Drop us a line and you’ll discover one other key differentiator: Our follow through.

11 + 3 =

Contact Info

Insights

Hey #Cyber Friends, make sure to follow this thread as I highlight @mcohmi as part of the #ShareTheMicInCyber campaign. I am proud to give this talented #cybersecurity practitioner the spotlight. #BlackNatSec #BlackTechTwitter

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]

Insights

Hey #Cyber Friends, make sure to follow this thread as I highlight @mcohmi as part of the #ShareTheMicInCyber campaign. I am proud to give this talented #cybersecurity practitioner the spotlight. #BlackNatSec #BlackTechTwitter

Hey #Cyber Friends, make sure to follow this thread as I highlight @mcohmi as part of the #ShareTheMicInCyber campaign. I am proud to give this talented #cybersecurity practitioner the spotlight. #BlackNatSec #BlackTechTwitter

Press Releases

Setting Up Your Company For Government Contracting

Setting Up Your Company For Government Contracting

I wanted to share some information with folks because I get asked a lot about how I set up my company to be able to bid on US government contracts. So I figured it was worth spending the time to put down some thoughts and links on how to go about it (based on my own...

read more
CISCO 802.1Q KING | Build and Secure Switchport Trunks

CISCO 802.1Q KING | Build and Secure Switchport Trunks

Today’s topic was requested on Twitter, to talk a little bit about how to build Cisco switchport trunks and specifically how to improve their security configurations. We're going to take a look at how to configure them, what are some security best practices, and Layer...

read more
Exorcise Your IPv6 Demons | IPv6 Subnetting, VLSM, CIDR

Exorcise Your IPv6 Demons | IPv6 Subnetting, VLSM, CIDR

We're going to be talking about something that strikes fear into the heart of both seasoned and new IT folks alike: IPv6. While IPv6 is new to a lot of folks, this blog's purpose is to walk you through step by step some high-level points, and show you how it's really...

read more
Learn to Subnet by Visualizing Networks Like Tetris

Learn to Subnet by Visualizing Networks Like Tetris

One thing I've noticed in the Infosec/Cyber community (and in the IT community as well, if we're being completely honest) is a little bit of fear over truly understanding how to subnet. There are many methods out there and some of them work for some people, but...

read more
Network Knowledge: #30DaysofJuniper Part 1

Network Knowledge: #30DaysofJuniper Part 1

Today’s blog post is the first part of our #30DaysofJuniper information sharing campaign. For the past month, we have been posting daily tips on Juniper configurations to help novice and experienced engineers alike. This is our second campaign like this, as we...

read more
Screen Crab: The Favorite Tool of Bothan Spies

Screen Crab: The Favorite Tool of Bothan Spies

This is our second review article of the Hak5 pentesting tools. After previously covering the Shark Jack, today we will be focusing on the Screen Crab. Hak5 bills the Screen Crab as a "stealthy video man-in-the-middle implant." It sits inline between an end device and...

read more

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]