Linkedin - In

Building and Investing in a Community of “Contacts”

Building and Investing in a Community of “Contacts.” We’re a world of people. People in communities. Communities that only work if people within that community invest in building, Foster, interconnect, and serve the individuals in that community. The community only grows with healthy investment and welcoming culture. All these factors are essential to taking a Read More

Social-Media

Effective Linkedin Connections – Building Your Network

Effective Linkedin Connections Building Your Social Media Network How to Effectively Communicate (Version 0.4) This Empowerment Doc is for all those who are using Linkedin, Facebook, Google+, Twitter, and other social media tools build a professional network, seek out opportunities (i.e. jobs),  reach out with “cold calls,” and connect with other humans. Effective Linkedin Connection Connections Read More

0005 - Operational Security Community 2017-09-05

Security Workshop in Jakarta: Understanding the Real Cyber Security Threat

This is the first in a series of Security Workshops that I will be teaching in the region. Most will be in Indonesia and other parts of ASEAN. Stay tuned or connected to me via Linkedin to get updates. Understanding the Real Cyber Security Threat Where: @ America Pacific Place Mapp – Level 3 – Jakarta Indonesia. Read More

heartbleed

Weekend Read – Lessons from Heartbleed

Every vulnerability is a security lesson that will either be repeated or used to improve the organization. Lessons from Heartbleed is no different.  IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the Read More

0005 - Operational Security Community 2017-09-05

“Getting the Right People on the Bus” Finding Staff with that Internet Spirit

Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a model that empowers  customers to drive the change in telecommunications. Telecommunications need to convert to “IP thinking” to succeed. They Read More

0005 - Operational Security Community 2017-09-05

Pulling Practices and Techniques from Experience – “Pathetic DDoS vs Security Sites”

Read through Metasploit’s blog titled Pathetic DDoS vs Security Sites. It documents several key steps that many companies do not know with how to mitigate some of the impact of a DDOS attack. In this case we have a DDOS targeting a specific domain – metasploit.com.  Step 1 is to classify the attack. Traffic analysis Read More