July 5, 2010DefensiveDepthLeave a Comment on How I procured a free copy of “Network Flow Analysis” How I procured a free copy of “Network Flow Analysis”
June 13, 2010DefensiveDepthLeave a Comment on Anti-virus, as it has been done the past 20 years, is dead. Anti-virus, as it has been done the past 20 years, is dead.
March 18, 2010DefensiveDepthLeave a Comment on Great Lakes InfraGard Conference 2010: Some Thoughts Great Lakes InfraGard Conference 2010: Some Thoughts
February 13, 2010DefensiveDepth1 Comment on Hurry! Only (random_num) Spots Left! Hurry! Only (random_num) Spots Left!
November 22, 2009DefensiveDepth1 Comment on Social Engineering & Neuro-Lingustic Programming (NLP) Profiling Social Engineering & Neuro-Lingustic Programming (NLP) Profiling
November 7, 2009DefensiveDepth2 Comments on Josh Brower’s GCIH Gold Project Josh Brower’s GCIH Gold Project
October 8, 2009DefensiveDepth1 Comment on Party Like it’s Windows 7 (Or How I Became A HouseParty Host for the Windows 7 Launch) Party Like it’s Windows 7 (Or How I Became A HouseParty Host for the Windows 7 Launch)
August 29, 2009DefensiveDepth3 Comments on Environment Monitoring for the SMB Server Room Environment Monitoring for the SMB Server Room
August 9, 2009DefensiveDepth1 Comment on SANS Audit 521: Meeting the Minimum: PCI/DSS 1.2: Becoming and Staying Compliant SANS Audit 521: Meeting the Minimum: PCI/DSS 1.2: Becoming and Staying Compliant