by John Breth | Jul 1, 2020 | Cybersecurity, IT Engineering, IT Operations
Today’s topic was requested on Twitter, to talk a little bit about how to build Cisco switchport trunks and specifically how to improve their security configurations. We’re going to take a look at how to configure them, what are some security best practices, and...
by John Breth | Jan 20, 2020 | Cybersecurity, InfoSec, IT Engineering
This is our second review article of the Hak5 pentesting tools. After previously covering the Shark Jack, today we will be focusing on the Screen Crab. Hak5 bills the Screen Crab as a “stealthy video man-in-the-middle implant.” It sits inline between an...
by John Breth | Jun 4, 2019 | Cybersecurity, InfoSec
Those of us in the IT industry are very familiar with the terms honeypots, digital forensics, and hackers. Even the general public has heard the terms given the global coverage on identity theft, election hacking, and rampant ransomware attacks in recent years. Back...