Mike BurnsinThink|StackCentrally Managing Google ChromeI’ve been reading a lot about various vulnerabilities in Google Chrome Extensions, not to mention straight up malicious Extensions. This…Mar 5, 2019Mar 5, 2019
Mike BurnsinThink|StackBeing Proactive Can Be as Simple as Giving Up a Seat at the TableI think I speak for everyone in the IT Security Community when I say our efforts to be proactive are often met with rolling eyes, sighs…May 30, 2018May 30, 2018
Mike BurnsinThink|StackWe don’t take Cybersecurity Seriously EnoughLack of sharing breach InformationApr 26, 2018Apr 26, 2018
Mike BurnsinThink|StackPreventing Lateral Movement Using Network Access GroupsAt least once a week I get on a rant about network segmentation. After all, it is one of the NSA Top Ten Cybersecurity Mitigation…Apr 19, 20182Apr 19, 20182
Mike BurnsinThink|StackThe Case for Monitoring Internal Network ActivityAs a Security Engineer, you are always looking to get your hands on the best tools to defend your network. One security appliance I have…Mar 15, 2018Mar 15, 2018
Mike BurnsinThink|StackDude, Where’s my Phone?, ask AirWatchLooking outside at 6:30 AM to see 9 inches of snow resting on top of a hotel shuttle van is something I have been waiting for just as long…Mar 9, 2018Mar 9, 2018
Mike BurnsinThink|StackMSP: Managing Vendors During Spectre and MeltdownAt Think|Stack, we have a un-official “Preferred Vendors” list. These are tools and products we utilize in our client’s networks that we…Jan 11, 2018Jan 11, 2018
Mike BurnsinThink|StackRunning the Intel Meltdown Detection Tool(Update: 1/5/2018 9:51AM — By the time I finished this entry, both Microsoft and US-CERT removed their recommendation that this was…Jan 5, 20181Jan 5, 20181