• Blog

  • Infosec Conferences, and Training

    Infosec Conferences and Training It's been a busy few months! We've had a lot going on with training and infosec conferences. Back in February I attended CPX 360 which is Check Point's conference. I was also a presenter at CPX 360 and talked about Check Point Endpoint, which is their endpoint [...]

    Read more

    Network Security Defense in Depth

    Network Security Defense in Depth is Failing Network security and defense in depth seem to be all I hear about lately. We use that term "defense in depth", but do we really know what it means? We discuss the layers of security such as appliances, software, processes, and procedures, but we miss what[...]

    Read more

    SANS SEC504 Course Oklahoma City Get Your GCIH Certification

    SANS SEC504 Course Oklahoma City Our very own Joe Sullivan will be mentoring the SANS SEC504 Hacker Tools, Techniques, Exploits, and Incident Handling course here in Oklahoma City.This course contains elements of both offense and defense. You will learn how to hack into systems, attack [...]

    Read more

    What Does Crossroads Information Security Do?

    Crossroads Information Security Crossroads Information Security is an information security company. You may be asking yourself: What does Crossroads Information Security do?The answer can be found in: Why does Crossroads Information Security perform information security services?Crossroads [...]

    Read more

    Gifts for Information Security Geeks

    Updated for 2021 Gifts for Information Security Geeks are hard to find according to my wife. If you are looking for a gift for an information security geek this holiday season, I've put together some ideas for you. Raspberry Pi - Coming in at around $99.00 the Raspberry Pi 4 will provide lots of [...]

    Read more

    Password Complexity

    November 26, 2017
    Password Complexity

    Password Complexity Password Complexity is a debate that comes up at almost every penetration test. As part of our penetration tests we capture and crack password hashes. When we do this we are looking at two things:How easy are the hashes to obtain How long does it take to crack them so [...]

    Read more

    Cyber Insurance Coverage

    November 23, 2017
    Cyber Insurance Coverage

    Cyber Insurance Coverage Cyber Insurance seems to be the hot discussion topic for the past few months. I'm sure all the breaches, ransomware, and government hacking tools that have been released are the main fuel for these discussions taking place. Without getting into a post on doing a risk [...]

    Read more

    Network Security Today

    November 18, 2017
    Network Security Today

    Network Security in Today's World Network security is all over the news and even television shows lately. You may be wondering how to secure your personal data, or if you own a company, how to secure your corporate network. All the marketing targeting information security professionals is laughable[...]

    Read more

    4 of page 4