My Writing
- Cloud Run Metasploit Framework as a Docker Container Without Installation Pains Running Metasploit Framework in a Docker container avoids the pain of installing the tool and its dependencies. The approach is especially useful for quickly deploying to a cloud server for...
- Cloud How You Can Set up Honeytokens Using Canarytokens to Detect Intrusions Honeytokens are data or computing resources that exist solely to alert you when someone accesses them, offering intrusion detection with relatively low false positives. The open source Canarytokens...
- Product Management A Product Management Framework for Creating Security Products Building a security product requires answering fundamental questions about market segmentation, product capabilities, sales engagement, pricing, and delivery. A lightweight framework that poses these...
- Malware Analysis How to Share Malware Samples With Other Researchers Sharing malware samples with other researchers requires password-protecting archives with passwords like "infected" or "malware" to get past antivirus scanners. Using the 7-Zip format with encrypted...
- Risk Management First Impression Tips for Security Startups Making a good first impression requires researching prospects before contact, establishing credibility by demonstrating relevant experience, and customizing elevator pitches to the listener's...
- Risk Management Information Security Measures Commensurate With Risky Behavior Security safeguards could be applied selectively based on users' demonstrated tendency toward risky computer behavior—people whose systems were frequently infected or who clicked simulated phishing...