Drop us a line and you’ll discover one other key differentiator: Our follow through.
Insights
Network🛜 and Cloud☁️ Bundle!
Been a minute...but I'm giving away 4 Bundles including 14 Books covering Linux, network automation, @PaloAltoNtwks , @WiresharkNews, @googlecloud and @Azure Networking, and a lot more!
To Win:
🗣️ Comment below saying why you want it
🔁 Repost this…
Check out this video I did a while back where I broke down NIST 800-53 from my perspective and how it is applicable to engineers.
Had the opportunity to go chat with some college/high school students interning at @blu3cloak!
Hey @bdawgjay, notice these cyber knife hands 😂
Title
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.
Insights
Network🛜 and Cloud☁️ Bundle!
Been a minute...but I'm giving away 4 Bundles including 14 Books covering Linux, network automation, @PaloAltoNtwks , @WiresharkNews, @googlecloud and @Azure Networking, and a lot more!
To Win:
🗣️ Comment below saying why you want it
🔁 Repost this…
Check out this video I did a while back where I broke down NIST 800-53 from my perspective and how it is applicable to engineers.
Had the opportunity to go chat with some college/high school students interning at @blu3cloak!
Hey @bdawgjay, notice these cyber knife hands 😂
Network🛜 and Cloud☁️ Bundle!
Been a minute...but I'm giving away 4 Bundles including 14 Books covering Linux, network automation, @PaloAltoNtwks , @WiresharkNews, @googlecloud and @Azure Networking, and a lot more!
To Win:
🗣️ Comment below saying why you want it
🔁 Repost this…
Check out this video I did a while back where I broke down NIST 800-53 from my perspective and how it is applicable to engineers.
Had the opportunity to go chat with some college/high school students interning at @blu3cloak!
Hey @bdawgjay, notice these cyber knife hands 😂
Press Releases
Network Knowledge: #30DaysofCisco Part 1
Nov 25, 2019
Today's blog post is in a different format than our normal articles. This past month, there has been as a great information sharing campaign on Twitter that was created by Arielle Hale (@WhutTheHale) called #30DaysofThreads. The purpose of this campaign is to get...
Network Security Basics: Access Control Lists
Oct 30, 2019
So far we've covered two basic tenets to network security: documentation and network segmentation and isolation. Network access control layers nicely on top of those. You are taking the defined data flows (what devices are allowed to communicate over specific ports...
Network Security Basics: Network Segmentation & Isolation
Sep 11, 2019
When it comes to building and securing a network, the most impactful thing that can be done is planning your network design in an efficient and protective manner. Understanding and implementing a segmented and layered architecture will establish a clear precedent for...
Network Security Basics: Documentation
Aug 27, 2019
The foundation of good network security is understanding what makes up your environment, where it's located, what it does, and why it's there. In essence, the Five W's (Who, What, When, Where, and Why) play a critical role in understanding and safeguarding your...
Network Security Basics: Intro to the Fab Five
Jul 23, 2019
This is the first of a six-part series discussing five basic network security principles (The Fab Five) that when implemented properly can significantly improve the security posture of any IT environment. The reality is, no matter how simple something is, it doesn't...
My Favorite SIEM That Is Not a SIEM
Jun 25, 2019
The purpose of this article is to go into depth a bit on Tenable's Log Correlation Engine (LCE) and how to utilize it with Security Center to be the focal point of monitoring events in your environment. I'm a big fan (and user) of the Tenable suite of products, and...
Don’t FEX Too Hard, You Might Hurt Yourself
Jun 16, 2019
A staple offering within Cisco's device portfolio is their Fabric Extender (FEX) Technology. In essence, it allows you to do a few very cool things: 1.Minimize the number of switches you need to manage. FEX devices connect to upstream Nexus switches (5/6/7/9K's) and...
The Essentials of Nessus Essentials
Jun 11, 2019
When it comes to vulnerability and compliance scanning, Tenable has established themselves as the king of the hill. With their Nessus vulnerability scanner, you can automate and report on the security health of most devices in your environment. Recently, Tenable...
Real World Lessons From The Cuckoo’s Egg
Jun 4, 2019
Those of us in the IT industry are very familiar with the terms honeypots, digital forensics, and hackers. Even the general public has heard the terms given the global coverage on identity theft, election hacking, and rampant ransomware attacks in recent years. Back...
Ten Things You Should Be Monitoring in Your IT Environment
May 20, 2019
Monitoring your IT environment can be a daunting task, especially depending on your current security posture, the resources you have available to you (tools, people, and knowledge), and the scope of the environment (single site, multi-site, on-premise, cloud, hybrid,...
Title
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.
Title
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.