Microsoft Azure Cloud Concepts Cloud Service Models Types of Cloud Computing Benefits of the Cloud Fundamental characteristics of cloud computing Cloud computing offers convenient, on-demand access to your computing resources online. This has facilitated the move to remote work and supports collaboration wherever you are located. For IT teams, cloud services also make technological provisioning Read More …
Author: tmack
Notes – Pipelines and Building Blocks
In the context of data processing and DevOps, “pipelines” are sequential processes like assembly lines that automate tasks (building, testing, and deploying code) and “building blocks” are the modular components that make up the pipeline, performing specific tasks. Here’s a more detailed explanation: Data Pipelines: A data pipeline is a system of automated processes that move Read More …
YAML – Yet Another Markup Language
In computer programming, YAML stands for YAML Ain’t Markup Language (it was originally intended to mean “Yet Another Markup Language”). It is a human-readable data serialization language. This means it’s designed to represent data in a format that is easy for humans to read and write, while also being easily parsed by computers. Here’s a Read More …
Conference Video – Threat Hunting Within Organizations Andrew Case
These are the videos from B Sides Tampa 2015
Moran Cerf – Moth GrandSLAM winning story
Moran Cerf – Moth GrandSLAM winning story
Incident Response Tabletop Idea
This is a scenario based incident response tabletop that I worked on with a colleague. I wanted to share with the world, as I have had immense success with this. It amazes me how a simple dice roll, really draws people in to the event. It sounds silly, but the sense of chance adds so Read More …
ESM – Exposure Surface Management
Exposure Surface Management (ESM) aims to proactively identify, assess, and mitigate vulnerabilities across an organization’s digital assets, including those external to the traditional IT infrastructure, to reduce the risk of cyberattacks. Here’s a breakdown of what ESM looks like: Comprehensive Asset Inventory: ESM starts with a thorough inventory of all assets, both internal and external, Read More …
Conference Video – Deep Web – what to do and what not to do
Presented at the Cysinfo 9th Quarterly Meetup on 19th November 2016 at Bangalore Presentation Link
Malware TV – Automatically Extracting Obfuscated Strings from Malware
The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …
Notes – Use Templates And Keep It DRY
To “Use Templates And Keep It DRY” means to leverage templates or reusable structures and to avoid code duplication by implementing a principle of abstraction that promotes code efficiency and maintainability. Here’s a breakdown of the concept: Templates: These are reusable structures, such as code snippets, document layouts, or organizational frameworks that can be used as Read More …