Would my hypothetical Opsec setup with the goal of compartmentalizing sensitive areas from an insecure sandbox be sensible?

The root cause of my problem stems from the fact that I need to run untrustworthy software on a bare metal windows machine, which means that I can’t just have it in a VM because of major performance hits which make the software unusable.
A… Continue reading Would my hypothetical Opsec setup with the goal of compartmentalizing sensitive areas from an insecure sandbox be sensible?

Practice Safe SECs: Cyber intelligence experts on building safe operational security and information security practices

Two cybersecurity veterans from Authentic8 and Forrester share real-life stories from their tenures in public and private sector organizations.
The post Practice Safe SECs:
Cyber intelligence experts on building safe operational security and informatio… Continue reading Practice Safe SECs:
Cyber intelligence experts on building safe operational security and information security practices

The OPSEC of Protesting

For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony McDade, and others. Many of the protesters are posting, recording, and streaming live while demonstrating. T… Continue reading The OPSEC of Protesting

Why OPSEC Is For Everyone, Not Just For People With Something To Hide – Part III

In this final part of the series, I discuss why everyone should consider reviewing their OPSEC (Operations Security), not just those with something to hide. If you haven’t read the previous articles then please check them out first (Part I & … Continue reading Why OPSEC Is For Everyone, Not Just For People With Something To Hide – Part III