Robert R. Herbaugh

security aficionado. technology enthusiast. driven innovator.

Tag: IT Infrastructure

Elevating Email Security: The Power of SPF, DKIM, and DMARC

Discover the pivotal roles of SPF, DKIM, and DMARC in fortifying your email security, ensuring your messages are safeguarded against the most sophisticated cyber threats. Learn how EasyDMARC can streamline the deployment process, making advanced email protection accessible and straightforward.

Deploying Authentik for Single Sign-On: A Comprehensive Guide

Discover the seamless integration and enhanced security of deploying Authentik for Single Sign-On (SSO), a pivotal move towards streamlined access across multiple applications. Follow our comprehensive guide to leverage Authentik’s robust features, including detailed steps for Docker Compose deployment and Cloudflare configuration, to protect and simplify your digital landscape.

From Spreadsheets to Scalability: Revolutionizing Homelab Management with Django, MySQL, and Docker

Discover the transformative journey from spreadsheet-based homelab management to a custom, sleek, efficient web application using Django, MySQL, and Docker. This blog post details the learning curve, challenges, and ultimate success of embracing development, containerization, and CI/CD processes with the help of ChatGPT.

Streamlining Web Browser Updates with Level: A Step-by-Step Guide

Explore the power of Level RMM in automating web browser updates with this step-by-step guide. Streamline your IT management for enhanced security and efficiency.

Streamline IT Management: Enable Secure Operations Across Your Enterprise with Level

Today I’m talking about Level! Level is a robust Remote Monitoring and Management (RMM) solution, offering extensive support for Windows, macOS, and Linux. It’s designed for MSP/MSSPs and IT teams of all industries/sizes, emphasizing security, efficiency, and scalability. With affordable, flexible plans and comprehensive remote capabilities, Level empowers IT teams to manage diverse environments effectively, all while ensuring top-tier security and compliance.

Managing Vulnerability Remediation: The Case of Google Chrome and Wazuh

Discover the critical importance of timely vulnerability remediation as we dive into managing high-risk exposures from outdated Google Chrome versions reported by Wazuh. Learn how a crafted ChatGPT script and strategic use of RMM tools can effectively mitigate security threats and streamline software updates.

Enhancing Home Lab Security with Wazuh: A Guide to Open-Source SIEM & XDR

Explore the robust capabilities of deploying Wazuh open-source SIEM & XDR in a home lab setting. Learn how to secure personal devices, adhere to NIST 800-53 standards, and leverage advanced monitoring techniques to enhance your cybersecurity posture.

Deploying Security Onion: A Deep Dive into Network Traffic and Threat Hunting

In my latest project, I’ve deployed a standalone version of Security Onion to my home lab, significantly enhancing my ability to monitor network traffic and proactively hunt for threats. The journey, filled with insights from Squert and Kibana and the discovery of subtle anomalies, underscores the importance of continuous vigilance and learning in cybersecurity.

From Humble Beginnings to Enterprise Excellence: My Home Lab’s Transformation

In the transformation of my home lab, I’ve progressed from modest beginnings to a sophisticated enterprise environment, marked by an array of Dell servers and a Ubiquiti 48-port switch. This journey is not just about technological upgrades but a testament to continuous learning and passion for innovation in the realm of information technology.

Diving Back into Learning: My LinkedIn Learning Journey – The Continuation

In my latest endeavor on LinkedIn Learning, I’ve uncovered profound insights into the subtleties of cybersecurity program management through Matthew Rosenquist’s course, “Five Biggest Mistakes of Cybersecurity Programs.” This journey has not only enhanced my strategic foresight but also resonated with my professional experiences, driving a deeper understanding of how to navigate and bolster modern security challenges.