The Haves and the Have-Nots - Automation of Infosec
This was originally posted on blogger here. Several years ago, I blogged about Balkanizing the Internet. More than ever it appears that a digital feudalism is emerging. ...
read moreBy applying science to security we help our partners build their security programs based on facts rather than feelings. Follow our blog for the latest case studies and projects.
This was originally posted on blogger here. Several years ago, I blogged about Balkanizing the Internet. More than ever it appears that a digital feudalism is emerging. ...
read moreThis was originally posted on blogger here. Yesterday at the Nashville Analytics Summit I had the pleasure of demonstrating the strengths, weaknesses, similarities, and differences between Microsoft PowerBI, Tableau, and R. ...
read moreThis was originally posted on blogger here. MotivationAt bsidesNash, Chris Sanders gave a great talk on threat hunting. One of his recommendations was to try out an ELK (Elasticsearch, Logstash, Kibana) stack for searching for threats in log data. ...
read moreThis was originally posted on blogger here. In my post, How to Converse Better in Infosec, I laid out some rules for better infosec discussions. A key tenent of that blog post was asking questions. ...
read more