May be basic for most cyber Security professionals, but still, several of these cyber documentaries are worth watching while commuting to work or when flying!
Enterprise Security Architecture To-Be
I have and will always love the challenge of defining cyber security architecture as a practice, process, lifestyle or what about system security architecture.. you know where I am going. So, there is no “cover it all” definition in my mind, as at least an enterprise security architecture is enterprise dependant and must be – it shall be business driven and therefore not globally defined. However, there are a lot of resources that help to define this.
Continue reading “Enterprise Security Architecture To-Be”
Data Poisoning AI Decisions
Rising threat and forecast for 2023 is claimed to be data poisoning, which interestingly enough will impact «AI» -based decisions. AI is still just machine-learning making shit out, on shit in…
Pyramid of Pain, for Crisp Communication
Communicating cyber security will forever be challenging, so whatever tools I find making this easier I like to share. The “good old” Pyramid of Pain (SANS) may be useful to illustrate the complexity of detecting different types of malicious activities, as it is based on typical indicators you might use to detect. I know it does not cover all, but it speaks well. Read the paper yourself and make up your mind.
All the Software Cheat Sheets You Like
With over 5k cheat sheets Cheatography I think covers the most common ones for software development and coding especially.
Cloud Pain Points
A brief but nice summary of pain points we have all experienced?
- Insufficient staff skills
- Data loss/leakage
- API vulnerabilities
- Malware infections
- Insufficient identity and access management controls
- Lack of visibility into what data and workloads are within cloud applications
- Inability to monitor data in transit to and from cloud applications
- Cloud applications being provisioned outside of IT visibility (e.g., shadow IT)
- Inability to prevent malicious insider theft or misuse of data
- Advanced threats and attacks against the cloud application provider
- Inability to assess the security of the cloud application provider’s operations
- Vendors failing to alert customers of vulnerabilities
- Inability to maintain regulatory compliance
- Misconfigurations of cloud hardware and/or cloud software
By Threatpost
Threat Modeling FTW
It is not breaking news, but «amen», Archie!
Practical and impractical prints
Prusa has made a thingiverse competitor(?), https://www.printables.com/
Atomic Red Team, making Mitre Att&ck testing easy-peasy
Have lately been playing around with Atomic Red Team open atomic tests and this is pretty good stuff, and easy to add value both to prevention, detection and respons. They are also integrated with LimaCharlie, which is worth checking out for detection and response.
Open Source alternatives, always
I like Open Source tools and the way it moves tech. Opensourcealternatives.to is in that case a rich source to finding alternatives to all those commercial tools you have to pay for even just for testing. E.g., Photoshop -> GIMP, Whatsapp -> Signal, Lastpass -> KeePassXC…