Digital Transformation

A Roadmap to a Rewarding Career in Cybersecurity: A Guide for Beginners

Introduction Are you considering a career in cybersecurity? That’s a fantastic choice! The world of cybersecurity is dynamic, challenging, and highly rewarding. Whether you’re a recent graduate or someone looking to make a career change, there’s a place for you in this ever-evolving field. A cybersecurity bootcamp student recently reached out to me on LinkedIn to ask exactly how to do this. In this post, I will share some of my advice in a more blog-friendly format. I’ll walk you through some steps to break into the cybersecurity industry successfully. ...

September 11, 2023 · 5 min · Robert D. White
Digital Transformation

Unlocking Digital Transformation: The Crucial Role of IT Services

Introduction In today’s rapidly evolving business landscape, digital transformation has become more than just a buzzword—it’s a strategic imperative. Organizations worldwide are harnessing technology to enhance processes, elevate customer experiences, and stay ahead in the competitive race. Amid this digital revolution, IT services emerge as indispensable allies, guiding and empowering organizations in their transformative journey. Let’s explore how IT services play a pivotal role in driving this essential shift. 1. Technology Assessment and Planning IT services providers begin by meticulously evaluating your existing IT infrastructure, systems, and processes. Through this comprehensive assessment, they identify gaps, recognize untapped potential, and craft a well-defined roadmap for your digital transformation endeavors. ...

September 10, 2023 · 4 min · Robert D. White
Matrix Server Logo

My Encrypted Matrix Server with Docker-Compose

Overview In this post, I will detail how I run my Matrix Server with Docker-Compose, how I use my Matrix Server as an encrypted notifications hub, and how I federate my Matrix Server over a Cloudflare tunnel (using Cloudflare’s Zero Trust interface). Short Cybersecurity Note Matrix Servers can be a part of your cybersecurity stack in your homelab or business. The component pertinent to cybersecurity related to Matrix Servers is encryption. If you’re pursuing a CISSP, you will want to be highly familiar with encryption and the process by which it is achieved. ...

April 16, 2023 · 13 min · Robert D. White
pfSense, Unifi, & PIA Graphic

Policy Based Routing with Unifi, PIA, and pfSense: How I Route My IoT External Traffic through PIA VPN

Introduction In this post, I will show you how to use policy-based routing in Unifi to route specific traffic through a VPN client (I use Private Internet Access) on pfSense. This setup allows you to retain complete control of your devices and subnets via Unifi’s Network app while taking advantage of pfSense’s ability to host a VPN client. With this setup, I am getting my full ISP speeds on devices using a VPN for encryption. Depending on your hardware, you should be able to get full speeds as well. ...

November 7, 2022 · 6 min · Robert D. White
pfSense, Unifi, & PIA Graphic

How to Use pfSense and Unifi to Anonymize and Encrypt VLAN Tagged Traffic

#UPDATE 11/05/2022 Original post date: 2021-04-05 This update contains specific configuration options to use 4096 bit RSA keys, SHA256 Auth digest algorithm, and AES256 encryption. The original post used the default key length of 2048 from PIA, SHA1, and allowed for AES128. Throughout the post, I will tag updated information with #Update. Introduction This post aims to show you how to use pfSense within a Unifi network behind a Unifi Gateway [in my case, the gateway is the Unifi Dream Machine Pro (hereafter referred to as UDMP)]. I will explain my current network configuration including applicable subnets, VLANs, and wireless SSIDs needed to make this setup successful. The end goal is to be able to add a client on my Unifi network to a particular VLAN either by joining this client wirelessly to a particular SSID or by tagging the client’s physical port to that VLAN. This VLAN will be tied to a subnet that sends data through the pfSense machine which is acting as a VPN client (I use Private Internet Access). This method allows the UDMP to continue to act as the DHCP server for these clients while allowing pfSense to anonymize and encrypt the data of the clients in question. ...

November 5, 2022 · 11 min · Robert D. White