Skip to content
Toggle Navigation
About
Services
Contact
Archives
Archives
Take a look at all my published articles.
Zeekurity Zen – Part VIII: How to Send Zeek Logs to Elastic
Zeekurity Zen – Part VII: Zeek To Understand Encryption
Zeekurity Zen – Part VI: Zeek File Analysis Framework
Zeekurity Zen – Part V: Zeek Intelligence Framework
Attacking The BlueKeep
Palo Alto Firewall: GlobalProtect VPN How-To Guide
Palo Posts: How-To Guides For Palo Alto Firewalls
Zeekurity Zen – Part IV: Threat Hunting With Zeek
The Fal.Con Has Landed
Zeekurity Zen – Part II: Zeek Package Manager
Zeekurity Zen Zeries
How to Choose the Right EPP / EDR Solution
Zeekurity Zen – Part III: How to Send Zeek Logs to Splunk
Zeekurity Zen – Part I: How to Install Zeek on Ubuntu
How to determine your Ring Doorbell Pro firmware version
Palo Alto Firewall: macOS Updates NSURLErrorDomain error -1012
Eric’s Top 7 Ways To Get Ready For Security Awareness This Summer
Palo Alto Firewall: External Dynamic Lists
Palo Alto Firewall: Home Network
The Missing CISSP Domain
OSM: Open Security Monitoring
Seeing Red: The Fun Stuff
IP360 Tools: Free For All!
Seeing Red: Exploitation
Seeing Red: Reconnaissance
Seeing Red: Tools of the Trade
Learn Concepts Not Tools
Save the Yelps
Threat Intelligence: CIF
Nessus and Splunk
Foodie Photography
Python Scripts
BSides Austin 2014
IP360 and Splunk – Part 2
IP360 and Splunk – Part 1
Incident Response: Carbon Black
How To Pass SANS GIAC Certification Exams
How to Succeed in Information Security
Security News
SANS SEC 504
My CISSP Story