Skip to content
  • TechnologEase LLC

Chris Olive

CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router

  • RSS Feed
  • Twitter
  • LinkedIn
  • Mail
  • Blog
  • About Me
  • Recipes
  • Blog
  • About Me
  • Recipes

Category: Tooling

Test Strategy for Proxmox Production Home Lab

Test Strategy for Proxmox Production Home Lab

Chris Oliveby Chris OliveMay 3, 2025May 3, 2025

Subtitle: Test Compare and Selection of OwnCloud vs. NextCloud with OwnCloud as the winner. If you haven’t noticed, recent articles are back in the “hands-on …

Test Strategy for Proxmox Production Home Lab Read More
Running a Unifi Network Controller in a Proxmox LXC Container

Running a Unifi Network Controller in a Proxmox LXC Container

Chris Oliveby Chris OliveMarch 30, 2025May 10, 2025

4/10/2025: A few minor updates since this was originally posted, including a new section called Future Proofing Use of LXC for your Unifi Network Controller. …

Running a Unifi Network Controller in a Proxmox LXC Container Read More
Running WordPress in Docker on Apple Silicon

Running WordPress in Docker on Apple Silicon

Chris Oliveby Chris OliveMay 19, 2023February 18, 2024

As you may have noticed if we’ve been connected for a while, I’ve finally gotten back around to getting my long-neglected personal site up and …

Running WordPress in Docker on Apple Silicon Read More
Why Common IAM Solutions for Identity-based Attacks Aren’t Really Working

Why Common IAM Solutions for Identity-based Attacks Aren’t Really Working

Chris Oliveby Chris OliveApril 19, 2023May 21, 2024

This article was released as a whitepaper for VeriClouds on May 2, 2020, co-authored with Stan Bounev, CEO at VeriClouds, to address common solutions that …

Why Common IAM Solutions for Identity-based Attacks Aren’t Really Working Read More
Ransomware: An Enterprise Perspective

Ransomware: An Enterprise Perspective

Chris Oliveby Chris OliveMay 27, 2018April 11, 2023

The following article was written for Secure360.org as part of the information presented in an hour-long presentation I gave in Minneapolis entitled Data, Identity & …

Ransomware: An Enterprise Perspective Read More
Data Security & Identity Management: Essential 1st Cousins in IT Security

Data Security & Identity Management: Essential 1st Cousins in IT Security

Chris Oliveby Chris OliveJuly 25, 2016April 11, 2023

As a senior architect, sales engineer, and consultant out in the field working closely with senior IT security leaders and CISOs, I sometimes run into …

Data Security & Identity Management: Essential 1st Cousins in IT Security Read More
The Case for “Encrypt Everything”

The Case for “Encrypt Everything”

Chris Oliveby Chris OliveApril 13, 2016April 11, 2023

Within the IT industry, when considering data-at-rest (DAR) encryption, you may have noticed recently that security experts seem a little divided on how to leverage …

The Case for “Encrypt Everything” Read More
Considerations Around Application Encryption

Considerations Around Application Encryption

Chris Oliveby Chris OliveDecember 22, 2015April 12, 2023

For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that …

Considerations Around Application Encryption Read More
SailPoint IIQ: Rule Modeling in Real Java :-)

SailPoint IIQ: Rule Modeling in Real Java :-)

Chris Oliveby Chris OliveApril 24, 2014April 25, 2023

I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done …

SailPoint IIQ: Rule Modeling in Real Java :-) Read More
Stupid Sailpoint Developer Tricks

Stupid Sailpoint Developer Tricks

Chris Oliveby Chris OliveJuly 11, 2013April 14, 2023

G’day, mates — as they say Down Under, where I happen to be at the moment on a rather large SailPoint engagement. It’s been a …

Stupid Sailpoint Developer Tricks Read More

Posts pagination

1 2 Next

Highlighted Content

A whitepaper written in 2020 and still relevant today. Updates made in 2023 to modernize. The issues around ATOs using credentials and misunderstandings about stopping these ATOs unfortunately persist.

Recent Posts

  • Test Strategy for Proxmox Production Home Lab
  • Running a Unifi Network Controller in a Proxmox LXC Container
  • Identity Management, 9/11 & Remembrance in Action
  • Can You Trust a Third-Party User? No, But You Can Manage Their Lifecycle Access
  • Why IAM Is Insufficient for Data-Centric Security

Categories

  • Breaches
  • Cloud/SaaS
  • Core Security
  • CyberSecurity Landscape
  • Data Science
  • Data Security
  • Development
  • Engineering Notebook
  • Home Lab
  • Identity Security
  • Networking
  • Products
  • Society/Government
  • Tooling

Recipes

  • Bulk Download All Proxmox LXC Templates via PVE Command Line
  • Mounting Proxmox Raw Images in Any Linux
  • Proxmox IPTables Port 8006 Redirect to Port 443
  • Cloning/Restoring a Proxmox LXC Container from Backup
  • Installing Certificate for Self-Hosted Unifi Network Controller

Tag Cloud

Access Access Controls Aggregation Backups BeanShell Breaches BuildMap CISO Cloud Code Compliance Dark Web Data Data-Centric Data Security Development Encryption Government Hacking Historical Lens IAM Identities Identity Governance IdentityIQ Identity Management Identity Security Java Key Management Metadata Networking Non-Human IDs NUIDs People Privileged Access Privileged Data Process & Technology Ransomware Risk Risk Management Rules SailPoint Sensitive Data Strategy Target Tooling

Copyright © 1996-2023, Chris Olive :: All rights reserved Powered by WordPress and Bam.