PinnedTim MalcomVetterBJJ vs InfoSec: Setups & StagersThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26Jan 26
Tim MalcomVetterBJJ vs InfoSec: Threat IntelligenceThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26Jan 26
Tim MalcomVetterThings ChatGPT Struggles To Do — New Years EditionTL/DR; always use the correct tool for the job.Jan 3Jan 3
Tim MalcomVetterJiu Jitsu vs InfoSec: Privileged AccessThis is part of a series comparing Jiu Jitsu with InfoSec.Feb 2, 20211Feb 2, 20211
Tim MalcomVetterJiu Jitsu vs InfoSec: Mean Time To DetectThis is part of a series comparing Jiu Jitsu with InfoSec.Nov 12, 2020Nov 12, 2020
Tim MalcomVetterAdversary Emulation vs. Bad CopycatsPreviously, I discussed adversary emulation vs simulation and introduced an approach to make emulation more appealing: false flags. Today…Sep 21, 2020Sep 21, 2020
Tim MalcomVetterJiu Jitsu vs InfoSec: Defense in DepthThis is part of a series comparing Jiu Jitsu with InfoSec.Jul 29, 2020Jul 29, 2020
Tim MalcomVetterHow to Create an Internal/Corporate Red TeamCongratulations! Your organization has approved the creation of an internal Red Team program and tasked you to do it! Here are some quick…Jul 16, 20203Jul 16, 20203
Tim MalcomVetterWhy can I bank online but not vote online?It’s simple: voting privacy.Jun 11, 2020Jun 11, 2020