by John Breth | Dec 31, 2019 | Cybersecurity, InfoSec, IT Engineering
This past Black Friday, I went on a bit of a hacking tools shopping spree at Hak5. Today, I’m going to give a brief rundown of their Linux based network attack tool call Shark Jack (and why it’s similar to Baby Yoda). Shark Jack is to be used in...
by John Breth | Nov 25, 2019 | Cybersecurity, InfoSec, IT Engineering, IT Operations
Today’s blog post is in a different format than our normal articles. This past month, there has been as a great information sharing campaign on Twitter that was created by Arielle Hale (@WhutTheHale) called #30DaysofThreads. The purpose of this campaign is to...
by John Breth | Oct 30, 2019 | Cybersecurity, IT Engineering, IT Operations
So far we’ve covered two basic tenets to network security: documentation and network segmentation and isolation. Network access control layers nicely on top of those. You are taking the defined data flows (what devices are allowed to communicate over specific...
by John Breth | Sep 11, 2019 | Cybersecurity, IT Engineering, IT Operations
When it comes to building and securing a network, the most impactful thing that can be done is planning your network design in an efficient and protective manner. Understanding and implementing a segmented and layered architecture will establish a clear precedent for...
by John Breth | Jul 23, 2019 | Cybersecurity, InfoSec, IT Engineering
This is the first of a six-part series discussing five basic network security principles (The Fab Five) that when implemented properly can significantly improve the security posture of any IT environment. The reality is, no matter how simple something is, it...
by John Breth | Jun 25, 2019 | Cybersecurity, InfoSec, IT Operations
The purpose of this article is to go into depth a bit on Tenable’s Log Correlation Engine (LCE) and how to utilize it with Security Center to be the focal point of monitoring events in your environment. I’m a big fan (and user) of the Tenable suite of...