Building Better Security PresentationsThe most up to date version of this post can be found on my website at…Oct 27, 20175Oct 27, 20175
Crash Override Chronicles: BackgroundThe most up to date version of this post can be found on my website at…Sep 6, 2017Sep 6, 2017
The Crash Override Chronicles: OverallIn the first post of the CRASH OVERRIDE Chronicles I outlined my plan for reviewing Drago’s CRASHOVERRIDE report in order to build an…Aug 16, 2017Aug 16, 2017
CTI Reading ListA reading list for getting started in Cyber Threat Intelligence.Jul 18, 20172Jul 18, 20172
Done with MediumOn second thought Medium is a nice platform and tweaking my Jekyll blog often gets in the way of writing. For that reason I’m back!Feb 10, 2017Feb 10, 2017
The “What happens when you use a browser?” QuestionGo into a tech interview, especially one for operations or security, and you’re more than likely going to get an interview question like…Jan 19, 2017Jan 19, 2017
2017 GoalsAhh January 4th. It’s that time of year to review 2016 and think about what’s coming in 2017. Let’s start by looking at what I kicked off…Jan 4, 2017Jan 4, 2017
United States Response to Grizzly SteppeHere it is. After weeks of wondering if and how the United States Government might respond the United States White House, State Dept…Dec 29, 2016Dec 29, 2016