hayner.net
Home
Archives
Links icon
LinkedIn Twitter
About
  • LastPass is (or should be) Toast

    Dec 30, 2022 · 7 min read · Password-Managers Personal-Security  ·
    Share on:

    LastPass, a product that I've used for a long time and have recommended freely to friends and other notable ne'er-do-wells alike, has been hacked. Again. This time it might spell doom for the company. With apologies to Glen Hansard, I'm both mad AND disappointed.


    Read More
  • Tech Field Day 26 - Event Details and Summary

    Oct 26, 2022 · 8 min read · Conference GestaltIt TFD26 CXL  ·
    Share on:

    The 26th Tech Field Day event put on by Gestalt IT was held this month in San Jose, California. Over the course of three days, we debated trends and topics around the Enterprise Datacenter space, talked network automation with ZPE, and participated in the OCP 2022 CXL Forum.

    Read on to learn more about the event.


    Read More
  • Security vs. Convenience: When Convenience Goes Too Far

    Oct 1, 2022 · 7 min read · Policy UX Technology  ·
    Share on:

    MFA is a huge boon to security, but some innovations that are supposed to make it easier are actually giving hackers new ways to attack individual users. This is an example of where keeping things simple would mean more security for everybody.


    Read More
  • Is QUIC too fast for security??

    Jul 31, 2022 · 7 min read · Networking Infrastructure  ·
    Share on:

    The long-debated QUIC protocol is getting serious attention these days. It has been in development since 2012, but is all the rage now because HTTP/3 (the main reason QUIC was designed in the first place) is now an official standard.

    What is it, then, and what might it mean for security? Let's find out.


    Read More
  • Fixing A Hole Where The Cybercrime Gets In

    May 9, 2022 · 10 min read · Cost-Management Strategy  ·
    Share on:

    Security doesn't have to be a massive financial hardship. In fact, there are a great number of things that can be done in your organization to make systems and applications more secure. This post outlines some of the most helpful that can be used to make your organization more secure.


    Read More
  • Security Wants To Be Free

    May 2, 2022 · 8 min read · Cost-Management Strategy  ·
    Share on:

    Not all security needs to come with a price tag, and organizations shouldn't give up on becoming more secure because of cost concerns. A lot of security comes down to education, mindset, and taking advantage of the security built into products and technologies that you already own.


    Read More
  • Yes, You Do Need A Password Manager, Brett. Yes You Do!

    Apr 2, 2022 · 7 min read · Password-Managers Passwords Personal-security  ·
    Share on:

    A Password Manager is an essential security feature for individual users and enterprises alike. The average internet denizen has to remember 70-80 passwords and accounts, and using the same few passwords over and over is very insecure. Now add in enterprises, who need to secure more than just passwords alone.


    Read More
  • Microsoft's Security Vision: Let Our Acronyms Scan All Your Things

    Mar 31, 2022 · 9 min read · XFD7 Microsoft Threat-Detection  ·
    Share on:

    Microsoft presented their modern security vision this past week at Gestalt IT’s Security Field Day 7. They highlighted the importance of interconnectedness as a security practice as part of their “SIEM+XDM” security vision. The technology is compelling, but questions about manageability (and cost) remain.


    Read More
  • Security Field Day 7 - Details

    Mar 25, 2022 · 1 min read · Conference GestaltIt XFD7  ·
    Share on:

    I attended a very valuable and unique tech conference called "Security Field Day," put on by Gestalt IT. Read on to learn a little more about the event.


    Read More
  • Protect Your Data Too, Plz

    Mar 16, 2022 · 5 min read · Storage Zero-Trust Defense-In-Depth  ·
    Share on:

    Security conversations often revolve around outwardly-facing edge technologies like firewalls and IDS. These help harden the shell against external threats, but internal threats are just as dangerous. Data is what attackers want, which is why it's just as important to be vigilant about security inside the perimeter.


    Read More
    • ««
    • «
    • 1
    • 2
    • »
    • »»
Chris Hayner photo

Chris Hayner

IT Enterprise Architect and Security Professional focused on Infrastructure. CISSP, MBA, VCP, ETC. Splitting the difference between business and tech.
Chief Technologist at hmctechnology.com.
Read More

Featured Posts

  • AI: Is It Really THAT Bad?
  • Murphy's Endgame: It'll Definitely Go Wrong If We Never Even Try To Fix It
  • LastPass is (or should be) Toast

Recent Posts

  • AI: Is It Really THAT Bad?
  • Murphy's Endgame: It'll Definitely Go Wrong If We Never Even Try To Fix It
  • LastPass is (or should be) Toast
  • Cookies So Easy Even *I* Can Make Them??
  • Tech Field Day 26 - Event Details and Summary

Categories

SECURITY 12 TECHNOLOGY 4 INFRASTRUCTURE 3 CLOUD-COMPUTING 2 PERSONAL 2 PHILOSOPHY 2 ARTIFICIAL-INTELLIGENCE 1 PROGRAMMING 1 SITE-NEWS 1

Tags

SECURITY 5 STRATEGY 4 CONFERENCE 3 GESTALTIT 3 LEADERSHIP 3 XFD7 3 COST-MANAGEMENT 2 MICROSOFT 2 PASSWORD-MANAGERS 2 PERSONAL-SECURITY 2 POLICY 2 800-53 1 AI 1 AMAZON 1
All Tags
800-531 AI1 AMAZON1 AMAZON-ECHO1 BASH-SCRIPTING1 CERTIFICATION1 CFD141 CHRISTMAS1 CISSP1 CONFERENCE3 CONTINUOUS-IMPROVEMENT1 COOKIES1 COPILOT1 COST-MANAGEMENT2 CXL1 DATACENTER1 DEFENSE-IN-DEPTH1 FUTURISM1 GESTALTIT3 GITHUB1 INFRASTRUCTURE1 IOT1 ISC21 LEADERSHIP3 LEARNING1 MICROSOFT2 NETWORKING1 NIST1 OFF-MIC1 PASSWORD-MANAGERS2 PASSWORDS1 PERSONAL-SECURITY2 POLICY2 PRODUCTIVITY1 SECURITY5 SITE-UPDATES1 STORAGE1 STRATEGY4 TECH-DEBT1 TECHNOLOGY1 TFD261 THREAT-DETECTION1 UX1 XFD73 ZERO-TRUST1
[A~Z][0~9]
hayner.net Copyright  HAYNER.NET
All Rights Reserved
    Comments? chris@hayner.net
Mean comments? devnull@hayner.net