Robert R. Herbaugh

security aficionado. technology enthusiast. driven innovator.

Category: Cybersecurity

YubiKey SSH Manager: Secure & Seamless SSH Authentication on macOS

YubiKey SSH Manager is a macOS menu bar application that simplifies SSH authentication using your YubiKey’s self-signed certificate. With a built-in web interface for managing servers and automatic public key deployment, it provides a seamless and secure way to access your SSH servers without passwords.

Elevating Email Security: The Power of SPF, DKIM, and DMARC

Discover the pivotal roles of SPF, DKIM, and DMARC in fortifying your email security, ensuring your messages are safeguarded against the most sophisticated cyber threats. Learn how EasyDMARC can streamline the deployment process, making advanced email protection accessible and straightforward.

Deploying Authentik for Single Sign-On: A Comprehensive Guide

Discover the seamless integration and enhanced security of deploying Authentik for Single Sign-On (SSO), a pivotal move towards streamlined access across multiple applications. Follow our comprehensive guide to leverage Authentik’s robust features, including detailed steps for Docker Compose deployment and Cloudflare configuration, to protect and simplify your digital landscape.

Navigating Security Upgrades: Keycloak and PostgreSQL for SSO

In this detailed exploration, we delve into the critical process of upgrading Keycloak and PostgreSQL to enhance SSO and MFA security, sharing firsthand insights and a step-by-step guide. Discover the importance of keeping digital identity management systems up-to-date in a world where cybersecurity threats are constantly evolving.

Streamline IT Management: Enable Secure Operations Across Your Enterprise with Level

Today I’m talking about Level! Level is a robust Remote Monitoring and Management (RMM) solution, offering extensive support for Windows, macOS, and Linux. It’s designed for MSP/MSSPs and IT teams of all industries/sizes, emphasizing security, efficiency, and scalability. With affordable, flexible plans and comprehensive remote capabilities, Level empowers IT teams to manage diverse environments effectively, all while ensuring top-tier security and compliance.

Managing Vulnerability Remediation: The Case of Google Chrome and Wazuh

Discover the critical importance of timely vulnerability remediation as we dive into managing high-risk exposures from outdated Google Chrome versions reported by Wazuh. Learn how a crafted ChatGPT script and strategic use of RMM tools can effectively mitigate security threats and streamline software updates.

The Future of Cybersecurity Automation: Insights from My Talk with SkyKick

In a recent conversation with SkyKick, I shared my insights on the future of cyber security for MSPs, emphasizing the shift towards a security-centric approach and the vital role of automation in enhancing efficiency and response. This talk highlights my journey and strategies in navigating the evolving landscape of cyber threats and protection measures.

Enhancing Home Lab Security with Wazuh: A Guide to Open-Source SIEM & XDR

Explore the robust capabilities of deploying Wazuh open-source SIEM & XDR in a home lab setting. Learn how to secure personal devices, adhere to NIST 800-53 standards, and leverage advanced monitoring techniques to enhance your cybersecurity posture.

Unlocking Opportunities: The Advantages of Becoming Microsoft Certified

In the fast-paced world of technology, staying ahead requires continuous learning. As I pursued Microsoft Certifications, I found they not only demonstrated my expertise but also opened up new career opportunities. My journey to obtaining the AZ-900 and MS-900 certifications involved dedicated study and leveraging helpful resources like John Savill’s Technical Training. Now, my next goal is to pursue the SC-900 for Cybersecurity excellence, emphasizing the continuous journey of professional development in today’s digital landscape.

Deploying Security Onion: A Deep Dive into Network Traffic and Threat Hunting

In my latest project, I’ve deployed a standalone version of Security Onion to my home lab, significantly enhancing my ability to monitor network traffic and proactively hunt for threats. The journey, filled with insights from Squert and Kibana and the discovery of subtle anomalies, underscores the importance of continuous vigilance and learning in cybersecurity.