Tools for Sysadmin - Managing IT Assets the Right Way 24 May 2022·2029 words·10 mins by: Tuomas Haarala What cyber security hurdles can you overcome with the right tools and knowing which problem they address for you?
A Discrete Affair 19 April 2022·1401 words·7 mins by: Antti Kurittu Love can be as beautiful as a sunset, but don’t let deception cast a shadow — how to spot romance scams.
A Sysadmin's Perspective of IT Asset Management 7 April 2022·2410 words·12 mins by: Tuomas Haarala IT systems administrations and financial administrations can both benefit from working together on IT asset management.
Practical Methods for Assessing Your External Attack Surface 22 March 2022·2271 words·11 mins by: Juhani Eronen The siege of Château Gaillard between September 1203 and March 1204 is a good example of determined attackers exploiting a weakness in the defenders’ threat model. As the story has it, a French soldier clambered up the latrine chute and let in his compatriots to take over the castle.
Public Exposure 8 March 2022·1474 words·7 mins by: Lari Huttunen Jätkänkynttilä bridge in Rovaniemi, Finland.