Harden First, Patch Less: The Economics of Secure DevSecOps Pipelines
Explores how using hardened images benefits security and the bottom line. Additionally, we explore how to implement them, from DIY approaches to vendor solutions.
Author and Cybersecurity Practitioner
Explores how using hardened images benefits security and the bottom line. Additionally, we explore how to implement them, from DIY approaches to vendor solutions.
Exploring how complexity itself has emerged as a meta-risk that overshadows conventional cybersecurity threats.
Learn how organizations can define and track an inventory of ephemeral technology components in containerized environments.
Learn how to ethically assess the thoroughness of public asset inventory practices using free, open-source tools like Nmap, Masscan, Amass, and Shodan.
Learn how to unlock the power of AI on your ordinary laptop - no subscriptions, no privacy concerns, and no fancy hardware required.
How to implement a comprehensive vulnerability management workflow in AWS for under $50,000
How to implement compliance-as-code in AWS using GitOps and automated security control validation
Going down the rabbit hole while attempting to uninstall ProtonVPN - persistence mechanisms and security implications
Join me on a journey across America, from eastern cities to western deserts, as I search for what's really valuable
An open-minded exploration of reality using Occam's razor and the scientific method