
AGNI
Configuring Arista AGNI with Meraki Access Points
A high-level configuration guide for integration AGNI with Meraki AP's using RadSec and MAC based authentication.
AGNI
A high-level configuration guide for integration AGNI with Meraki AP's using RadSec and MAC based authentication.
Ransomware
Lessons and takeaways from ransomware response. My experience assisting the recovery efforts of a rural community.
Fido2
Discovering converged access using HID RFID and NFC cards for Windows 10 logon and authentication.
Azure
A short version of using an Azure AD hybrid with security keys and group policy for Windows 10 logon.
Yubikey
This security key doesn't look familiar. Please try a different one. Using Yubikeys with Okta Custom URLs and IWA Single Sign on.
Security
a detailed guide on how to configure Microsoft laps to rotate machine passwords in active directory.
Security
Last year, I was engaged to assist in a severe ransomeware event for a third party organization. Unfortunately, when I arrived most of the network had been impacted and the data was encrypted. At the onset of the infection, the organization decided to shutdown all servers on the network. Shutting
Security
When responding to a major event, there are a few simple things that we can do to prepare for a response.