PinnedBJJ vs InfoSec: Setups & StagersThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26Jan 26
Our Mission: Eliminate the Role of SOC AnalystI had the pleasure of going through some brand and positioning workshops in a prior role at another company with Andy Cunningham, marketing…Nov 19Nov 19
BJJ vs InfoSec: Threat IntelligenceThis is a continuation of my series comparing Jiu Jitsu with CyberSecurity. You can start from the beginning here.Jan 26Jan 26
Things ChatGPT Struggles To Do — New Years EditionTL/DR; always use the correct tool for the job.Jan 3Jan 3
Jiu Jitsu vs InfoSec: Privileged AccessThis is part of a series comparing Jiu Jitsu with InfoSec.Feb 2, 20211Feb 2, 20211
Jiu Jitsu vs InfoSec: Mean Time To DetectThis is part of a series comparing Jiu Jitsu with InfoSec.Nov 12, 2020Nov 12, 2020
Adversary Emulation vs. Bad CopycatsPreviously, I discussed adversary emulation vs simulation and introduced an approach to make emulation more appealing: false flags. Today…Sep 21, 2020Sep 21, 2020
Jiu Jitsu vs InfoSec: Defense in DepthThis is part of a series comparing Jiu Jitsu with InfoSec.Jul 29, 2020Jul 29, 2020
How to Create an Internal/Corporate Red TeamCongratulations! Your organization has approved the creation of an internal Red Team program and tasked you to do it! Here are some quick…Jul 16, 20203Jul 16, 20203