Build And Run A SOC for Incident Response in Higher Education
How To Build And Run A SOC for Incident Response – A Collection Of Resources
How To Build And Run A SOC for Incident Response – A Collection Of Resources
Forbes provides some good guidance on protecting children from Identity Theft: Freezing your child’s credit file helps prevent criminals from opening new accounts in your… Read More »Protect Children from Identity Theft
The Phoenix Project by George Spafford, Kevin Behr, Gene Kim is a good read about IT management. The authors narrate the challenges an organization goes… Read More »4 Types of Work in IT
Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. Sun Tzu Additional Reading: Strategy vs. Tactics: What’s… Read More »Strategy vs. Tactics
dig is a command line tool developed by BIND for querying DNS nameservers. Aside from DNS lookups, dig can help diagnose other DNS problems as… Read More »Install dig on Windows
Unroll.me – is an interesting service that helps automate unsubscribing from mailing lists, but what caught my eye is their approach to describing data practices… Read More »Unroll.me