carpeinferi.bsky.social
@carpeinferi.bsky.social
I am who I am, but who am I?
Wild seeing the northern lights this far south yet again.
November 12, 2025 at 4:09 AM
5+ years of trees and limbs stacked into a SUV sized mound reduced to a small pile in only 4 hours. Now to decide how long to let this go before dousing it.
November 1, 2025 at 11:05 PM
Have some of my blood
November 1, 2025 at 9:31 PM
It's quite nice that @1password allows for a gentler approach to device remediation that enables customizable self-service instructions on how to remediate the issue and explain the why of it. Instructions can include tie-ins to your MDM or documentation webpages. #xfd14
September 25, 2025 at 8:20 PM
The access trust gap... The intersection of managed and trusted devices, users, & applications and those that you do not know or trust. @1password aims to solve that by securing every sign-in to any app on any device. Combining SSO/IdP, IGA, and MDM into one solution. #XFD14
September 25, 2025 at 8:09 PM
Why an extension vs dedicated browser? Ease of deployment, user adoption, and updating. Getting users to change how they operate is often a challenge, so meeting them where they are is key. @squarex #xfd14
September 25, 2025 at 6:17 PM
The attack graph in the @squarex portal can show both a single user view or multiuser view if multiple individuals fell for the same attack of how the user(s) ended up at downloading the infected file. #xfd14
September 25, 2025 at 5:56 PM
Having policy access displayed in a chart like this makes verifying who can talk to who very quick and easy at a glance. #xfd14
September 25, 2025 at 4:07 PM
Having NAC built into the architecture to provide user based microsegmentation with SSO authentication via SAML with major providers such as Okta, Azure Entra, etc. is quite appealing. NAC planning and deployment can get quite daunting depending on the industry vertical. #xfd14
September 25, 2025 at 3:47 PM
Effectively each client in a @nilesecure environment is in its own /32 based upon user identity.

As well the management plane is secured via TPMs, MACsec, and mutual auth between all elements. #xfd14

September 25, 2025 at 3:42 PM
Effective and functional microsegmentation with a blast radius of 1 is quite the claim, especially in a world where many don't know what systems should be talking to each other. Interested in learning how they get there without breaking environments. #xfd14
September 25, 2025 at 3:33 PM
@nilesecure Network as a Service architecture at a high level #xfd14

September 25, 2025 at 3:20 PM
How do you solve the complexities of Zero Trust? You don't just bring in another box, you have to rethink things using a new model. @nilesecure #xfd14

September 25, 2025 at 3:15 PM
With most cloud providers pushing you to utilize their DNS infrastructure it can be a challenge to protect your cloud assets. In a partnership with Google @infoblox has integrated Threat Defense into DNS Armor for seamless protection. #xfd14
September 24, 2025 at 10:16 PM
"Our analysis highlighted that using secure DNS would reduce the ability of malware attacks by 92%" - Anne Neuberger, former director of cybersecurity directorate NSA

If you can break the communication chain, you break the malware. #xfd14
September 24, 2025 at 9:57 PM
DNS seems like an odd area to talk security till you realize that DNS is often the first step in communications in any threat vector from phishing to C&C botnet traffic. @Infoblox Threat Defense offers you protection at that layer w/0 added load on your endpoint devices. #XFD14
September 24, 2025 at 8:48 PM
To me it's less about protection via DNS or FW but integrating the two together. @Infoblox's threat intelligence data is a great addition to your NGFW via EDLs. #xfd14
September 24, 2025 at 8:33 PM
Got SD-WAN? @HPE Networking has 3 solutions to serve different use cases and all operate as edge firewalls as well: Juniper Session Smart Routers, Aruba EdgeConnect (SilverPeak) and Aruba MicroBranch. #XFD14
September 24, 2025 at 5:02 PM
SecOps targeted dashboard to aid in seeing where an organizations threats come from, and who the targets/suspects are.

This ideally would expedite triage & remediation.

#XFD14

September 24, 2025 at 4:46 PM
How does HPE @junipernetworks threat labs operate? Monitoring for threats, develop detection methods aiming for zero false positives, then share the threat intel with 3rd parties. #XFD14
September 24, 2025 at 4:23 PM
September 14, 2025 at 11:14 PM
Yeah… that’s a report and block…

Platforms constantly go on the attack against consensual adult nudity, but let crap like this involving children fly by.
August 18, 2025 at 1:36 PM
My response was a tad too loquacious so here is a screenshot of it
August 11, 2025 at 9:00 PM
So much for making soup; guess this could generously be called a stew.
November 10, 2024 at 2:41 AM
Reminder from when I needed out with Cricket Lou about DNS
November 9, 2024 at 8:33 PM