Security in Obscurity

Published Works by Jeff Stein

Achieving Effective User Lifecycle Management Through Automation

Cyber Defense Magazine, April 2020

Automating user lifecycle management is an important topic not only to the security of an organization but also to the overall function of an enterprise. By achieving effectiveness through automation in your user lifecycle management process you will not only increase the productivity of your operational teams through the reduction of work required to manage the user lifecycle, but also add effective security controls to your information security program.


Effectively Using Email Authentication Standards for Stronger Message Integrity

Cyber Defense Magazine, October 2019

The regularity at which domains are spoofed by malicious senders illustrates the issue and the need for message integrity in email. Where the original SMTP standard is lacking from a security design standpoint, standards are now available to compliment SMTP that provides a more secure messaging experience. Communication can be sent over TLS to provide for encryption and therefore, confidentially of email during transmission. From a message integrity standpoint, a combination of three email authentication standards, SPF, DKIM, and DMARC provides for a secure implementation of email.


The Importance of HTTPS to your Website

Enterprise Security Magazine, July 2019

Protecting a website requires an undivided focus not only on the web assets and code contained on a site but also the transmission of data traversing the internet itself. The importance of leveraging HTTPS as a part of a comprehensive web security strategy cannot be understated. Not only should HTTPS be considered fundamental in protecting data in transit across the web, but it can also play a very significant part in building customer trust in your website and security posture.


Finding Ways to Successfully Implement Vulnerability Management

Enterprise Security Magazine, March 2019

The importance of and need for a well-defined and properly implemented vulnerability management program continues to increase as the technology we utilize and the industry driving it changes. New arenas such as cloud computing and distributed workforces with BYOD policies contribute new challenges in how the enterprise addresses security and vulnerability management. Additionally, the growing demand for security-focused talent raises a business’ expectations for higher performance from security teams, typically with reduced headcounts than in years previous. Thus, maximizing your vulnerability management program greatly benefits your security posture.


Tags

Thoughts Scripts Published Works Courses