Articles on Tools
Below are my perspectives on tools, drawn from my work as a security leader and practitioner.
- Communication Interactive Replays of Conversations: A New Tool Conversation replays add an engaging dimension to training materials and docs. Save the conversation and your annotations in a data file, then use my tool to generate a self-contained HTML player you...
- Tools Publishing Your Website Content to AI Assistants When people ask AI assistants about your product or project, they often get outdated information. Here's how to publish your static website content directly to AI tools using Cloudflare Workers and...
- Tools How to Set Up a SpiderFoot Server for OSINT Research SpiderFoot automates OSINT collection from numerous data sources, including Shodan and Have I Been Pwned, to gather intelligence about IPs, domains, and email addresses. Running the free, open source...
- Malware The History of Fileless Malware - Looking Beyond the Buzzword The term "fileless malware" originated with Code Red worm in 2001 and initially meant malware that remained solely in memory. It evolved to encompass specimens that avoid placing malicious...
- Malware How Would You Detect and Impede Ransomware on an Endpoint? Anti-ransomware tools can detect malicious encryption by flagging processes that read or write too many files too quickly, or by monitoring for changes to files' entropy values. Decoy files that...
- Product Management A Product Management Framework for Creating Security Products Building a security product requires answering fundamental questions about market segmentation, product capabilities, sales engagement, pricing, and delivery. A lightweight framework that poses these...