Incident Response Tabletop Idea

This is a scenario based incident response tabletop that I worked on with a colleague. I wanted to share with the world, as I have had immense success with this.  It amazes me how a simple dice roll, really draws people in to the event.  It sounds silly, but the sense of chance adds so Read More …

Let them have Netflix

Marie Antoinette was the last queen of France right before the first French Republic began.  She died in October of 1793.  She, in the western culture, is considered the pinnacle example of extravagance and profilgation.  Her most famous quote is not even hers according to the majority of textbooks. None of this is really new, Read More …

the 3 ‘B’ exports of the USA

Heard this on a financial talking head show the other day.   The 3 main exports of the USE are the 3 B’s. Bushels –> food, corn, soybeans, etc. Barrels –> Oil Bombs –> self explanatory. I had never heard of this before, but there is a kind of easy simplification of the economy to these.

ESM – Exposure Surface Management

Exposure Surface Management (ESM) aims to proactively identify, assess, and mitigate vulnerabilities across an organization’s digital assets, including those external to the traditional IT infrastructure, to reduce the risk of cyberattacks. Here’s a breakdown of what ESM looks like:  Comprehensive Asset Inventory:  ESM starts with a thorough inventory of all assets, both internal and external, Read More …

Music Video – kaleidoscope – Tension

Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. This video is from me running around Chicago doing errands on a rainy day.

Malware TV – Automatically Extracting Obfuscated Strings from Malware

The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …

Notes – Use Templates And Keep It DRY

To “Use Templates And Keep It DRY” means to leverage templates or reusable structures and to avoid code duplication by implementing a principle of abstraction that promotes code efficiency and maintainability.  Here’s a breakdown of the concept: Templates: These are reusable structures, such as code snippets, document layouts, or organizational frameworks that can be used as Read More …

Trump blinked first

So far, we have a pause in the tariffs and a few items moving into different tariff buckets apparently.  There is much speculation about why did Trump blink, and issue this pause.  This article is not helping resolve that speculation, merely pointing out my idea through a series of articles from the Internet.  You can Read More …