Elastic Cloud on Kubernetes – Part 1
The primary goal of this blog series is to provide an easy-to-follow walk through which by the end of the series enable the reader to: spin up a minimal ECK cluster,configure networking, load balancer, and third-party certificates,configure SSO/SAML authentication,and setup the cluster to ...
Continue ReadingReady, Set, Secure Episode 37
Click Here to listen to the latest episode or Click Here to watch the stream! Welcome back to our conversation about Operational Technology. Listen in as VP of Engineering Jonathan Townsend and Senior Solutions Architect Jarrod Cunningham discuss the processes of IT to OT security and how ...
Continue ReadingReady, Set, Secure Episode 36
Click Here to listen to the latest episode or Click Here to watch the stream! We hope you NEVER need to work with Zachary Hinkel, but in the event of a breach he’s just the person you want on your team. This week Michael and Hutch sit down with Zac to discuss his role as a Ransomware Negotiator, ...
Continue ReadingReady, Set, Secure Episode 35
Click Here to listen to the latest episode or Click Here to watch the stream! It’s back! We’re running another month long CTF and brought back last year’s 4-time winner Cody Wheat to talk about how he got started, how CTF’s are training the next generation of security ...
Continue ReadingReady, Set, Secure Episode 34
Click Here to listen to the latest episode or Click Here to watch the stream! After a short break for Black Hat and DefCon the guys are back to talk about a topic that isn’t always fun but is very important to enterprise organizations – cybersecurity insurance. In this episode Nolen Bucek from ...
Continue ReadingCTFs Aren’t Just a Game
This post is going to be a little different, I want to talk about Capture the Flag games. I want to offer a perspective from someone who is relatively new to the space but knows just enough to be almost interesting. I have spent the last year or so playing hacking games, studying, reading, and ...
Continue ReadingJourney of Learning: SQL Injection is fun!
By the time this is posted I will be 1 year into this journey of learning on my path to the OSCP certification. It’s kind of amazing how much I have learned already, and I have so much more to learn. I didn’t expect to enjoy attacking applications and servers. I am a paranoid and cautious ...
Continue ReadingPen Test Rules of Engagement: What You Need to Consider
In the first post of our series, Security Assessment 101: Planning a Successful Security Assessment, we detailed some of the points necessary to plan a successful security assessment, and we defined the various types of assessments organizations need to periodically conduct if they want to be sure ...
Continue ReadingReady, Set, Secure Episode 33
Click Here to listen to the latest episode or Click Here to watch the stream! This week Wilsonart CISO and Cybersecurity Awareness Evangelist Adam Traylor joins Michael and Hutch for our first live stream! Listen in as the trio discusses promoting cybersecurity best practices across your ...
Continue Reading