Posted in INFOSEC

Reports & Testimony related to Equifax & Marriott Data Breaches

I have added a few pages to archive documents related to large breaches from 2018. You can find links in…

Continue Reading...
Posted in INFOSEC

Threat Hunting Using Newly Registered Domain Lists – Part 1

Author’s Note: This article was inspired by a blog posting over at the SANS Storm Center Infosec Forums. The article,…

Continue Reading...
Posted in INFOSEC

Helpful Splunk Search for Office 365

This is going to be a quick post about using Splunk to look for anomalous activity in your O365 instance….

Continue Reading...
Posted in INFOSEC

Passwords & Data Breaches

Some friends that turn to me for information security advise recently asked my thoughts on the recent announcement of the…

Continue Reading...
Posted in INFOSEC

Going Paperless: Where Paper Meets Bits and Bytes

A client consulted me about going to a paperless environment. His company utilizes several different forms and numerous other documents…

Continue Reading...
Posted in INFOSEC

Logging User Activities within Linux with bash scripts

I am just starting to learn the power of bash scripting. So, this script below may not be the best…

Continue Reading...
Posted in INFOSEC

pam_tally2 Authentication issues

The other day I was trying to log in with a newly created user in CentOS Linux with the The…

Continue Reading...
Posted in INFOSEC

Corporate Data Leakage in the “Clouds”

Folks, I am a bit sick of hearing “cloud” used as the latest buzzword to describe anything from a simple…

Continue Reading...
Posted in INFOSEC

Security Short: Wireless ENCRYPTION…..ENCRYPTION!

Admin Note: This post is in response to a recent posting I made regarding Google’s wireless collection activities. This “Security…

Continue Reading...
Posted in INFOSEC

Security Short: OPSEC for the home

Enterprises develop policies for protecting all kinds of assets, both physical and virtual. Some of these policies cover Operations Security…

Continue Reading...