<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[YourNetGuard.com]]></title><description><![CDATA[My personal Substack]]></description><link>https://www.yournetguard.com</link><image><url>https://substackcdn.com/image/fetch/$s_!QtYH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69da48d6-1c64-435b-b850-962e23bf1d4e_144x144.png</url><title>YourNetGuard.com</title><link>https://www.yournetguard.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 02:38:41 GMT</lastBuildDate><atom:link href="https://www.yournetguard.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ronald McCarty]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[yournetguard@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[yournetguard@substack.com]]></itunes:email><itunes:name><![CDATA[Ronald McCarty]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ronald McCarty]]></itunes:author><googleplay:owner><![CDATA[yournetguard@substack.com]]></googleplay:owner><googleplay:email><![CDATA[yournetguard@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ronald McCarty]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Zero Trust Principals in AI System Development: AWS Capabilities]]></title><description><![CDATA[In the first part of my light introduction to applying Zero Trust principals to development of your AI system, I focused on data protection within the context of CISA's Zero Trust Maturity Model 2: aApplying Zero Trust to your Artificial Intelligence (AI) System Development]]></description><link>https://www.yournetguard.com/p/zero-trust-principals-in-ai-system</link><guid isPermaLink="false">https://www.yournetguard.com/p/zero-trust-principals-in-ai-system</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Tue, 27 Feb 2024 17:10:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9dcf4893-40ee-4b86-bb06-a2fc249f348c_1080x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the first part of my light introduction to applying Zero Trust principals to development of your AI system, I focused on data protection within the context of CISA's Zero Trust Maturity Model 2: a<a href="https://www.yournetguard.com/p/applying-zero-trust-to-your-artificial">Applying Zero Trust to your Artificial Intelligence (AI) System Development</a></p><p>In this segment, we will sample some of Amazon Web Services that can play a part in data protection. The table AWS Service features with Data Protection provides a light sampling of services that you can leverage. For a complete list of AWS FIPs products check out: <a href="https://aws.amazon.com/compliance/fips/">https://aws.amazon.com/compliance/fips/</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xGGU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xGGU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xGGU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xGGU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xGGU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xGGU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg" width="1054" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1054,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xGGU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xGGU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xGGU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xGGU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45216d71-6cda-4ea7-ac9e-2bc1a9f25a0e_1054x1000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AWS Service Features with Data Protection</figcaption></figure></div><p>Your source data used for training your AI may be in a format that is directly supported by AWS features, or you may need to transform the data for AI learning ingest. Regardless of data format, protecting the data at rest and in transit can leverage cloud provider, government approved FIPs protections. I'll consider specific FIPs topics in a future microblog.</p><div><hr></div><p>Check out my recent blog with T-Rex: <a href="https://www.trexsolutionsllc.com/secure-by-design-and-zero-trust-integrating-supply-chain-risk-management-with-devsecops/">SECURE BY DESIGN AND ZERO TRUST: INTEGRATING SUPPLY CHAIN RISK MANAGEMENT WITH DEVSECOPS</a></p><div><hr></div><p></p>]]></content:encoded></item><item><title><![CDATA[Applying Zero Trust to your Artificial Intelligence (AI) System Development]]></title><description><![CDATA[In government networks, applying CISA&#8217;s Zero Trust principles with the NIST Artificial Risk Management Framework (NIST AI RMF 1.0) crafts a powerful security strategy for your AI systems.]]></description><link>https://www.yournetguard.com/p/applying-zero-trust-to-your-artificial</link><guid isPermaLink="false">https://www.yournetguard.com/p/applying-zero-trust-to-your-artificial</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Mon, 26 Feb 2024 17:01:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/08fd3116-5297-40b7-9529-9579d29d62dd_1080x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In government networks, applying CISA&#8217;s Zero Trust principles with the NIST Artificial Risk Management Framework (NIST AI RMF 1.0) crafts a powerful security strategy for your AI systems. In this digital transformation era, where AI technologies play a central role across various sectors, ensuring the security and integrity of our data that feeds AI is paramount.</p><p>In this blog, I&#8217;m focusing on the AI RMF <em><strong>MAP</strong></em> core function and aligning with CISA&#8217;s Data Pillar to provide a quick start in assisting on ensuring a Zero Trust approach to your AI endeavors.&nbsp; Future blogs will cover the Govern anchor for the AI RMF core as well as the measure and manage functions.</p><p><strong>Map: &#8220;Context is recognized and risks related to context are identified&#8221;</strong></p><p>Although you need to work through the specifics of your AI system and most importantly your data sources to protect in your AI systems, the CISA Zero Trust Maturity Model 2 gives us a head start on approaching the mapping.</p><p>The two major functional concepts from the CISA Data Pillar and summarized for this blog are:</p><ul><li><p>Data - inventory, categorization, availability</p></li><li><p>Data - protection and controls</p></li></ul><p>For this example, we will go deeper on the protection and controls which will help you map your protection and show the aligning between ZT and AI RMF.</p><p><strong>Data - Protection and Controls Snippet from Risk Catalog</strong></p><p>Here are some sample risks that would be considered on an AI system that provides a web interface for user interaction and an API for the data query:</p><p><em>Risks:</em></p><ol><li><p>Unauthorized access via AI APIs or AI BPIs API. Errors or manipulation of API provides direct access to agency data bypassing functional (safe) queries</p></li><li><p>Inline data points on premise or cloud can intercept protected traffic with network monitorin</p></li></ol><p>Possible Controls Solutions:&nbsp; API or BPI application level fireballing (native), or Standalone Application Level firewall, or LOAD balancers with API policy.</p><p><strong>Summary</strong></p><p>This alignment, at AI design kickoff will give you lift across both the NIST AI RMF and the CISA Zero Trust Maturity Model 2 and avoiding having to bolt on security later.</p><p>I will cover the other Core functions of the NIST AI RMF in future blogs.</p><p><strong>References:</strong></p><p>NIST Artificial Intelligence Risk Management Framework (AI RMF 1.0): <a href="https://nvlpubs.nist.gov/nistpubs/ai/nist.ai.100-1.pdf">https://nvlpubs.nist.gov/nistpubs/ai/nist.ai.100-1.pdf</a></p><p>CISA Zero Trust Maturity Model 2.0: <a href="https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf">https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf</a></p>]]></content:encoded></item><item><title><![CDATA[Enhancing Federal Agency Security: New Logging Capabilities Introduced]]></title><description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the Office of Management and Budget (OMB) and Microsoft, has taken significant steps to bolster security for federal agencies. By introducing advanced logging capabilities]]></description><link>https://www.yournetguard.com/p/enhancing-federal-agency-security</link><guid isPermaLink="false">https://www.yournetguard.com/p/enhancing-federal-agency-security</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Fri, 23 Feb 2024 16:54:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5fbd205f-dbe1-4e48-9ae9-306efa11545e_1080x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <strong>Cybersecurity and Infrastructure Security Agency (CISA)</strong>, in partnership with the <strong>Office of Management and Budget (OMB)</strong> and <strong>Microsoft</strong>, has taken significant steps to bolster security for federal agencies. By introducing advanced <strong>logging capabilities</strong>, agencies gain improved visibility into network activities, enabling more effective threat detection and response.</p><p>This initiative addresses vulnerabilities in <strong>Ivanti Connect Secure</strong> and <strong>Ivanti Policy Secure</strong> appliances, which were actively exploited by cyber threat actors. The directive emphasizes immediate action to safeguard federal systems and underscores the importance of risk reduction across all organizations using these products.</p><p>Read more about this collaboration here: <a href="https://www.cisa.gov/news-events/news/cisa-omb-oncd-and-microsoft-efforts-bring-new-logging-capabilities-federal-agencies">https://www.cisa.gov/news-events/news/cisa-omb-oncd-and-microsoft-efforts-bring-new-logging-capabilities-federal-agencies</a></p><p>#securebydefault #securebydesign #zerotrust</p>]]></content:encoded></item><item><title><![CDATA[SECURE BY DESIGN AND ZERO TRUST]]></title><description><![CDATA[INTEGRATING SUPPLY CHAIN RISK MANAGEMENT WITH DEVSECOPS]]></description><link>https://www.yournetguard.com/p/secure-by-design-and-zero-trust</link><guid isPermaLink="false">https://www.yournetguard.com/p/secure-by-design-and-zero-trust</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Thu, 25 Jan 2024 20:45:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mrLp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mrLp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mrLp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 424w, https://substackcdn.com/image/fetch/$s_!mrLp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 848w, https://substackcdn.com/image/fetch/$s_!mrLp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 1272w, https://substackcdn.com/image/fetch/$s_!mrLp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mrLp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/18ea7362-a140-411b-8544-72d4141f95ae.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5508842,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mrLp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 424w, https://substackcdn.com/image/fetch/$s_!mrLp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 848w, https://substackcdn.com/image/fetch/$s_!mrLp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 1272w, https://substackcdn.com/image/fetch/$s_!mrLp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18ea7362-a140-411b-8544-72d4141f95ae.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Integrating an SBOM capability into the DevSecOps process is recommended by the NSA and CISA in their multi-organization publication, &#8220;Securing the Software Supply Chain: Recommended Practices for Developers&#8221;. Here&#8217;s an article I wrote on the topic:<br><br><a href="https://www.trexsolutionsllc.com/secure-by-design-and-zero-trust-integrating-supply-chain-risk-management-with-devsecops/">https://www.trexsolutionsllc.com/secure-by-design-and-zero-trust-integrating-supply-chain-risk-management-with-devsecops/</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[2015 Publications]]></title><description><![CDATA[2015 07/15 Looking for vulnerabilities with OpenVAS and Greenborne, Linux Magazine, Linux, security, intrusion, vulnerabilities]]></description><link>https://www.yournetguard.com/p/2015-publications</link><guid isPermaLink="false">https://www.yournetguard.com/p/2015-publications</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Mon, 16 Feb 2015 19:25:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QtYH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69da48d6-1c64-435b-b850-962e23bf1d4e_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p>]]></content:encoded></item><item><title><![CDATA[Network analysis with the Bro Network Security Monitor]]></title><description><![CDATA[An article I wrote for Admin magazine in 2014.]]></description><link>https://www.yournetguard.com/p/network-analysis-with-the-bro-network</link><guid isPermaLink="false">https://www.yournetguard.com/p/network-analysis-with-the-bro-network</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Thu, 09 Jan 2014 18:50:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e2fa6743-e0e9-448e-ae77-f7baadd33bf8_200x138.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://www.admin-magazine.com/Archive/2014/24/Network-analysis-with-the-Bro-Network-Security-Monitor">Network analysis with the Bro Network Security Monitor</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Creating an inventory with nmap network scanning]]></title><description><![CDATA[This is an article I wrote for Techtarget in October 2010]]></description><link>https://www.yournetguard.com/p/creating-an-inventory-with-nmap-network</link><guid isPermaLink="false">https://www.yournetguard.com/p/creating-an-inventory-with-nmap-network</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Mon, 25 Oct 2010 18:15:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8e333ff4-67f5-4b4d-90dc-27215f055a74_336x180.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://www.techtarget.com/searchdatacenter/tip/Creating-an-inventory-with-nmap-network-scanning">Creating an inventory with nmap network scanning</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Installing the ModSecurity Web application firewall on Red Hat Enterprise Linux]]></title><description><![CDATA[Here's an article I wrote about ModSecurity in August 2010.]]></description><link>https://www.yournetguard.com/p/installing-the-modsecurity-web-application</link><guid isPermaLink="false">https://www.yournetguard.com/p/installing-the-modsecurity-web-application</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Mon, 02 Aug 2010 18:11:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fc1974e7-b72b-4128-bd43-7aa5f95a7d4d_1295x2288.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://www.techtarget.com/searchdatacenter/tip/Installing-the-ModSecurity-Web-application-firewall-on-Red-Hat-Enterprise-Linux">Installing the ModSecurity Web application firewall on Red Hat Enterprise Linux</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Linux Routing (co Author)]]></title><description><![CDATA[A book on routing with Linux from 2001 that I co-authored.]]></description><link>https://www.yournetguard.com/p/linux-routing-co-author</link><guid isPermaLink="false">https://www.yournetguard.com/p/linux-routing-co-author</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Fri, 01 Jun 2001 17:33:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YFZj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YFZj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YFZj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 424w, https://substackcdn.com/image/fetch/$s_!YFZj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 848w, https://substackcdn.com/image/fetch/$s_!YFZj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 1272w, https://substackcdn.com/image/fetch/$s_!YFZj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YFZj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic" width="506" height="648" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:648,&quot;width&quot;:506,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:24879,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YFZj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 424w, https://substackcdn.com/image/fetch/$s_!YFZj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 848w, https://substackcdn.com/image/fetch/$s_!YFZj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 1272w, https://substackcdn.com/image/fetch/$s_!YFZj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e758b1d-49b2-47a5-814f-ffacaf5228ab.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.amazon.com/Linux-Routing-Dee-Ann-LeBlanc/dp/1578702674/">Linux Routing</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cisco WAN Quickstart]]></title><description><![CDATA[A book I edited for Cisco Press in 2000.]]></description><link>https://www.yournetguard.com/p/cisco-wan-quickstart</link><guid isPermaLink="false">https://www.yournetguard.com/p/cisco-wan-quickstart</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Mon, 01 May 2000 17:43:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/152ffe2c-d09a-4e21-a637-6642c32de90d_513x648.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://www.amazon.com/Linux-Routing-Dee-Ann-LeBlanc/dp/1578702674/">Cisco WAN Quickstart</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Packet Filter and Cisco's Way in Sys Admin: The Journal for UNIX Systems Administrators]]></title><description><![CDATA[An article on Cisco's approach to networking. Published in Sys Admin: The Journal for UNIX Systems Administrators Volume 8, Number 5, May, 1999]]></description><link>https://www.yournetguard.com/p/packet-filter-and-ciscos-way-in-sys</link><guid isPermaLink="false">https://www.yournetguard.com/p/packet-filter-and-ciscos-way-in-sys</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Wed, 05 May 1999 15:05:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QtYH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69da48d6-1c64-435b-b850-962e23bf1d4e_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p>]]></content:encoded></item><item><title><![CDATA[RADIUS in Sys Admin: The Journal for UNIX Systems Administrators]]></title><description><![CDATA[My first published article was on RADIUS, the protocol, in Sys Admin Magazine in February 1999.]]></description><link>https://www.yournetguard.com/p/radius-sys-admin-magazine-networking</link><guid isPermaLink="false">https://www.yournetguard.com/p/radius-sys-admin-magazine-networking</guid><dc:creator><![CDATA[Ronald McCarty]]></dc:creator><pubDate>Mon, 01 Feb 1999 14:58:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QtYH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69da48d6-1c64-435b-b850-962e23bf1d4e_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yournetguard.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading YourNetGuard.com! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>