Publications and Presentations by Teri Radichel


Tips for fewer firewall rules when you’re trying to block traffic from a network


2nd Sight Lab comments in highlighted in gray.

2nd Sight Lab News


How can you tell if your host is connecting to a C2 server?

If you still think you only need identity to secure your environment and no network security controls, you probably haven't studied many cyber attacks. Please start with this series of blog posts on the Solar Winds Hack. Understanding C2 servers is one of the most important concepts you need to know in cybersecurity.


Traffic you might not want to log in certain cases and why


A word of caution about container runtime security solutions


2nd Sight Lab comments in highlighted in gray.

2nd Sight Lab News


One basic rule filters out a whole lot of noise on your network


2nd Sight Lab comments and analysis highlighted in gray.

2nd Sight Lab News


A few tips on finding what matters on your home network

Teri Radichel

Cloud Security Training and Penetration Testing | GSE, GSEC, GCIH, GCIA, GCPM, GCCC, GREM, GPEN, GXPN | AWS Hero | Infragard | IANS Faculty | 2ndSightLab.com

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store