CISO Periodic Table
Optiv’s done a great job trying to illustrate the various security posture concerns a typical CISO and their team has to watch for today. An… Read More »CISO Periodic Table
Optiv’s done a great job trying to illustrate the various security posture concerns a typical CISO and their team has to watch for today. An… Read More »CISO Periodic Table
Pi-Hole is a network wide DNS sinkhole that can be setup on multiple software/hardware configurations. Originally, I was going down the path of setting up… Read More »Setup Pi-Hole in Azure
An excellent definition of privacy in the context of autonomy and security: Autonomy Privacy is an individual’s ability to conduct activities without concern of or actual… Read More »Privacy Definition
CSC 1: Inventory of Authorized and Unauthorized Devices CSC 2: Inventory of Authorized and Unauthorized Software CSC 3: Secure Configurations for Hardware and Software on… Read More »Critical Security Controls
At the D: All Things Digital conference Microsoft will unveil a new product called Microsoft Surface. According to the press release, Microsoft Surface turns an… Read More »Microsoft Surface
Microsoft’s Zune is supposed to be launching in the next few days. Infact, the official Zune site just launched earlier today. Although, I can’t afford… Read More »Zune Advertising