Joe Gray’s OSINT: Missing Persons Training 09/15/2020
I had the pleasure of attending an Open Source Intelligence (OSINT) class offered by Joe Gray @C_3PJOE. The six-hour training was a hands-on primer to a fascinating part of the information security field and forensics. This is my review.
This document is a follow-up to a question I asked the LinkedIn security community. The question was, “You’re a small business owner (Think Restaurant, small accounting firm). You have $10K (which is still a lot for many of them...) to spend yearly on cyber security. How would you spend it?” This is the link to the original post.
Over 150 security experts replied! This document is a summary of their recommendations and provides a simple explanation of what needs to be done and why. The target audience is small business owners. This is not a “Do-It-Yourself” document, but rather a guide to help you hire the right security expert, what to ask for, and what to expect while keeping things under budget.
O365 Survival Kit by Eric English 07/22/2019
There are many occurrences of O365 being compromised in small businesses. There are things that should be done before a breach to help with security, like turning on MFA. However, responding to an O365 breach can be stressful. Member Eric English put together this guide to help kick an attacker off and regain control of the environment.
TruYou? No thank you. 09/23/2018
Society is growing tired of keeping up with many username and password combinations. A single ID which allows you into all your accounts is a dream for many and the basis of a movie called The Circle (2017). Is a single ID good and what effects might it have on privacy?
Getting off The Grid 09/23/2018
I appreciate a rainy weekend; it gives me a chance to sit on the couch and watch Netflix. This past weekend, I re-watched an old movie called Enemy of the State starring Will Smith. I could not believe it had been almost twenty years since it came out in 1998.
Have you been Pwned? 09/23/2018
“Pwn” is an internet slang term which means “to own” or “to dominate”. Your teenage kids most likely know this because it is used extensively in multiplayer video games. If you get “pwned”, you have been defeated in a particularly boastful way.