Posts

Governance, Risk, and Compliance References

As I’m preparing for the CGRC certification, I’ve compiled a list of NIST Special Publications focused on Governance, Risk, …

ChatGPT is Scary Cool

ChatGPT, a large language model developed by OpenAI, has been gaining popularity exponentially in the past month. This model can …

Why Security Questions Are Bad

When it comes to security, using only a password to protect your personal or financial information is no longer enough. Many critical …

Joining Ubuntu Server to AD

Joining linux servers to Microsoft AD for user login and authentication can be a daunting task. The following is the simplest (in my …

Forcing Replication of AD Partitions after Tombstone Lifetime Exceeded

When a domain controller has been offline for more than the specified tombstone lifetime, it is considered bad and will no longer …

Loading a Signed Certificate on a Cisco WLC

Recently, I’ve been on a mission to tighten my company’s security presence, such as disabling SSL 3.0 and TLS 1.0 on all systems that …

Cloud Encryption using Cryptomator

In a previous article, I mentioned storing important backups in the cloud. I’m generally cautious when it comes to storing private …

Injecting Drivers into Windows Install Media

Although this article may be a little late, this is a useful guide to keep on hand if servicing computers with Windows 7. I’ll update …