Over the weekend I was bored and decided to undertake a small project of removing ads from my home network. Initially, I looked into CloudFlare Zero Trust which is free and runs on a serverless arc...
Mapping K8s to MITRE ATT&CK IDs
Last year, Microsoft released the second version of the threat matrix for Kubernetes. Version 2 added new techniques that were found by Microsoft researchers and techniques that were suggested by t...
Cloud Security Conferences
There are tons of conferences at any point in the year and it is sometimes difficult to figure out which are worthwhile attending. This post will hopefully provide you with some of the best confere...
Blue Team Series Part 4: Note Taking and SOC Projects
In the previous post, we looked at SOC fundamentals and escalations. In this post, I will be wrapping up the series with my thoughts on note taking, potential projects that a SOC can undertake and ...
Blue Team Series Part 3: SOC Fundamentals and Escalations
In the previous post, we looked at potential methods for onboarding and training. In this post, I will be discussing some SOC fundamentals, and types of events and escalations that could occur. In...
Site Redesign
It has been a long time coming and I’ve finally completely overhauled the design of this website for the first time since I started the blog using the Flexible Jekyll Theme as shown below: Previo...
Blue Team Series Part 2: SOC Onboarding and Training
In the previous post, we looked at what a Security Operations Center (SOC) is and the basic responsibilities of a SOC analyst. I did mention that I would discuss the meetings that I think help a SO...
Blue Team Series Part 1: What is a SOC?
The first blog post in this series is going to be very short as it aims to cover the basics of what a Security Operations Center (SOC) is and the basic responsibilities of a SOC analyst, which will...