Stay Connected with Senki’s Updates

How do I stay connected with Senki and get Updates? Staying connected with Senki and Barry Raveendran Greene’s work is easy. The work posted on Senki is shared on Linkedin, Medium, Twitter, Facebook (Senki), Network Operations Groups (NOGs), Security Forums, and various Security Trust Groups. Many times the work here is a reflection of the Security Read More

Best Principles for Using Linkedin for Social Selling

Version 1.1 Online social selling tools are human communications tools. People forget that E-mail, chat, Facebook, Linkedin, MySpace, Twitter, and the continuously evolving field of “human communication tools are just that,” HUMAN to HUMAN communications tools. There are people on the other side of the message. The humans on the other side will receive the Read More

Building and Investing in a Community of “Contacts”

Building and Investing in a Community of “Contacts.” We’re a world of people. People in communities. Communities that only work if people within that community invest in building, Foster, interconnect, and serve the individuals in that community. The community only grows with healthy investment and welcoming culture. All these factors are essential to taking a Read More

Effective Linkedin Connections – Building Your Network

Effective Linkedin Connections Building Your Social Media Network How to Effectively Communicate (Version 0.4) This Empowerment Doc is for all those who are using Linkedin, Facebook, Google+, Twitter, and other social media tools build a professional network, seek out opportunities (i.e. jobs),  reach out with “cold calls,” and connect with other humans. Effective Linkedin Connection Connections Read More

Is “Transparent” Web Caching Dead?

Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool Read More

Weekend Read – Lessons from Heartbleed

Every vulnerability is a security lesson that will either be repeated or used to improve the organization. Lessons from Heartbleed is no different.  IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the Read More

Don’t wait, prepare for the Internet Skills Gap

I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful as we all explore how we can bridge the Read More

Get the Right People on the Bus and Finding Staff with that Internet Spirit

How do you find the people with the Internet Spirit? How do you ‘get the right people on the bus?’ Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a Read More

Pulling Practices and Techniques from Experience – “Pathetic DDoS vs Security Sites”

Read through Metasploit’s blog titled Pathetic DDoS vs Security Sites. It documents several key steps that many companies do not know with how to mitigate some of the impacts of a DDOS attack. In this case, we have a DDOS targeting a specific domain – metasploit.com.  Step 1 is to classify the attack. Traffic analysis Read More

Black Hats, White Hats, Grey Hats, and now Red Hats

We all know about White Hats (Cyber Good Guys), Black Hats (Cyber Bad Guys), and Grey Hats (White Hats who skirt the edge of legality). We’re missing a group. The three defined groups are all easily described by their economic motivations for doing what they do. But we have another group who are not easily Read More