Category Archives: Articles

Protect your Fortigate with LOCAL-IN policies

One of the biggest mistake made while deploying a Fortigate firewall is focussing strictly on its policies between zones or interfaces. Little do people know, LOCAL-IN policies also need configuration to protect the firewall from exposing remote access to it’s … Continue reading

Posted in Articles, Firewalls | Tagged , , , | Comments Off on Protect your Fortigate with LOCAL-IN policies

Eradicating phishing attacks using multiple email servers

Do you remember when email servers were very efficient, dramatically increased companies internal communications and we absolutely not susceptible to any kind of phishing attacks, spams or viruses? I do! Thirty years ago, that’s how it was and learning from … Continue reading

Posted in Articles, Servers | Tagged , , , , , | Comments Off on Eradicating phishing attacks using multiple email servers

Protect your car against theft using Faraday

L et’s shop for a new vehicle ! This story begins when I stopped at a local Honda dealer to check out their new SUVs. The sales person (Louis) jumped right in, eager to help me buy a vehicle. After … Continue reading

Posted in Articles, Stories | Tagged , , , , | Comments Off on Protect your car against theft using Faraday

AI and the God question

As I was scrolling thru the internet to watch more obscure movies (Yeah, I’m a movie junky), I stumbled on this little gem which explorers the question of the existence of “a God” using an advanced artificial intelligence computer which … Continue reading

Posted in A.I., Articles | Tagged , | Comments Off on AI and the God question

The powers of updating

Patch Management If there is one thing, a single thing, you can do to greatly improve your chances of fending off cyberattacks, it’s adopting a good digital hygiene strategy. In other words, adopting and implementing a comprehensive best practice methodology … Continue reading

Posted in Articles, Updating | Tagged , , | Comments Off on The powers of updating

Machine learning and cheating

Machine learning is a process that gives the ability to predict outcomes using past events. During my career, I realized that I was getting very good at predicting the probability of outcomes and/or root cause of issues. My boss always … Continue reading

Posted in A.I., Articles | Tagged , , | Comments Off on Machine learning and cheating

From Laces to AI – The Connection

While researching the ups and downs of AI (Artifician Intelligence), I stumbled on this cool youtube video which makes the connections between 17th century automated lace making, creativity and AI. If you are old enough to remember the excellent “Connections” … Continue reading

Posted in A.I., Articles | Tagged , , | Comments Off on From Laces to AI – The Connection

Companies, mind your phone systems !

I used to work for a private company that had state of the art network security and strict security policies on everything, except their phone system, and this article will discuss the risk of crafty people from syphoning information from … Continue reading

Posted in Articles, Stories | Tagged , , , | Comments Off on Companies, mind your phone systems !

Starlink: Elon Musk’s legacy

The moment I read about Elon Musk’s Starlink program which would place in orbit over 10,000 satellites in low orbit (500 Km), I though to myself “This is a disaster in search of a bible proportion moment”. Being a licensed … Continue reading

Posted in Articles, Stories | Tagged , , | Comments Off on Starlink: Elon Musk’s legacy

CMMC 2.0

Cybersecurity Maturity Model Certification Department of Defense (DoD) Contractor community is now required to build and maintain a proper cybersecurity posture to help protect the US from its adversaries.  The official CMMC rollout will occur over several years to encompass … Continue reading

Posted in Articles, Documents | Tagged | Comments Off on CMMC 2.0

NIST CyberSecurity Framework

Here is a useful NIST.GOV’s CyberSecurity Framework grid to help you memorise your cyber security strategy.   NIST’s website: https://www.nist.gov/cyberframework  

Posted in Articles, Documents | Tagged , , | Comments Off on NIST CyberSecurity Framework

Security Certification Roadmap

Paul Jerimy compiled a cool map of all security certifications. With bookmarking this website! Security Certification Roadmap

Posted in Articles, Documents | Tagged , , | Comments Off on Security Certification Roadmap

CISSP Cheat Sheets Domain 1-8

Comparitech compiled Cheat Sheets for CISSP exams. They are quite useful to help you review CISSP domains, memorize terminologies and acronyms. Below are links to each sheets. Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security … Continue reading

Posted in Articles, Documents | Tagged , , | Comments Off on CISSP Cheat Sheets Domain 1-8

Wifi Hotspots: Avoid Wireless Traps

Don’t trust that Wifi This story begins with a warning. Wifi hotspots are everywhere, at the donut shop, at the mall, in your neighbourhood. But you should not connect to them and here’s why. The back yard of my home … Continue reading

Posted in Articles, Stories | Tagged , , , | Comments Off on Wifi Hotspots: Avoid Wireless Traps

Why working remotely works

Business travelling is a waste The company I worked for asked me to go get trained on X-CA and a USB Secure Dongle in Germany. They flew me first class from Canada to Germany, I rented a car and drive … Continue reading

Posted in Articles, Stories | Tagged , , , | Comments Off on Why working remotely works

The unlikely digital camera for spies

In the early 90’s, I was working at a computers reseller as a system engineer. One of our sales rep approach me to test a “Spy Box”. What the heck is a spy box I asked him. Essentially, one of … Continue reading

Posted in Articles, Stories | Tagged , , , | Comments Off on The unlikely digital camera for spies

Disposable Email Addresses

Circa 1993, I registered my first .COM and .NET domain for the small company I worked for and got a couple unix shell accounts to access it. The Internet of the early 90’s was amazing, had no publicity, no search … Continue reading

Posted in Articles, Servers | Tagged | Comments Off on Disposable Email Addresses

Forti-Savings : How to manage Fortigates

Soon after adopting and purchasing Fortinet fortigates firewalls of various sizes and performance, I calculated that after a few years of ownership, and IF you maintained the Support/Subscription on the devices, you can dramatically reduce your cost of ownership by … Continue reading

Posted in Articles, Firewalls | Tagged | Comments Off on Forti-Savings : How to manage Fortigates

The ideal SMTP Server

For many years, I managed email servers for various companies. One of my first challenge was to configure anti-spam filters to block a maximum amount of spams, while allowing legitimate emails. That wasn’t easy as spammers changed their strategies monthly. … Continue reading

Posted in Articles, Servers | Tagged | Comments Off on The ideal SMTP Server

Are Next GEN Firewalls still relevant?

Are Next GEN Firewalls still relevant? Since the early 90’s, I saw firewall manufacturers progressively deploy features after features on their firewall appliance to differentiate themselves from the competition. Some notable technologies were UTM (Unified Threat Management) and “Next Gen” … Continue reading

Posted in Articles | Tagged , , | Comments Off on Are Next GEN Firewalls still relevant?

About ChatGPT

ChatGPT is an AI-powered language model developed by OpenAI. It’s capable of generating human-like text based on the input it receives. It’s trained on a large corpus of text data, which enables it to generate a wide variety of responses … Continue reading

Posted in A.I., Articles | Tagged , | Comments Off on About ChatGPT

AI player map

AI Services wheel. Here is a map of all the players in the AI field.

Posted in A.I., Articles | Tagged , , | Comments Off on AI player map

What is COBIT

COBIT (Control Objectives for Information and Related Technologies) is a framework for the governance and management of enterprise IT (Information Technology). It was first developed by ISACA (Information Systems Audit and Control Association) in 1996, and has since been updated … Continue reading

Posted in Articles, ChatGPT | Tagged | Comments Off on What is COBIT