Recent posts

Quick And Easy Ways to Protect Your Company From CEO Fraud

  5 minute read  

In this blog post iโ€™m going to share one quick and easy technique you can use to protect your company from 2 different types of CEO fraud. The technique I detail in this blog post is not the only way to detect these emails. Itโ€™s just one of many ways. Also. please know that nothing in this blog post is new or ground breaking. I donโ€™t propose any new fancy techniques. There are times in security...

Using Powershell and Microsoft EWS Managed API to download attachments in Exchange 2016

  7 minute read  

Have you ever used a piece of software that provides no way of saving attachments or reports directly to a file? Yeah, me too. Itโ€™s frustrating. Iโ€™m very passionate about automating repetitive tasks and the frustration Iโ€™ve had over this particular issue has caused me to look into a solution. What I found was that I can use my beloved Powershell, in combination with Microsoft Exchange Web Servi...

Themes and Thoughts from the 2018 NYS Cybersecurity Conference

  5 minute read  

I had the opportunity to attend the 2018 NYS Cybersecurity Conference held in Albany NY. The conference is held every year in June and this year marked 21 years of the conference. Iโ€™ve attended this conference twice now, the first time last year (2017), and I always get a lot of value from this trip. This time I had the chance to also take a full day of training on the topic of DevSecOps (which...

My 5 Step Infosec Learning Methodology

  5 minute read  

Learning (Noun): The acquisition of knowledge or skills through experience, study, or by being taught. There are many ways to learn and everyone has a different style that works best for them. When reading my thoughts below take into consideration that I much more prefer audio/video than reading. To me this is because when it comes to audio I can listen passively while I do something else, like...