<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>automation on Privacy, Power, &amp; Protection In The Cyber Century</title>
    <link>https://blog.eutopian.io/tags/automation/</link>
    <description>Recent content in automation on Privacy, Power, &amp; Protection In The Cyber Century</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <copyright>All rights reserved - 2017</copyright>
    <lastBuildDate>Fri, 30 Jun 2017 12:00:30 +0000</lastBuildDate><atom:link href="https://blog.eutopian.io/tags/automation/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Winning Systems &amp; Security Practitioners 3. Responsiveness</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-3.-responsiveness/</link>
      <pubDate>Fri, 30 Jun 2017 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-3.-responsiveness/</guid>
      <description>1100 words, 4 1/2 minutes.
Responsiveness &amp;ldquo;No battle plan ever survives contact with the enemy&amp;rdquo; - Helmuth von Moltke.
This is part 3 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you possibly decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 1. Introduction</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-1.-introduction/</link>
      <pubDate>Fri, 30 Jun 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-1.-introduction/</guid>
      <description>1100 words, 4 1/2 minutes.
Introduction &amp;ldquo;Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.&amp;quot; - George S. Patton
If you&amp;rsquo;ve read my previous postyou&amp;rsquo;ll know that to get beneficial, long lasting, low-maintenance results in Information Security, you need winning systems. Not skills. If you like grinding monotony punctuated by periods of extreme stress and being able to tell people how busy you constantly are, you can safely return to your to-do list.</description>
    </item>
    
    <item>
      <title>Elephant Proofing Your Web Servers</title>
      <link>https://blog.eutopian.io/elephant-proofing-your-web-servers/</link>
      <pubDate>Wed, 31 May 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/elephant-proofing-your-web-servers/</guid>
      <description>750 words, 3 minutes. The Case For Default Deny What&amp;rsquo;s free, permanently reduces your exposure to a range of potential vulnerabilities, requires no maintenance, and takes only a few minutes to implement?
Most web servers are installed to serve content to unauthenticated users on the Internet. Most only have a finite list of URLs or a specific number of web apps. I&amp;rsquo;ve always thought it strange that they install in a default-permit mode.</description>
    </item>
    
  </channel>
</rss>
