Comments
-
Congrats nystateofmind
-
Let's do this
-
We use vulnerability scanning as one tool in the vulnerability management toolbox.
-
I have seen both sides of this. While active duty Navy, all of our system administrators were self taught and self certified. As the senior NCO, it was my duty to give my guys "the talk" about the benefits of staying in and making the Navy a career. That was an impossible task considering they could make much more on the…
-
Always keep an eye on your network traffic. Establish a base line so you know what is normal.
-
Well said.
-
Still trying to wrap my brain around 773 million email addresses.
-
Thank you for that explanation. I work in the government sector and don't get to see this implemented, except from a consumer view point.
-
Well said
-
Good write up. NPM has helped us move forward as far as communications between teams. One member of our network admin team acts as the "salesman" for the other teams so we can all be on one page.
-
The story about the GOP delegates was great.
-
Looking forward to seeing the notes.
-
Very helpful
-
Looks like Hans Solo and Captain America. Best guess.
-
Because there's no place like home?
-
Your are so right, physical security is the easiest to implement and yet often overlooked.
-
Some good write ups.
-
Good information.
-
Thank you. Loved the Star Wars lip sync
-
Ultimately it comes down the cost of protecting your environment, or the cost of not protecting it. How much is your data worth? Can your company survive a breech and loss of data? Those are the questions that should be presented to management.
-
Enjoyed the quiz, we could use more of them.
-
It's always good to have a known good traffic flow baseline. Understand though that a baseline isn't static. There will be identifiable trends or changes, like the current flow in a river affected by the tides. Understanding these ebbs and flows will go a long way towards identifying anomalies.
-
Thank you for the series.
-
It's all about balance.
-
More recalls?
-
Well worth the read.
-
I agree with RT. This is going to be a blast! Each member of the Thwackman crew will be rocking all three. Plus the cryptograms and secret decoder ring could live on forever! 2 8 12 12 28 8 3 5 27 8 7 25 8 3 9 10 1
-
I really enjoyed the article about how the Secret Service "hacks" phones.
-
So, is an IT Seagull anything like the Good Idea Fairy?
-
Making up for a lack somewhere else?