September 15th, 2024
Using Attack Path Mapping to Develop Your ICS Security RoadmapSeptember 14th, 2024
Using Attack Path Mapping to Develop Your Security RoadmapMay 20th, 2023
Bootstrapped SecOps: Practical Strategies for Starting with Minimal ResourcesMay 12th, 2023
Enterprise Security Architecture isn’t just for enterprises anymoreMay 13th, 2022
Goodbye Hacktive Directory: Removing Active Directory default read permissionsJanuary 16th, 2022
OS(e)INT: Open Source (emotional) IntelligenceSeptember 25th, 2021
The Big Picture: Building A Security Program From The Ground Up In 365 DaysMarch 22nd, 2020
PowerShell and PicklingMay 4th, 2019
Too Small to Fail: Securing Small and Medium BusinessesMay 3rd, 2019
Starting from Scratch: Building a Security Program From the Ground UpMarch 18th, 2019
Missing the Forest for the Trees: When Server Hardening isn't enoughSeptember 21st, 2018
Oh $#*7, I have to do WHAT?!: 365 days to build a security programJune 9th, 2018
Too Small to Fail: Securing Small and Medium Businesses