PinnedTim MalcomVetterBJJ vs InfoSec: Setups & StagersThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26Jan 26
Tim MalcomVetterOur Mission: Eliminate the Role of SOC AnalystI had the pleasure of going through some brand and positioning workshops in a prior role at another company with Andy Cunningham, marketing…1d ago1d ago
Tim MalcomVetterBJJ vs InfoSec: Threat IntelligenceThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26Jan 26
Tim MalcomVetterThings ChatGPT Struggles To Do — New Years EditionTL/DR; always use the correct tool for the job.Jan 3Jan 3
Tim MalcomVetterJiu Jitsu vs InfoSec: Privileged AccessThis is part of a series comparing Jiu Jitsu with InfoSec.Feb 2, 20211Feb 2, 20211
Tim MalcomVetterJiu Jitsu vs InfoSec: Mean Time To DetectThis is part of a series comparing Jiu Jitsu with InfoSec.Nov 12, 2020Nov 12, 2020
Tim MalcomVetterAdversary Emulation vs. Bad CopycatsPreviously, I discussed adversary emulation vs simulation and introduced an approach to make emulation more appealing: false flags. Today…Sep 21, 2020Sep 21, 2020
Tim MalcomVetterJiu Jitsu vs InfoSec: Defense in DepthThis is part of a series comparing Jiu Jitsu with InfoSec.Jul 29, 2020Jul 29, 2020
Tim MalcomVetterHow to Create an Internal/Corporate Red TeamCongratulations! Your organization has approved the creation of an internal Red Team program and tasked you to do it! Here are some quick…Jul 16, 20203Jul 16, 20203