Is it Down?

From time to time we experience web sites and services are not working properly or is unavailable. To check if it’s me, my network, device, or the service itself I like Downdetector a lot. Based on user reports it is quite accurate and gives you a nice history of events if need be.

The NICE Cybersecurity Workforce Framework

The NICE (NICE Cybersecurity Workforce Framework) initiative is lead by NIST as an initiative to boost cybersecurity education. It offers tools to assess and build cybersecurity workforce in organizations, private and government and supports cross-sectoral efforts for information and competancy sharing as utilized by the Japanese, cool! A Japanese government driven Cross-Sectoral Forum picked the NIST Framework to build in-house cybersecurity positions and organisations.

I especially like the reference spreadsheet as it can be used to map work roles required for completeness and the associated relevant knowledge. Further NIST have preliminary work for training plans. Check it out!

Practise Security with Open and Free Cloud Platforms, CTFs and More

For reference, there are a lot of platforms to play for free with security preventive tools and techniques as well as vulnerabilities. OWASPs Juice Shop gives lets you play with the Top 10 OWASP risks. PwnAdventure lets you test your skills in hacking games.

OWASP Juice Shop is supposed to be the opposite of a best practice, how great is that! The Pwning Juice Shop book gives you a nice start.

CTFd is a Capture The Flag (CTF) framework that guides you in how to set it all up.

And then you have the common cloud platforms, AWS, Azure, Google Cloud, DigitalOcean etc. to easily set up and test security features on easy-to-deploy infrastructures, platforms and/or applications. Have to mention Heroku, a platform for apps, including Juice Shop as just mentioned.

Talking about cloud, do not miss Twistlock! They also facilitate CTFs, such as the T19 challenge (Docker image).

THE Book of Digital Forensics…

Last year we published the Digital Forensics book, after a long and exciting, but challenging, period of work. Together with a team of security and forensics professionals we joined forces to create this “complete” book of Digital Forensics. I had the pleasure to write about the forensics process, based on past digital forensics research and practice as a technical analyst. The book aim to provide practitioners of computer science, information security and law enforcements with a fundamental understanding of digital forensics.

Please see our latest blog post for the first chapter of the book here. The book can be found at Wiley or you can buy it straight from Amazon.