AGNI Configuring Arista AGNI with Meraki Access Points A high-level configuration guide for integration AGNI with Meraki AP's using RadSec and MAC based authentication.
Ransomware Ransomware: A Tale of Recovery Lessons and takeaways from ransomware response. My experience assisting the recovery efforts of a rural community.
Fido2 Converged Access Control and IAM Discovering converged access using HID RFID and NFC cards for Windows 10 logon and authentication.
Azure Azure AD Hybrid FIDO2 Security Key Sign-in A short version of using an Azure AD hybrid with security keys and group policy for Windows 10 logon.
Yubikey Yubikey (FIDO2) and Okta Gotcha! This security key doesn't look familiar. Please try a different one. Using Yubikeys with Okta Custom URLs and IWA Single Sign on.
Security Configuring Microsoft LAPs a detailed guide on how to configure Microsoft laps to rotate machine passwords in active directory.
Security Ransom on Hyper-V Nutanix Cluster Last year, I was engaged to assist in a severe ransomeware event for a third party organization. Unfortunately, when I arrived most of the network had been impacted and the
Security Lessons from a Ransomware Response When responding to a major event, there are a few simple things that we can do to prepare for a response.