PinnedBJJ vs InfoSec: Setups & StagersThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26, 20241Jan 26, 20241
Our Mission: Eliminate the Role of SOC AnalystI had the pleasure of going through some brand and positioning workshops in a prior role at another company with Andy Cunningham, marketing…Nov 19, 20248Nov 19, 20248
BJJ vs InfoSec: Threat IntelligenceThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26, 20246Jan 26, 20246
Things ChatGPT Struggles To Do — New Years EditionTL/DR; always use the correct tool for the job.Jan 3, 202461Jan 3, 202461
Jiu Jitsu vs InfoSec: Privileged AccessThis is part of a series comparing Jiu Jitsu with InfoSec.Feb 2, 2021201Feb 2, 2021201
Jiu Jitsu vs InfoSec: Mean Time To DetectThis is part of a series comparing Jiu Jitsu with InfoSec.Nov 12, 202068Nov 12, 202068
Adversary Emulation vs. Bad CopycatsPreviously, I discussed adversary emulation vs simulation and introduced an approach to make emulation more appealing: false flags. Today…Sep 21, 202011Sep 21, 202011
Jiu Jitsu vs InfoSec: Defense in DepthThis is part of a series comparing Jiu Jitsu with InfoSec.Jul 29, 20206Jul 29, 20206
How to Create an Internal/Corporate Red TeamCongratulations! Your organization has approved the creation of an internal Red Team program and tasked you to do it! Here are some quick…Jul 16, 20201803Jul 16, 20201803