FUD-free analysis: Natural language processing (NLP)


FUD-free analysis: Natural language processing (NLP)
If you follow me on Medium or Twitter, you may already be aware. Still, if you don’t (I assure you that you’re missing out), I have been researching several technologies in preparation for an OPSEC/Anti-OSINT tool that I am crafting. I am using this tool as a means to push myself harder…


Wireless Network and Wi-Fi Security Issues to Look Out For
As the name implies, this should be an excellent starting point for the subject topic, in this case Wi-Fi. While I make every effort to be thorough and hit every aspect, there are times that I inadvertently omit things or skip them due to scope, time, length or applicability. Email any questions you have about this or any other topic…
Get the latest security news in your inbox.


Which security certification is for you (if any)
It is hard to look at an information security job posting without seeing some certifications desired. Some make sense and others not so much. I have looked at junior helpdesk positions asking for CISSP, and some of the roles at some of the most respected companies do not ask for any certifications. There are some certifications that in having them…


Data Carving in Incident Response - Steps Toward Learning More Advanced DFIR Topics
Introduction I have been in information security since March 2010, when I got out of the Navy after navigating nuclear submarines for almost 7 years. Little did I know that with this change of career, I was about to be in for the ride of my life. I have been steadily progressing as a "blue teamer" or enterprise defender this whole time…


What is Insider Threat?
As the name implies, this should be an excellent starting point for the subject topic, in this case insider threat. While I make every effort to be thorough and hit every aspect, there are times that I inadvertently omit things or skip them due to scope, time, length or applicability. Email any questions you have about this or any other…


Implications of Powershell Going Open Source
I make every effort to be thorough and hit every aspect, there are times that I inadvertently omit things or skip them due to scope, time, length or applicability. I am admittedly not a Powershell guru, but I am interested to see how this plays out. Email any questions you have about this or any other topic to blog@advancedpersistentsecurity…


Password Protection Through Complexity and Awareness
As the name implies, this should be an excellent starting point for the subject topic, in this case Passwords. While I make every effort to be thorough and hit every aspect, there are times that I inadvertently omit things or skip them due to scope, time, length or applicability. Email any questions you have about this or any other topic…