Blog

AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?

The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row.  Having been rescheduled due to the Baltimore political climate in May, the event took place over three days from June 16-18 at the Convention Center in the heart of the city with an exceptional turn-out.  The location,…

Read More...

The Internet of Things: Securing an Interconnected World

For those of you who haven’t heard yet, the Internet of Things (IoT) is the enablement of any-to-any connectivity between a wide variety of sensors and devices. The first surge of connectivity was on the user end (homes and offices), allowing them to connect to their corporate HQ through a wired Internet connection. Then the…

Read More...

BSides Charm City 2015 – The Power of Effective Communication

The scene on April 11th, 2015 at Howard Community College’s Gateway Building – Charles I. Ecker Business Training Center was packed with faded computer event t-shirts, beards, the occasional pirate hat, yet some of the most successful people in the information security industry were in attendance.

Read More...

How to Change Password in a Nested RDP Session

Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step.  Even though I don’t have an ideal tool for this task, I will show you how to rotate the local admin password on one of our servers.  So,…

Read More...

Luck isn’t a Cyber Security Strategy

Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today might be a good day to ask yourself this question: Are you relying on the luck of the Irish to keep your organization safe from…

Read More...