Home Information Security
Information Security
Cancel

Information Security

Previous Posts


InfoSec Best Practice - An Unhelpful Term

A short piece about the term “Information Security best practice, and how it’s harming our industry.

October 04, 2023 3 min

A Rant about DevSecOps

A rant about running vulnerability management programmes that work.

Feburary 27, 2023 3 min

Vulnerability Management in 4 Stages

A rant about running vulnerability management programmes that work.

June 07, 2022 14 min

Information Security Risk Management - Benefits & Common Pitfalls

How Information Security Risk Management can practically and significantly improve the security posture of your organisation.

Dec 31, 2021 16 min


Planned Posts

TitleDescription
Microservice architecture isn’t a panaceaA pragmatic look at the pros and cons of different architectural patterns
Malware Analysis IntroMy first impressions of getting into malware analysis and reverse engineering


Helpful Resources

RansomwareLive

  • RansomwareLive is a collaction of publicly disclosed ransomware data, from ransomware gangs (e.g. not fully verified in all cases), including an up to date list of hacked organisations, and ransomware negotiation chat logs.

VxUnderground

  • Virus Exchange Underground, the largest collection of malware source code, samples, and papers on the internet.

Awesome Public Datasets - Github list

  • Repo list of publicly available datasets. Awesome Hacking - Github list
  • A great and exhaustive list of all things infosec. have an explore and find some treasure.

Awesome Security News Letters - Github list

  • A good list of security newsletters. Some better than others. Personally, I really like Ollie Whitehouse’s ‘Bluepurple Pulse’, Clint Gibler’s ‘tl;dr sec’ newsletter and Zack Whittaker’s ‘This Week in Security’.

Awesome Cloud Security - Github list

  • A good list of resources related to all things Cloud Security.

Gophish

  • An open-source phishing framework that makes it easy to test your organization’s exposure to phishing.