Privileged Access is Dangerous

This week at Twitter, there was a security incident that allowed access to a number of high profile accounts. The end result was a Bitcoin scam, with every account promising to "double any BTC sent" to them. Twitter has come out fairly quickly to say that the incident…

Where is all the Automation?

Note: I may receive commissions for purchases made through links in this post. This is to help support my blog and does not have any impact on my recommendations. The future is APIs! SD-EVERYTHING! Automation! Orchestration! Artificial Intelligence and Machine Learning! Sound familiar? It’s all part of the…

Tips for Working with Vendor Support

This post has been on my mind for a while now. I’ve worked as a network admin for long enough, and opened more technical support cases with vendors than I want to think about. Over the years I’ve developed my own process for how I handle…

Thoughts on Cisco's 2018 Annual CyberSecurity Report

When I started in networking, I never would have thought that security would be such an important part of my job. However, it has become something that I’m involved with almost every day – tasks like applying security configurations, participating in audits, or spending a day chasing down…

What is Risk Acceptance?

You can’t always get what you want. As an engineer though, it’s your job to determine what’s best for the company and recommend it to management. What happens if your suggestion gets turned down? Well certainly your proposal must have been mis-understood, right? Maybe…

2018 Cisco Champions

I received an email late yesterday afternoon – to my surprise I was invited to join the Cisco Champions program for 2018! I applied back in November, but I never would have thought I would actually get selected. I’m very excited to join the wonderful group of existing…