Looking at the phishing email I received the other day telling me that my PayPal account had been suspended the next step in my investigation is to determine how it reached my inbox. There are many good resources available that describe manual email header analysis. To start out take a look at this article at […]
Category: cybersecurity
Summer Reading 101 – The Blue Team Field Manual
I read all the time. I admit that I read less now that I found and use Audible the Amazon audio book service). While Audible is great the books I chose to read (or re-read) this summer are probably not available there. I recently re-read the Blue Team Field Manual (BTFM) and read the Red […]
Using Biometrics to Replace Passwords
I was recently asked this question about biometrics replacing passwords… I’m working on a project right now where my team wants to substitute passwords and usernames for biometric authentication. I have expressed my multiple concerns for the security of such a system, but the idea has now come up that we could use a system […]
Understanding the Traffic Light Protocol (TLP)
The Traffic Light Protocol (TLP) takes something that most people know and applies it to a new problem. In this case the simple concept of roadway traffic lights applied to information sharing. As defined by FIRST, an organization formed by cyber first responders; the Traffic Light Protocol is “a set of designations used to […]
Getting Jiggler with it….
One of the modern corporate technology problems I used to deal with almost every working day was the screen saver settings on my corporate laptop. The corporate security team has done an amazing job of locking my PC down and making it safe. The down side of that is that they control the screen saver […]