Building Better Security PresentationsThe most up to date version of this post can be found on my website at…Oct 27, 2017A response icon5Oct 27, 2017A response icon5
Crash Override Chronicles: BackgroundThe most up to date version of this post can be found on my website at…Sep 6, 2017Sep 6, 2017
The Crash Override Chronicles: OverallIn the first post of the CRASH OVERRIDE Chronicles I outlined my plan for reviewing Drago’s CRASHOVERRIDE report in order to build an…Aug 16, 2017Aug 16, 2017
Familiarity Breeds Contempt: APT EditionHere’s a familiar scenario:Aug 4, 2017A response icon1Aug 4, 2017A response icon1
CTI Reading ListA reading list for getting started in Cyber Threat Intelligence.Jul 18, 2017A response icon2Jul 18, 2017A response icon2
Done with MediumOn second thought Medium is a nice platform and tweaking my Jekyll blog often gets in the way of writing. For that reason I’m back!Feb 10, 2017Feb 10, 2017
The “What happens when you use a browser?” QuestionGo into a tech interview, especially one for operations or security, and you’re more than likely going to get an interview question like…Jan 19, 2017Jan 19, 2017
2017 GoalsAhh January 4th. It’s that time of year to review 2016 and think about what’s coming in 2017. Let’s start by looking at what I kicked off…Jan 4, 2017Jan 4, 2017
United States Response to Grizzly SteppeHere it is. After weeks of wondering if and how the United States Government might respond the United States White House, State Dept…Dec 29, 2016Dec 29, 2016