How do I stay connected with Senki and get Updates? Staying connected with Senki and Barry Raveendran Greene’s work is easy. The work posted on Senki is shared on Linkedin, Medium, Twitter, Facebook (Senki), Network Operations Groups (NOGs), Security Forums, and various Security Trust Groups. Many times the work here is a reflection of the Security
Category: Empowering Humanity
Empowering Humanity is a passion. There is no need to withhold information that is best shared with the world. The documents, post, and materials in this category are focused on that sharing. You will have shared wisdom, insight, observations, guides, and other tools that I share with my mentees.
At the same time, you are encouraged to share your own wisdom. You can E-mail me directly, connect via social media or comment on the post. Better yet, write, vlog, and share your own experiences.
Principles to invest in Linkedin for an Effective Impact
Version 1.2 We have an ocean of articles to explain how to use Linkedin for social media marketing. We don’t have as many articles that explain how to use Linkedin for an Effective Impact on people. Online social selling tools are human communications tools. People forget that E-mail, chat, Facebook, Linkedin, MySpace, Discord, Whatsapp, Twitter,
Building and Investing in a Community of “Contacts”
Building and Investing in a Community of “Contacts.” We’re a world of people. People in communities. Communities that only work if people within that community invest in building, Foster, interconnect, and serve the individuals in that community. The community only grows with healthy investment and welcoming culture. All these factors are essential to taking a Read More
Effective Linkedin Connections – Building Your Network
Effective Linkedin Connections Building Your Social Media Network How to Effectively Communicate (Version 0.4) This Empowerment Doc is for all those who are using Linkedin, Facebook, Google+, Twitter, and other social media tools build a professional network, seek out opportunities (i.e. jobs), reach out with “cold calls,” and connect with other humans. Effective Linkedin Connection Connections Read More
Is “Transparent” Web Caching Dead?
Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool Read More
Weekend Read – Lessons from Heartbleed
Every vulnerability is a security lesson that will either be repeated or used to improve the organization. Lessons from Heartbleed is no different. IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the Read More
Don’t wait, prepare for the Internet Skills Gap
I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful as we all explore how we can bridge the Read More
Get the Right People on the Bus and Finding Staff with that Internet Spirit
How do you find the people with the Internet Spirit? How do you ‘get the right people on the bus?’ Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a Read More
Pulling Practices and Techniques from Experience – “Pathetic DDoS vs Security Sites”
Read through Metasploit’s blog titled Pathetic DDoS vs Security Sites. It documents several key steps that many companies do not know with how to mitigate some of the impacts of a DDOS attack. In this case, we have a DDOS targeting a specific domain – metasploit.com. Step 1 is to classify the attack. Traffic analysis Read More
Black Hats, White Hats, Grey Hats, and now Red Hats
We all know about White Hats (Cyber Good Guys), Black Hats (Cyber Bad Guys), and Grey Hats (White Hats who skirt the edge of legality). We’re missing a group. The three defined groups are all easily described by their economic motivations for doing what they do. But we have another group who are not easily Read More