(My) CISSP Notes – Security Operations
Note: This notes were made using the following books: “CISPP Study Guide” and “CISSP for dummies”. Operations Security is concerned with threats to a production operating environment. So operations...
View Article(My) BruCON 2015 notes (1)
Here are my quick notes from the BruCON 2015 conference.All the slides can be found here. Nightmares of a Pentester The goal is to present some (basic) that the operational security teams (a.k.a Blue...
View Article(My) BruCON 2015 notes (2)
Here are my quick notes from the BruCON 2015 conference.All the slides can be found here. cve-search a free software to collect search and analyze common vulnerabilities and exposures in software Some...
View Article(My) BruCON 2015 notes (3)
Here are my quick notes from the BruCON 2015 conference. All the slides can be found here. Intrusion detection on Linux and OSX with osquery osquery goals: explore your operation system using sql host...
View Article(My) BruCON 2015 notes (4)
Here are my quick notes from the BruCON 2015 conference. All the slides can be found here. Crowdsourced Malware Triage Workshop – Making Sense of Malware with a Browser and a Notepad The malware is...
View Article(My) BruCON 2015 notes (5)
Here are my quick notes from the BruCON 2015 conference. All the slides can be found here. This is the last ticket about the BruCOn 2015 so, it contains the presentations for which my notes are not so...
View ArticleThreat Modeling for mere mortals
This ticket is an introduction to the threat modeling in the context of software development. Definition In the context of the IT security, threat modeling is a structured approach that enables you to...
View ArticleBook review: Software Security: Building Security in – Part I: Software...
This is a review of the first part of the Software Security: Building Security in book. Chapter 1: Defining a discipline This chapter lands out the landscape for the entire book; the author presents...
View ArticleBook review: Software Security: Building Security in – Part II: Seven...
This is a review of the second part of the Software Security: Building Security in book. Chapter 3: Introduction to Software Security Touchpoints This is an introductory chapter for the second part of...
View ArticleBook review: Software Security: Building Security in – Part III: Software...
This is a review of the third part of the Software Security: Building Security in book. This part is dedicated to how to introduce a software security program in your company; it’s something that I’m...
View Article