
SALE - Packt's e-book Sale Ends 6/30
Packt's $9.99 eBook sale, which runs only until Monday, June 30. This is your chance to get my book, Cybersecurity Architect's Handbook, at a reduced price. They only do this at certain times of the year...
Packt's $9.99 eBook sale, which runs only until Monday, June 30. This is your chance to get my book, Cybersecurity Architect's Handbook, at a reduced price. They only do this at certain times of the year...
The latest episode of 45Drives' "What's Spinnin' Podcast" has just dopped. Brett sits down with me to explore my 25-year journey through the cybersecurity landscape. We also discuss my book, the "Cybersecurity Architect's Handbook," and how it has evolved throughout my career.
45Drives announced their new division 45Professional on 12/5/2024...
The VP6650 arrives in a compact yet robust form factor that immediately speaks to its enterprise-capable build quality.
In my previous post comparing Pi-hole versus Adguard Home, I mentioned I use Pi-hole with Unbound DNS. Let's explore why this setup is beneficial and how to implement it step by step.
Both solutions are excellent choices for network protection, but they serve slightly different needs.
The cybersecurity community continually amazes me with its dedication to excellence and collaborative spirit. This was recently highlighted when the CEO of Zenarmor shared his thoughts about my book, "The Cybersecurity Architect's Handbook" ...
Even the most straightforward tasks can become significant challenges when tackled alone. This reality hit home during my recent home lab expansion project, which involved building a new enclosed server rack and completely re-configuring my networking setup.
System updates are a crucial aspect of maintaining secure IT infrastructure. While they often bring improvements, they can also introduce changes that require adaptation. A recent example of this is the upgrade to OPNsense 24.7, which altered the format of filter and Suricata logs.
When it comes to securing your network, one of the key decisions you'll face is whether to use a traditional firewall or a transparent bridged firewall. Both approaches have their own unique advantages and use cases, and understanding the differences between them can help you ...
The Ultimate Kali Linux Book is worth adding to anyone's library...
Basics Series - #3 Choosing & Installing A Firewall (OPNsense VM Installation) Part 1