Blog Home

Welcome! All posts are original ideas, information I have found valuable, or items I taught myself over the years. I am mostly self educated and the blog articles reflect that.

In that same spirit, you should take everything you see on this site with a grain of salt and do your own due diligence.

Thanks for visiting.

September 2025
S M T W T F S
 123456
78910111213
14151617181920
21222324252627
282930  

Recent Posts:

  • Standards & Organizational Controls (SOC)

    Standards & Organizational Controls (SOC)

    Brief Overview Standards and Organization Controls (SOC) is an information security framework designed to help companies stress test their information security controls and catch any deficiencies in a company’s security posture PRIOR to a government inspection or external third party audit. A SOC audit is an internal company audit primarily designed to provide the company…

    Read More

  • Indicators of Compromise

    Indicators of Compromise

    Introduction Users, computers, and even entire networks can be all be compromised. Depending on the scenario, security analyst’s have to look out for different type of indicator’s of compromise (IOC). I discuss multiple scenarios below and give examples of what to be on the lookout for. If a compromise is suspected, you should collect basic…

    Read More

  • Job Duties of a Security Analyst

    Job Duties of a Security Analyst

    Introduction An enterprise security operations center (SOC) analyst’s responsibilities are both wide and varied. Based on my personal experience, this is a list of duties working in the industry. If you have limited time or resources, you should consider focusing on reviewing log events. Monitor Security Systems Security systems should be continuously monitored to look…

    Read More

  • Creating a Report for Senior Managers

    Creating a Report for Senior Managers

    Introduction Any employee could be called upon to write a report for senior staff. Senior managers are focused on profit and want a very brief overview of systems, people, projects under their responsibility. I recommend the report should be no more than two pages long and contain items of interest that can be shown as…

    Read More

  • Export a KeePass Master Key File

    Export a KeePass Master Key File

    To in increase security, you can require a KeePass to use both a key file and a password to open the database. This makes it technically, two factor authentication (2FA). Go to file > change Master password. Check the ‘Show expert options’ Enter a new master password. Check the key file box. Select Create. When…

    Read More

  • How to Command Respect from Others

    Here is some advice I saw online. I liked it so much, I am reproducing it here.

    Read More