Comments
-
Once again, a very good read.
-
The thoughts of monitoring systems I have no control over makes me lose sleep at night. Thanks for the write up.
-
Management indecision.
-
Fortunately, I do the technical portion of the interviews for my team. I get to choose. Wonder if I have scared any away?
-
Let's not forget the obvious agenda pushed by different network "news" programs. Both on the left and right. News not based on fact, but on personal opinion.
-
Selected what should have been the obvious answer, and it was wrong! Really?
-
OK. Come check out my week 3 entry. Feel free to comment.
-
Defining responsibilities can be a real challenge. The roles of network/Windows/Linux shops get modified in the virtual environment. Understanding how these conventional shops get merged is critical. So is learning to work together and cross training each other.
-
The fighter jet story was on my AF base, Langley.
-
Thank you for doing this again. It really brought out the inner poet in me last year. Now to create a theme to write to.
-
The shirt rocks, my wife has already laid claim to it.
-
Done did it.
-
I thoroughly enjoy the show. While watching most "Hollywood hacking", I will get irritated by the lack of feasibility, and then I voice my opinion which ruins the show for my wife. The "Hollywood hacking" in Mr. Robot is feasible and the story line is great. Kudos!!
-
Splunk is an awesome tool, but I never would have thought of using it in a manufacturing process. Makes sense.
-
Looks like I am in the Win zone. Even better, I work close enough to home that I can commute by bike most days.
-
I was only able to select one answer for question 13. Not complaining, but I do use all four of the possible answers. I think most security folks use every data source they can.
-
The Miria IoT botnet wasn't developed from devices sitting behind strong, well defended networks. These devices were primarily on home and small office networks that are no better defended than the average front yard. At least your home has locks and you know how to use them. Most home users have no idea how to secure…
-
It is interesting to see how things have come full circle. When I started in this field, I was part of THE IT shop. We were responsible for everything. Windows Servers, Unix Servers, Desk tops, routers and switches, cable plant, databases, firewalls, etc. Then we all went into some kind of specialization over the years. I…
-
Add a label to make a sale. Used to play buzz word bingo during during long sales presentations.
-
Kirk is the odds on favorite to win it all.
-
Good read.
-
Good Read.
-
Hopefully, this admin is prosecuted to the fullest extent of the law.
-
I have to agree with syldra. I don't see the value of the hubris cloud. We are 100% in house and that won't change anytime soon.
-
I am really enjoying this challenge Just a single verse per day, Just need to stay focused to ensure I do not stray.
-
Can we get a reset for day 11? Answered the question. Yet day 11 still shows unanswered.
-
Thank you. Amazing lady.
-
Why do Network Engineers end up with security certifications? From my perspective, there is a natural progression that takes place. I am a Computer Network Defense (CND) Engineer. I guess the new term is Cyber Security Engineer now. I started out working on desktop computers in the late 80’s. (Actually, if you go far…
-
I have to agree with CourtesyIT. Everywhere I have worked, there is no sense of urgency. Security is still treated like the red headed step child. We go through the motions, put checks in check boxes, and pat ourselves on the back telling each other that we are doing a good job. After through the motions for so long, even…
-
Compliance starts with people, every time. However, let's not confuse compliance with security. One can be compliant without being secure.