Articles
Do Employee Handbooks have a place in Startups and Small Businesses?
November 29, 2018
Stuart Hartley
November 29, 2018
Stuart Hartley

The employee handbook. For many, even just the mention of this particular document gives them unpleasant flashbacks to working under overbearing managers and bureaucratic HR reps who wield the handbook like a weapon. Almost anyone who has worked for a large company has a story or two that confirm...

Choosing a Domain for your Website
November 13, 2018
Tristan Knight
November 13, 2018
Tristan Knight

Your choice for your website's domain can be extremely crucial. Having a quality domain will make your website much easier to find via a google search and to remember and navigate to directly via the address bar. So how do you make sure that your domain name is ideal? Here are a few guidelines for choosing your domain:

C-Level: Is your business secure enough to survive open firewalls?
November 13, 2018
Cary Conrad
November 13, 2018
Cary Conrad

The most expensive firewall is pretty dumb. It can keep external probes from seeing what your Security Team wants to hide. In some cases, they are also configured to protect people within your company from wasting time or violating your network policies. There are no guarantees that these devices will protect your network, quite the opposite, near every network hack of note, was conducted through a firewall. The information assets that Firewalls protect are also secured in a variety of dissimilar ways so in a perfect world the Firewall is your front line of defense, information access policies are a secondary line of defense. In a very simple sense, firewalls are about noise reduction, blocking out a nearly infinite number of probes from an ever increasing number of probers. So, ponder for a minute, if you opened this electronic front door to the world what would happen? Would the damage be limited to only an increase in network noise?

C-Level: Fan Boy, XEB
November 13, 2018
Cary Conrad
November 13, 2018
Cary Conrad

In 1999 I was extremely busy. I had just started a company, my second, in the Network Security field which was new and unknown. Sales were slow, hacking was deep, deep inside campuses like Stanford and MIT and was considered sport. I was getting traction with banks and was in SF for a meeting. I remember walking down Mission past a guitar shop and hearing this song, guitar was hitting the tonic breaking into cool background riffs, a little vocal falsetto opening then breaking into verse…..broken and then back…..WTF. Reminiscent of a Cello piece I know……..inspired….. I stopped dead in my tracks - stunned. Who are these guys!?!

C-Level Security: Bank security and the egg timer (how good management trumps technology)
November 13, 2018
Cary Conrad
November 13, 2018
Cary Conrad

The development of technology for securing information has been advancing at a pace that is truly astounding. In 20 years the security industry has evolved from Sun Micro Systems' Sunscreen and the Cisco PIX (yes I know there were a few others) to over a thousand security products of which nearly 700 are currently VC funded. All are trying to generate business from within this ever advancing market currently called Cyber Security. There are few tech markets growing at the rate of Cyber Security and as a result we are seeing investors, in a near desperate attempt to gather slivers of this market, throwing money at companies with Rube-Goldberg-inspired technology. We now have a flood of technology solutions that no one person can understand and the customers that consume this technology struggle daily with supporting and operating these systems. Many of the C-Level executives reading this may want to consider a management solution for the next expensive problem your engineering team presents to you.

Cleanup Temporary Files used by Visual Studio
June 11, 2018
William Yeack
June 11, 2018
William Yeack

When building an application, Visual Studio (along with IIS and SQL Server) creates and use a lot of temporary files throughout your system. Often times, when something is not behaving as expected, it can be caused by old temporary files stuck somewhere in your system.To fix every possible scenar...

Starting a Blog
June 11, 2018
William Yeack
June 11, 2018
William Yeack

Here's a guide that will teach you how to start your blog and grow through its initial phases, along with some suggestions for ways you can potentially earn money from your blog.

What to Say to the C-Level, get your security project funded today!
November 17, 2018
Cary Conrad
November 17, 2018
Cary Conrad

In near every business adding costs to Information Systems will be seen, by the people running the business, as a cost first, benefit second. Remarkably this still holds true despite a constant pulse of security events hitting the C-Level desks. So let's, as security professionals, develop an understanding of the C-Suite and the C-Levels as to their priorities.

Setup Point-to-Site VPN with Ubiquiti EdgeRouter
January 12, 2018
William Yeack
January 12, 2018
William Yeack

Learn how to setup a VPN with your Ubiquiti EdgeRouter.

Using a Lenovo P51 Laptop with an Airplane Power Supply
June 11, 2018
William Yeack
June 11, 2018
William Yeack

The Lenovo P51 Laptop comes with a huge 170 watt Power Supply. However, airplane power supplies provide a maximum of somewhere between 75-100 watts. If you plugin a power supply requiring more watts, the circuit breaker will short out and the power will stop flowing.

C-Level Security: When your team uses Military Analogies, are they using The Wrong Narrative?
November 13, 2018
Cary Conrad
November 13, 2018
Cary Conrad

For years, I have bristled when people would use medieval military descriptions in an attempt to convey concepts within the Network Security business. Bastions, Firewalls, Moats, Drawbridges, Countermeasures; all of these descriptions give way to a more accurate and detailed explanation of w...

How to Start an Alumni Club
November 26, 2018
Stuart Hartley
November 26, 2018
Stuart Hartley

Alumni clubs are a great way to build friendships and connections with fellow alumni. They’re also a great way to discover career opportunities and support new alumni in your area. But what do you do if your college, fraternity, or other institution does not have an alumni club in your area? This guide will help provide some guidelines for creating and managing an alumni club.

Turning Atlassian JIRA into a CRM
July 11, 2018
Michael Joseph
July 11, 2018
Michael Joseph

Here at Member.buzz, we use Atlassian JIRA to track our features and bugs as well as track incoming requests from users through our Support Site. So when it came to choosing a CRM, we wanted to find one that integrated nicely with the rest of our infrastructure.Our first thought was to try out so...