The Cipher Journal
banner
cipherjournal.bsky.social
The Cipher Journal
@cipherjournal.bsky.social
Cyber Security and Network Administration
https://thecipherjournal.org
802.11k, 802.11v and 802.11r: The Holy Trinity of Roaming Standards
thecipherjournal.org/80211k-80211...
#cybersecurity #sysadmin
802.11k, 802.11v and 802.11r: The Holy Trinity of Roaming Standards
802.11k, 802.11v and 802.11r: The Holy Trinity of Roaming Standards, The Cipher Journal
thecipherjournal.org
January 29, 2026 at 7:37 AM
Configuring Account Lockouts in Entra ID and Active Directory
thecipherjournal.org/configuring-...
#cybersecurity #sysadmin
Configuring Account Lockouts in Entra ID and Active Directory
Configuring account lockout policies in Active Directory and Entra ID.
thecipherjournal.org
January 27, 2026 at 1:30 PM
Secure Firewall Rules: 5 Principles to Increase Security thecipherjournal.org/secure-firew...
#cybersecurity #sysadmin
Secure Firewall Rules: 5 Principles to Increase Security
Five principles to designing firewall rules that are secure by default.
thecipherjournal.org
January 19, 2026 at 4:45 PM
Analysing Entra ID Sign-in Logs with Grafana
thecipherjournal.org/analysing-en...
#cybersecurity #sysadmin
Analysing Entra ID Sign-in Logs with Grafana
A tutorial on analysing Azure sign-in logs
thecipherjournal.org
January 13, 2026 at 2:55 PM
Rotating tcpdump Captures: Time-Limited Packet Captures
thecipherjournal.org/rotating-tcp...
#cybersecurity #sysadmin
Rotating tcpdump Captures: Time-Limited Packet Captures
A brief look at creating rotating packet captures with tcpdump on Linux.
thecipherjournal.org
January 9, 2026 at 9:14 AM