
Insights and Reflections "Deep Dive"
This "Deep Dive," generated through AI in a podcast style, provides a review of the main themes and important ideas presented in the "Cybersecurity Architect's Handbook."
This "Deep Dive," generated through AI in a podcast style, provides a review of the main themes and important ideas presented in the "Cybersecurity Architect's Handbook."
The latest episode of 45Drives' "What's Spinnin' Podcast" has just dopped. Brett sits down with me to explore my 25-year journey through the cybersecurity landscape. We also discuss my book, the "Cybersecurity Architect's Handbook," and how it has evolved throughout my career.
The system as configured offers solid fundamentals ...
45Drives announced their new division 45Professional on 12/5/2024...
The VP6650 arrives in a compact yet robust form factor that immediately speaks to its enterprise-capable build quality.
In my previous post comparing Pi-hole versus Adguard Home, I mentioned I use Pi-hole with Unbound DNS. Let's explore why this setup is beneficial and how to implement it step by step.
Both solutions are excellent choices for network protection, but they serve slightly different needs.
In today's rapidly evolving digital landscape, finding a comprehensive resource for cybersecurity architecture can be challenging. However, people
The "Cybersecurity Architects Handbook" continues to maintain its position in the top 100 across multiple Amazon technical categories, including Network Disaster & Recovery Administration, Computer Cryptography, and Web Encryption since its release at the end of March 2024.
System updates are a crucial aspect of maintaining secure IT infrastructure. While they often bring improvements, they can also introduce changes that require adaptation. A recent example of this is the upgrade to OPNsense 24.7, which altered the format of filter and Suricata logs.
A Chat with TiborsaurusRex - YOUR TECH IS NOT SECURE! I was fortunate enough to sit down with Rex Tibor and discuss security. We discuss why a person at home needs to be aware about cybersecurity and what steps can be taken to improve your posture.