0

Practical NIST CSF Worksheet

A quick preemptive thank you for those that attended my talk on “Practical Application of the NIST Cybersecurity Framework” for SecureWorld Charlotte 2017. As mentioned in the presentation I’ve put together a modified version of a basic CSF worksheet that… Continue Reading

1

ELK Stack Parsing Apache Log Files

Anyone looking at log management for various reasons has probably heard the name ELK thrown around whenever the conversation turns to open source solutions. This stack is composed of three different tools, Elasticsearch, Logstash, and Kibana which come together to… Continue Reading

0

VNC Tunnel to Kali Linux with mRemoteNG

To say that this is a bit of a pain is somewhat understating the problem (though, no worse than formatting a WordPress article). The latest versions of Kali (including the just released kali-rolling) do not have functionality with gnome over… Continue Reading

0

TrueCrypt, Still Viable, Still Relevant

Let me start of by defining what TrueCrypt is. TrueCrypt is a piece of software that has been developed to allow fairly advanced file and disk encryption operations across a wide variety of systems and media. The beauty of TrueCrypt… Continue Reading