Blogs
How I built this blog …
Choosing a static site generator
I am not familiar with web development, it’s just not something I have done. I still wanted to have a personal site that was not wordpress based so I settled on a static site generator. I came across GitHub Pages and Jekyll. After doing some light research, I …
gMSA Failed to Install - …
Overview
This is a quick documenting of an issue I ran into while working with gMSA’s. Hopefully this helps other people with this same issue that hopefully come across this page.
Primer
What is a gMSA? A gMSA, or group managed service account, is a managed domain account that provides …
Final - A Vulnerability …
Vulnerability Scanning Overview
Lay out what vulnerability scanning is and how it is a part of your organization’s defense strategy. Do not get specific about tools or types of scans. Examples:
- Location
- Internal
- External
- Vulnerabilities found will be added to a tracking system
- Scanning is …
Pt. 2 - A Vulnerability …
Assessing and determining “scope”
The goal scope of your program should encompass all networks and systems across all geographic locations that are owned by your organization. You will find most individuals scoff at this goal, which is fair. It is a very daunting task to achieve and I …
Intro - A Vulnerability …
Background
I was tasked with creating a vulnerability management program from the ground up. Our current program was designed 15 years prior, for a different time, with a different objective. It centered around physical security and did not address core principles seen today such as risk ratings, …