4 Sep 2017

Objective: Build a Proof of Concept to pull events from Okta and feed them into Splunk.

We are going to perform the act of pulling events from Okta api, send them through a Kafka cluster and finally pulling them in to Splunk for long term storage and analysis.  

The star...

29 Mar 2017

Now I am loving life, I feel so empowered, my brain is firing on all cylinders. (You might want to read my previous post to see how I got to this euphoric state). I always love the art of programming but never excelled at it because I couldn't think of any software to...

25 Mar 2017

Picture by: PowerShell Magazine 

The objective....

This journey started when I thought "How nice would it be to enhance my security skill set by running tests in a controlled environment" So I did like any eager engineer would - Head to the "Lab". (Two laptops on docking...

12 Sep 2016

It is true, antivirus is not enough to protect us in that cesspool of digital gunk called the internet. There are still persons out there looking to take advantage of the less knowledgeable. Taking their money, invading their person data and even stealing their entire...

12 Sep 2016

Kudo go out to twitter for standing up to particular groups out there that uses social media a medium to carry out questionable acts in the name of religion. The unfortunate backlash were threats made against Twitter’s founderJack Dorsey and to the company as a whole....

12 Sep 2016

WHO WHAT WHEN

The 3 W’s that are very important in the security realm and no, not World Wide Web. Having said that change auditing solutions are very important to security model of any organization and the guys at Lepide Software have provided some tools to make our job...

12 Sep 2016

There is a new android malware that hijacks your phone's shutdown process and basically tricks you in thinking that it is shutdown. It can then make calls, take pictures and other various functions without your knowledge. Sound like something out of a spy movie eh?

This...

12 Sep 2016

So as you might have already heard, hackers found a way to access your car and like me you are wondering if you should be worried. I did some research and the truth is there is no real need to panic. Apparently this flaw was noticed and rectified before it was made pub...

12 Sep 2016

What, When and Who, this is #1 rule regarding Auditing, and it is no difference in the world of network security. We want to know what was accessed, by who and when was it done.

Netwrix have a suite of tools to audit changes on your network. This can range from Active D...

Please reload

  • Google+ Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
Globalization concept
Digital social media
Glowing Keyboard

© "Security is key and Devops is life" ~ Antonio Cheltenham