

Passing On Wisdom Career Advice
In this episode of Trainers Underground, Rob, Bryan, and Don talk about career advice that they have been given that really worked for them. Check out the advice and let us know what advice you have been given that you found useful in the comments below. #Career #IT #Advice


AI in Cyber-security
Here are some views on how AI can help cyber-security efforts. My opinion is we need to adopt AI for cyber-security before hackers learn to leverage Artificial Intelligence against us. Quick Look: AI in Cybersecurity: A Balancing Force or a Disruptor? Vijay Dheap, Program Director of AI & Cognitive Initiatives in Cyber Security, IBM AI has the potential to be the great equalizer for security analysts struggling to keep up with the onslaught of threats and risks posed by mali

The Visible Ops Handbook
This is a book review I wrote back in 2007 for a past version of this website. I am resurrecting it because it is still applicable today. I can't recommend this book enough for system administrators. I also recommend the book last May in the context of vulnerability management here: http://www.learnsecurity.org/single-post/2017/05/09/Where-are-the-Real-Vulnerabilities Book Review: The Visible Ops Handbook If you are in Information Technology, do you spend more time on fixin


Domains of Security
Far from perfect this was my attempt to combine domains of knowledge or common body of knowledge (CBK) to cover all thing in security. I do have some sub-points that are out of date like the common criteria etc… But the overall structure I think would still fit all subjects of security and divide them into domains or areas of knowledge. BTW I made this list in 2005. It is sort of a blast from the past for me. I used the list to help guide my continuing education. I try to


Implementation Flaws
Often we find flaws in the implementation of technologies. Once the flaws are found we think companies will work to correct those flaws. Here is an example of how Google had a flaw and did not address it and how that turned into a national security issue. Bryan Seely says profit is the motive for the company not to take action to correct the flaws. Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirkland In 2014, Bryan Seely hacked the Secret Service


Wireshark v. OmniPeak
A common tool for monitoring network traffic that is taught in classes is Wireshark. In part, because it is freely available. However, there are a number of other tools that can be used to capture and analyze network traffic. When compared with other tools you will often find them to be easier to use and more visually useful. OmniPeak with the Savvius devices can help you do protocol and network traffic analyzation. This series of videos will do a comparison of the two p


IT Pro to Cloud Pro
My good friend and MCT Andrew Bettany gave a session at MS Ignite this year where he gave some critical career advice. During his talk he references two books. He referenced the classic, "Who Moved My Cheese" and Simon Sinek’s book “Start with Why.” I have a blog post from July on "Start with Why" here: http://www.learnsecurity.org/single-post/2017/07/25/Why IT pro to cloud pro: Skills needed and learning roadmap - by Andrew Bettany "Looking to transition your skills from


AlphaGo Google's Deep Mind
This is a demonstration that Artificial Intelligence (AI) can learn. The game Go is to difficult to calculate all the possible moves so the only way for AI to play is to be able to learn like humans. The AI watched 100,000 games and then played itself 3 million times. What do you think? Google's Deep Mind Explained! - Self Learning A.I. - YouTube #ArtificialIntelligence


War on SPAM
Here is some more fun with Spammers and con artists from James Veitch. You should look up the video of him and his roommate as well. Funny stuff. More adventures in replying to spam | James Veitch James Veitch has spent years doing the tireless, thankless work of replying to spam emailers so you don’t have to. He returns to TED to tell the tale of yet another spam email adventure, this time with a vital lesson attached: How to annoy your way off any spammer’s mailing list.


Ted Talk - Cybercrime
James Lyne: Everyday cybercrime -- and what you can do about it "How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature." #Cybercrime #TED #SocialEngineering