The Traffic Light Protocol (TLP) takes something that most people know and applies it to a new problem. In this case the simple concept of roadway traffic lights applied to information sharing. As defined by FIRST, an organization formed by cyber first responders; the Traffic Light Protocol is “a set of designations used to […]
Getting Virtually Started
OK. Once you’ve downloaded Ubuntu the next decision will be where to install it. My suggestion is go virtual. In the past I ran Linux on my work laptop and on my personal iMac; both using VMware Fusion. As of this writing I am running v8.5 and the current version for Mac is v10. The […]
Getting Jiggler with it….
One of the modern corporate technology problems I used to deal with almost every working day was the screen saver settings on my corporate laptop. The corporate security team has done an amazing job of locking my PC down and making it safe. The down side of that is that they control the screen saver […]
It all in the Cloud(s)
The Internet is changing yet again. One of my predictions for 2018 is that everyone will witness a migration from corporate or private data centers to the ‘Cloud’, or Internet hosted data centers. There have been tremendous advances made in both securing the Cloud and sharing with the broader technical community how to secure the […]
Best Practices for Fighting Botnets
From Engadget: “… the Department of Homeland Security and National Institute of Standards and Technology (NIST) published a request for information, inviting companies from internet and IT companies to contribute their ideas to a voluntary “code…