Blog Home
Welcome! All posts are original ideas, information I have found valuable, or items I taught myself over the years. I am mostly self educated and the blog articles reflect that.
In that same spirit, you should take everything you see on this site with a grain of salt and do your own due diligence.
Thanks for visiting.
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 |
28 | 29 | 30 |
Recent Posts:
-
Standards & Organizational Controls (SOC)
Brief Overview Standards and Organization Controls (SOC) is an information security framework designed to help companies stress test their information security controls and catch any deficiencies in a company’s security posture PRIOR to a government inspection or external third party audit. A SOC audit is an internal company audit primarily designed to provide the company…
-
Indicators of Compromise
Introduction Users, computers, and even entire networks can be all be compromised. Depending on the scenario, security analyst’s have to look out for different type of indicator’s of compromise (IOC). I discuss multiple scenarios below and give examples of what to be on the lookout for. If a compromise is suspected, you should collect basic…
-
Job Duties of a Security Analyst
Introduction An enterprise security operations center (SOC) analyst’s responsibilities are both wide and varied. Based on my personal experience, this is a list of duties working in the industry. If you have limited time or resources, you should consider focusing on reviewing log events. Monitor Security Systems Security systems should be continuously monitored to look…
-
Creating a Report for Senior Managers
Introduction Any employee could be called upon to write a report for senior staff. Senior managers are focused on profit and want a very brief overview of systems, people, projects under their responsibility. I recommend the report should be no more than two pages long and contain items of interest that can be shown as…
-
Export a KeePass Master Key File
To in increase security, you can require a KeePass to use both a key file and a password to open the database. This makes it technically, two factor authentication (2FA). Go to file > change Master password. Check the ‘Show expert options’ Enter a new master password. Check the key file box. Select Create. When…
-
How to Command Respect from Others
Here is some advice I saw online. I liked it so much, I am reproducing it here.