Tuesday, January 1, 2019

Create a Root Certificate, using XCA

There are scenarios that require you to implement your own private Certificate Authority (CA), such as VPNs, internal web servers, or client authentication to web servers.

This is the first article in a 3-part series, that explains how to generate a Root Certificate, Client Certificates and Server Certificates, for authentication. In this article, you will learn how to use a tool called XCA to create the Root Certificates, used to sign the Client and Server certificates later in this series.


Assumptions

  • Download XCA from http://sourceforge.net/projects/xca/
  • Install XCA (Admin Privilege Required)

Friday, September 21, 2018

GDPR Impact on Caribbean Organizations

The following slides were take from a presentation I made at the Regional Data Security Conference, on September 13 2018. It was organized by the American Chamber of Commerce Jamaica (AMCHAM Jamaica) in association with E-Biz ProTrain.





This talk is intended to share GDPR compliance from the perspective of a local organization, and its impact on how customer data is managed. 








Monday, October 30, 2017

Finding Malware in a Memory Image

The following slides were take from a presentation I made at the Jamaica Computer Society's 2017 Conference, on October 19, 2017.




This talks is intended to show how memory forensics can be used during incident response to detect the presence of running zero-day malware.