want to believe that Microsoft is doing all of this for good. However, I strongly believe that there is no such thing as a white hat hacker. Data gathered can always be used for devious purposes. This has been proven time after time.
-
Excellent check list
-
Working on my CEH as well. Then I will attack the CISSP.
-
Yes, comments. Whether coding, scripting, or just writing a long ACL.
-
So true. Part of the problem is with management within the government. Far too many don't keep up with current technology and are more concerned with putting a check in a check box, than actually securing the network.
-
More "Food" for thought. Driverless tractor rolled out by Cache County robotics company | KSL.com
-
Love the holistic view. One must know the network, be the network, to successfully monitor the network.
-
The effort to be as stupid resistant as possible and still be functional.
-
Automate where possible. Automate the mundane and boring tasks, allowing you more time to innovate.
-
Not quite ready for this.