The world awaits...

mitigation (4)

Thinking about Secure Computing

What do you think about when you hear "secure computing"? You could think about access controls (username/password, two factor authentication, etc), encryption (of data at rest, data in transit), air-gapped networks, physical security of the…

Continue reading...

Returning Online

After a wonderful time hiking through Lassen Volcanic Park, coming back online is an overwhelming experience. Some themed photo sets from the trip are available: Everyone saw the pictures of an orange/red sky over San…

Continue reading...

Threats! Everywhere!

Out of curiosity, I enabled all of the threat detection and reporting systems on my home firewall. As it turns out, the home network is under siege. The firewall is configured to report, but not…

Continue reading...

My Approach to Dark Web Investigations

anonymous woman on stairs at computer

After numerous presentations and trainings on darknet investigations, here's my advice and approach. This is just how I've evolved to do them over the past decade. Your process and results may vary. I'm interested in…

Continue reading...