A wonderfully frightening read. My friends and family will attest, that many times I have stated that we are in open warfare with Russia in the internet/ technological realm of things. The Russia Information Warfare Manual is a very good read. The books offered a detailed program of spiritual warfare against Western democracies culminating in Read More …
Category: Soapbox
I might rat on a few things in this field here and there.
Don’t track my kids
A blurb of a post this time, but something I want to make sure everyone is aware of. Remember, Remember If your kids are a member Then they became the product and the future is out of luck Don’t track my kids We need to make sure our kids get a chance to be kids, Read More …
Decoupling CI/CD from deployment
Decoupling CI/CD from deployment allows teams to build, test, and deploy code changes independently, offering more flexibility and control over releases, enabling faster feedback loops and risk reduction. Why Decouple? Improved Control and Stability: By separating deployment (moving the code to production) from release (making the code available to users), teams can deploy new versions of Read More …
Looking at Attack Surface Mapping
Hot Take Incomming……. Warning…… I am going to come right out and say it, and it will sound completely arrogant, but I think the majority of Attack Surface Mapping vendors out there are doing it wrong. ASM for those who are new to blogs like these, stands for Attack Surface Mapping. This process is meant Read More …
Notes on “Paved Road”
Lessons from Securing Internal Applications WebappSec Link Building a Security Platform Engineering Team “”” I’m a big fan of building security into existing processes, a term coined as “secure paved roads” by Jason Chan, Ex-Netflix CISO. The idea behind this is that security should mostly be invisible. The average employee should simply not have to Read More …
2 AD or not 2 AD
To AD or not to AD, that is the question. Whether ’tis nobler to continue patching The slings and of the security researchers, Or to take arms against a sea of criminal adversaries And by opposing end them. To die to AD? No more? and by a decommission to say we end AD? The heartache Read More …
A Fun Little Chart
Here was a fun little chart I discovered in my news feed a little bit ago. This is graphic representation of selected data breaches from across the globe. You can hover over the bubbles and get a bit more information about each breach. Scary to think that some small bubbles are still 15+ millions of Read More …
Some Computer Blogs
This post is just another compilation from my earlier blogger site. This post will focus on various newsletters, blogs, or similar that I followed at some point or another. Matteo Malvica Penetration Testing Lab Specific Articles New Forensic Investigation Procedures for First Responder Guides This is the story about when a nation state hacks into Read More …
Thoughts on the BMI Sale
Here are some thoughts on the proposed sale of BMI to venture capitalists. What every songwriter needs to know about the BMI sale [Chris Castle] – Hypebot Deal will close in 2024 – Variety This is a bit concerning. Yet another portion of the music industry is up for sale. As an artist, buying stock Read More …
Camp IT DR/BCP Conference Thoughts
Recently I attended a Camp IT Conference hosted at the Stephens Convention center in Rosemont Illinois. This particular conference was Disaster Recovery / Business Continuity – Resilient Infrastructure. While the Convention center in Rosemont is cavernous, our group was off to the side in the Executive areas. Next time I will remember to take photos! Read More …