Blog
AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?
The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row. Having been rescheduled due to the Baltimore political climate in May, the event took place over three days from June 16-18 at the Convention Center in the heart of the city with an exceptional turn-out. The location,…
The Internet of Things: Securing an Interconnected World
For those of you who haven’t heard yet, the Internet of Things (IoT) is the enablement of any-to-any connectivity between a wide variety of sensors and devices. The first surge of connectivity was on the user end (homes and offices), allowing them to connect to their corporate HQ through a wired Internet connection. Then the…
BSides Charm City 2015 – The Power of Effective Communication
The scene on April 11th, 2015 at Howard Community College’s Gateway Building – Charles I. Ecker Business Training Center was packed with faded computer event t-shirts, beards, the occasional pirate hat, yet some of the most successful people in the information security industry were in attendance.
How to Change Password in a Nested RDP Session
Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step. Even though I don’t have an ideal tool for this task, I will show you how to rotate the local admin password on one of our servers. So,…
Luck isn’t a Cyber Security Strategy
Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today might be a good day to ask yourself this question: Are you relying on the luck of the Irish to keep your organization safe from…
- « Previous
- 1
- 2
- 3
- 4