Posts

Navigating Legal and Security Risks: Managing Access to Former Employees' Email Accounts

Accessing the email accounts of former employees, especially those terminated under contentious circumstances, is fraught with legal …

Governance, Risk, and Compliance References

Quick references to standards covering cybersecurity governance, risk, and compliance

ChatGPT is Scary Cool

ChatGPT, a large language model developed by OpenAI, has been gaining popularity exponentially in the past month. This model can …

Why Security Questions Are Bad

When it comes to security, using only a password to protect your personal or financial information is no longer enough. Many critical …

Joining Ubuntu Server to AD

Joining linux servers to Microsoft AD for user login and authentication can be a daunting task. The following is the simplest (in my …

Forcing Replication of AD Partitions after Tombstone Lifetime Exceeded

When a domain controller has been offline for more than the specified tombstone lifetime, it is considered bad and will no longer …

Loading a Signed Certificate on a Cisco WLC

Recently, I’ve been on a mission to tighten my company’s security presence, such as disabling SSL 3.0 and TLS 1.0 on all systems that …

Cloud Encryption Using Cryptomator

In a previous article, I mentioned storing important backups in the cloud. I’m generally cautious when it comes to storing private …

Injecting Drivers into Windows Install Media

Although this article may be a little late, this is a useful guide to keep on hand if servicing computers with Windows 7. I’ll update …