Build Your Own Tools For More Power

Building something on your own usually carries with it certain benefits, such as being in full control over what it is you are building and what it will accomplish, as well as a sense of pride when you create something that finally works just the way you want it. If …read more

Continue reading Build Your Own Tools For More Power

A Guide to Finding a Trusted MSSP

MSSPs can be essential in helping organizations complete their security posture. Here’s what to look for. Enterprises often lack the internal resources to do security right, especially considering tasks and responsibilities are ever-expanding. I… Continue reading A Guide to Finding a Trusted MSSP

Tools, You Can’t take Them With You

When I die I hope be buried in the English rural churchyard that has been my responsibility as churchwarden, after a funeral service that has been a celebration of my life. I am neither an Egyptian pharaoh nor a Viking queen though, so my grave will not contain all my …read more

Continue reading Tools, You Can’t take Them With You

Top 10 Uses of Wireshark for Hackers Part II

In a world… OK, just kidding. This isn’t a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a plethora of solutions aimed at stemming the tide, crimi… Continue reading Top 10 Uses of Wireshark for Hackers Part II

Top 10 Uses of Wireshark for Hackers Part II

In a world… OK, just kidding. This isn’t a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a plethora of solutions aimed at stemming the tide, crimi… Continue reading Top 10 Uses of Wireshark for Hackers Part II