PinnedBJJ vs InfoSec: Setups & StagersThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26, 2024Jan 26, 2024
Our Mission: Eliminate the Role of SOC AnalystI had the pleasure of going through some brand and positioning workshops in a prior role at another company with Andy Cunningham, marketing…Nov 19, 2024Nov 19, 2024
BJJ vs InfoSec: Threat IntelligenceThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26, 2024Jan 26, 2024
Things ChatGPT Struggles To Do — New Years EditionTL/DR; always use the correct tool for the job.Jan 3, 2024Jan 3, 2024
Jiu Jitsu vs InfoSec: Privileged AccessThis is part of a series comparing Jiu Jitsu with InfoSec.Feb 2, 2021A response icon1Feb 2, 2021A response icon1
Jiu Jitsu vs InfoSec: Mean Time To DetectThis is part of a series comparing Jiu Jitsu with InfoSec.Nov 12, 2020Nov 12, 2020
Adversary Emulation vs. Bad CopycatsPreviously, I discussed adversary emulation vs simulation and introduced an approach to make emulation more appealing: false flags. Today…Sep 21, 2020Sep 21, 2020
Jiu Jitsu vs InfoSec: Defense in DepthThis is part of a series comparing Jiu Jitsu with InfoSec.Jul 29, 2020Jul 29, 2020
How to Create an Internal/Corporate Red TeamCongratulations! Your organization has approved the creation of an internal Red Team program and tasked you to do it! Here are some quick…Jul 16, 2020A response icon3Jul 16, 2020A response icon3