
Cybersecurity Articles
Tips, insights, and alerts covering all things cybersecurity gleaned from the day-to-day and sources online.
Tips, insights, and alerts covering all things cybersecurity gleaned from the day-to-day and sources online.
Discussions about cybersecurity frequently include the word Trust. It may be stated on it's own or as part of other terms such as "Trust No-one" or "Zero-Trust" or "Trust but Verify"... I recently spent some time thinking about trust and how it relates to cybersecurity. The more I thought about it, the more I realized that a bit of a deep-dive into who we are trusting (or not trusting) was well worth the effort.
'Twas the night before Christmas, when all through the house
Not a laptop was whirring, even those with a mouse;
The screens were all flashing with an eerie red glow
All Files Encrypted, All your secrets we know!
All the presents were nestled all snug in the sleigh
But poor Santa had no clue with whom they should stay.
After moving his list to a computer based tracker
It's all now encrypted, and in the hands of some hacker
After all the other network enhancements I have been working on, it was time to get some centralized logging going on. While I considered Logging Made Easy (LME) from CISA - this looked like just an abstraction on top of the ELK stack. Since I already had implemented that years ago, I elected for the latter and the die was cast.