Joshua BurnsA word on PassKeysThe password. An ancient technology that dates back to the 1960s. Though arguably anecdotal, it seems that the ever-increasing dependence…Sep 9, 2023Sep 9, 2023
Joshua BurnsEnabling HashiCorp Vault Auto-Unseal using Cloud Key VaultsIn order to be open for use, a HashiCorp Vault secrets management implementation must be “unsealed” after it is installed, running, and…Sep 6, 2023Sep 6, 2023
Joshua BurnsSecuring SSH service with smart cardsAs security continues to be of paramount importance in a variety of systems — from desktops to servers, virtual machines, containers, IoT…Aug 22, 2023Aug 22, 2023
Joshua BurnsSecuring your Ubuntu desktop with Smart Card authenticationIn today’s security-challenged climate, there is an ever-increasing motivating factor behind improving stock security — from highly…Aug 19, 20231Aug 19, 20231
Joshua BurnsIntegrate HashiCorp Vault with OpenShiftThis article will explain how pods running in OpenShift can leverage secrets in an external implementation of HashiCorp Vault. OpenShift is…Jul 25, 2023Jul 25, 2023
Joshua BurnsSecrets Management in the Financial Industry Using HashiCorp VaultAn introduction to Vault, its capabilities and use casesFeb 15, 2022Feb 15, 2022
Joshua BurnsImprove SOHO BCP and security with a low-cost out-of-band solutionLots of IT professionals wear multiple hats. In fact, lots of professionals wear multiple hats — if you work in a small office, and are…Jun 27, 2020Jun 27, 2020
Joshua BurnsDeploying and securing tailored IPv6 to IPv4 translationHow I worked around a surprise gap in our ISPs IPv6 serviceJun 27, 2020Jun 27, 2020
Joshua BurnsIPv6: Building a router/firewall in Linux with IPv4 and IPv6 capabilitiesThe highlights of what is required under the hood in a RHEL/CentOS implementationJun 26, 2020Jun 26, 2020
Joshua BurnsDefense in Depth and the CloudHow DiD principles are re-shaping IT in the financial sector — and how cloud adoption can accelerate and simplify achieving a DiD…Jun 25, 2020Jun 25, 2020