Formula 1 technical director and former Brawn GP team principal Ross Brawn gives his perspectives on strategy and decision making in his book Total Competition – and there are more parallels with cyber security than you might think.
Agile is unavoidable in modern corporate IT, and it is therefore an inescapable part of life as a cyber security professional. Here’s a brief introduction to the project management framework’s key priorities, players, and processes.
As I mentioned in my recent post about what I learnt in my first year as a cyber security consultant, I always keep an ebook handy on my phone so I can learn something new on long train journeys. Most recently, this has been Threat Modeling: Designing for Security.
This week I was at SANS London learning about forensics. I’ll post a proper writeup on the the course a bit later (it didn’t actually finish until this afternoon), but I thought I’d attend one of the SANS evening talks to learn something new and flex my rarely-used journalistic muscle.
The bulk of cyber security incidents are fairly simple, but sometimes you end up working with a whole network of hosts that are connected to each other in different ways. With this scenario in mind, I recently set out to explore the possibility of creating a Python script to automatically generate a simple network diagram to visualise things more clearly.