Tony Karre, Author at Data & Analytics
Data & Analytics Blog

Tony Karre

OSCP, CEH, CSM, CSPO

Posts by this author:

How To Connect Your Android Phone To Your AWS-Based VPN Server

In my previous post, How to Set Up Your Own VPN Server Using Amazon Web Services, we set up and configured an OpenVPN server using Amazon Web Services, and then we configured Windows and Linux machines to use the new VPN server.  In this post, I’ll show you how to setup your Android phone to […]

Read more

How to Set Up Your Own VPN Server Using Amazon Web Services

A Virtual Private Network, or VPN, allows you to securely connect your computer to another computer network through the internet.  A VPN Server is the computer or network device that runs the VPN, and normally your computer will connect to a VPN Server to “get on the VPN”.  In this post I will show you […]

Read more

Building Your Own Personal Business Continuity Plan

Just like any small business, the operation of your own household depends on reliable processes and access to technology.  What would happen if your household suddenly lost access to critical services like bill pay, banking or investment websites, or maybe you lost your phone or laptop, or perhaps even lost you?  Just like that small business, […]

Read more

Panel Discussions: Do This, Not That

About a month ago I attended a local infosec panel discussion (Detect and Defend,  hosted by the St. Louis Business Journal).  I’ve seen a lot of panel discussions, and I’ve even been a panelist from time to time, but none of those events were as particularly engaging as this one.  All of the panelists seemed […]

Read more

Jump-Start Your Secure Coding Program With OWASP ASVS 3.0

The concept of secure coding used to be a little hazy, one of those you’ll-know-it-when-you-see it concepts.  Patterns for secure coding generally arrived as one-offs, where some vendor would recommend their product/library/framework  because it “solved critical security problem X and here’s why…”  Recently, however, the vast number of data breaches reported in the news has dramatically driven […]

Read more

4 Security Takeaways From The FBI

As IT consultants, we’re pretty sure that we’re smart enough to recognize phishing attacks against us. We all get emails asking us to open invoices, confirm our bank account information, or perform other actions designed to separate us from our credentials and our money. But according to a consultant specializing in penetration testing, 40% of us will still […]

Read more

Perficient Data & Analytics

Trends, best practices, and technical perspectives from data and analytics experts. Readers will gain valuable insights and strategies in harnessing the power of data to drive actionable intelligence for a digital transformation journey.

Archives