POPULARITY
In this episode, Danielle Tal and Thilo Fromm join us to discuss Flatcar Linux. They introduce Flatcar as a Linux operating system designed specifically for containers and Kubernetes workloads, highlighting its automation, self-healing capabilities, and security features. They emphasize how Flatcar simplifies operations for startups and large companies alike by automating OS provisioning and maintenance. We discussed contributor engagement and the project's involvement with the CNCF. They also share intriguing use cases, like a Kubernetes cluster running on a tractor fleet, and stress the importance of community contributions, not just in code but in evangelism and documentation. 00:00 Introduction 01:05 What is Flatcar? 02:01 Flatcar's Automation and Self-Healing Capabilities 04:10 User Experience and Testing 05:06 Ideal Users and Use Cases 10:36 Community and Contributions 13:38 Getting Started with Contributions 16:59 Impact and Future Directions 19:58 Conclusion and Final Thoughts Guest: Danielle Tal is a Program Manager at Microsoft and an integral part of the team responsible for maintaining Flatcar Container Linux. The team is contributes to Linux OS distributions and Linux Security within Azure and other upstream projects. With a background in supporting diverse enterprise cloud applications as a support engineer, Danielle has transitioned into a management role, overseeing Docker EMEA support before joining the Flatcar team. Thilo Fromm is an engineering manager and works on Community Linux distributions and Linux Security at Azure. Thilo's team helps maintaining Flatcar Container Linux. He has given talks at FOSDEM, FrOSCon, KubeCon, Open Source Summit, Cloud-Native Rejekts, and various meetups like Kubernetes Community Days. Thilo started his career in embedded systems with hardware design and roll-your-own /from scratch embedded Linux, kernel and plumbing level development, and later virtualisation. After working for various cloud providers in engineering and management positions, he went full cloud native in 2019. Nowadays Thilo works on operating systems for cloud-native environments with a special focus on Flatcar Container Linux.
In this episode, Jay and Joao discuss an important elephant in the room - what do you do when you have no power? How long will your UPS and/or generator last? Power is definitely a real challenge, and it's even worse if you're dealing with an entire location losing power! And that's exactly what happened in Portugal. Jay and Joao will discuss this blackout event, and what it means for business continuity.
What's it like within a hacking group? After 190,000 chat messages from the Black Basta group leak, we get an inside look at operations within such a group. In this episode, Jay and Joao discuss this recent development. Also, breaking news regarding CVE's literally almost becoming a thing of the past!
This time around, Jay and Joao cover several interesting stories, including an alleged Oracle breach, privacy concerns around 23andme, and more!
In this episode, Jay and Joao discuss some recent bugs in the wild, including a supply-chain attack that exposes enterprise secrets.
In this episode, Jay and Joao will discuss a couple of recent vulnerabilities, with one of them showing how unskilled threat actors can bolster their abilities with Artificial Intelligence, a trend that's sure to become very popular in the future.
The 2025 Enterprise Linux & Open-Source Landscape Report from TuxCare is here, and with it comes some surprising facts about the state of Linux security today. In this episode, Jay and Joao will discuss some of its most noteworthy findings.
Implementing an effective automation system can be an overwhelming task, one that can often fail - causing some organizations to abandon automation completely. In this video, Jay and Joao will discuss some effective strategies for implementing automation.
How does perception vs reality tie into protecting our infrastructure from threat actors? In this episode, Jay and Joao discuss how pre-concieved notions and misinformation impacts threat response (and more).
We all hate passwords, just about as much as we hate Printers and DNS. They're a nuisance - they're difficult to manage and are a major attack vector. Thankfully, technologies such as FIDO (Passkeys) have come around to make this easier for everyone. However, Jay and Joao will discuss how tech companies are ruining this for everyone.
In this video, Jay and Joao some recently security news, some of which exposes some of the dangers of misconfigured S3 buckets. Also, Volkswagen ended up in a bit of trouble, a Microsoft-related flaw in unicode poses problems, and other security shenanigans are to be expected.
In this episode, Jay and Joao discuss some unexpected consequences of AI. Also, they'll give you a "year in review", going over the most substantial security stories of 2024.
In this episode, Jay and Joao discuss a recent story where one company's WiFi was used to hack another - and other security shenanigans.
In this episode, Jay and Joao discuss recent goverment policy that will have far reaching effects - and this time it isn't coming from the USA. Also, is C and C++ too "unsafe" to use? Those stories and more during this episode!
In this episode, Jay and Joao discuss a recent decision made by VMWare, CISA security requirements, and more about how ransomware can be especially problematic in health care.
In the 100th episode, Jay and Joao discuss some stories that literally come full circle from earlier stories in the podcast - encryption back doors, the largest migration cost we've ever covered, and more!
In this day and age, we can spin up servers and entire networks in seconds. But should we? It's easy to throw resources at problems, but we'll just end up creating more work for ourselves. In this episode, Jay and Joao will discuss provisioning resources more reasonably - and the health of your entire company's network might depend on that!
In this episode, Jay and Joao discuss the "EUCREAK" vulnerability, as well as a recent story that outlines one of the many ways the industry is vulnerable to the same old tricks with outdated perimeter protection. Don't miss it!
Recently, an 18-year old bug is making new waves across the Internet, dubbed the "0.0.0.0-Day Vulnerability". What is it? Should you be concerned? Jay and Joao will discuss this and a few other stories in this episode of Enterprise Linux Security.
In DevOps, there's many great tools we appreciate - CI/CD workflows definitely being one of them. Github Workflows is one such tool, but vulnerabilities were recently found. Also, AT&T suffers a breach (and more!)
In this episode, Jay and Joao discuss several recent cybersecurity news stories, including Polyfill - which is another example of why supply chain attacks are something everyone should be paying attention to.
In this episode, Jay and Joao will discuss the recent regreSSHion vulnerability, which claims to be a path to root - although it might take a while. Also, recent developments with Teamviewer are also discussed.
In this episode, Jay and Joao discuss the recent breach suffered by Ticketmaster. Also, several new or updated news stories will be discussed.
What would you do if your organization's cloud servers were deleted? That's exactly what happened to a Singaporean company, which found their servers wiped by a disgruntled employee. Plus, the FBI distributes over 7,000 unlock keys, and Europol launches their biggest botnet operation yet.
In the last episode, we discussed a story where a company literally lost their cloud - at no fault of their own. But what is truly your responsibility when working with a cloud provider? What is their responsibility? In this episode, Jay and Joao discuss where the line is drawn between you and your cloud provider.
In this episode, Jay and Joao talk about a story that's every cloud administrator's worst nightmare - your entire environment, backups, everything - gone. That's exactly what happened to UniSuper, a customer of Google Cloud. In this cautionary tale, we'll explore the case of the missing cloud.
There's a lot for sysadmins to keep track of when it comes to security, so naturally there's going to be some misconceptions every now and then. In this episode, Jay and Joao discuss some common misconceptions when it comes to security.
In this episode, Jay and Joao discuss the 2024 Verizon Data Breach Investigations Report (DBIR), which includes some interesting finds regarding threat actor motives, how user error impacts business, and more!
Ransomware is bad enough, but when it impacts healthcare it's even worse! In this episode, Jay and Joao will discuss recent developments at Change Healthcare and their ransomware fiasco, news updates, and more!
Welcome to another episode of Category Visionaries — the show that explores GTM stories from tech's most innovative B2B founders. In today's episode, we're speaking with Austin Gadient, CTO & Co-Founder of Vali Cyber, a Linux security platform that has raised $15 Million in funding. Here are the most interesting points from our conversation: Origins in Cybersecurity: Austin's journey into cybersecurity began at the US Air Force Academy, leading to a master's in computer science at MIT focused on offensive cybersecurity tactics, specifically against Linux systems. Transition to Defense: Post-MIT, Austin's work shifted towards defense, working on satellite systems at Kirtland Air Force Base, where the limitations of existing Linux security solutions inspired the founding of Vali Cyber. Initial Product Development: The early days of Vali Cyber were dedicated to developing a prototype capable of behaviorally stopping ransomware attacks on Linux systems and introducing a rollback feature for system restoration. Challenges of Early Commercialization: Austin discusses the initial rush to market and the realization that competing against established vendors required a nearly flawless product, underscoring the importance of mature QA processes. Building Trust with Customers: Given the high stakes of Linux security, building trust was crucial. Austin leveraged his and his CEO's backgrounds in defense and created tools like securityperf to validate their product's claims transparently. Identifying the Ideal Customer Profile (ICP): Initially focusing on DoD organizations, Vali Cyber expanded its target to enterprises with significant Linux infrastructure, recognizing the importance of protecting mission-critical systems in sectors like finance.
On this podcast, Jay and Joao have discussed multiple times a situation where a threat actor submits a pull request that's more than the project bargained for. And now, we have a situation where OpenSSH was (almost) backdoored by a commit by a maintainer of the xz project. Don't miss this episode for all the details!
What goes on behind the scenes when it comes to managing a project as large as a Linux distribution? In this episode, Jay and Joao has a chat with benny Vasquez who is not only a wealth of knowledge on that very subject, she's also the Chair of the Board of Directors for AlmaLinux OS. ... Read more
You may have heard of "technical debt", but have you heard of "security debt"? In this episode, Jay and Joao will tell you all about it and why it's a major issue for organizations.
Through a joint effort, the FBI as well as NCA struck a major blow to the Lockbit ransomware group. In this episode, Jay and Joao will discuss this story as well as the state of Linux in the enterprise/open-source landscape.
When a threat actor breaks into a router and adds firewall rules that the owner didn't approve of, that's considered hacking. But when the FBI does it... ...it isn't?! In this episode Jay and Joao discuss a recent story where the FBI did exactly that, and they'll also discuss how Microsoft has become the biggest "face palm" discussed on the podcast so far.
Here we are, yet again, with an industry problem caused by the decision of just one software vendor. This time it's VMware that's causing a ruckus. In recent news, it's been reported that VMware will be killing off 56 (yes, 56) of their stand-alone products, and that's on top of the news that broke late last year regarding changes in their licensing model. In this episode, Jay and Joao discuss these recent VMware-related shenanigans.
In this episode, Jay and Joao will discuss an update on the GTA source code theft, how much threat actors are making from ransomware, and more!
In this episode, Jay and Joao will discuss a report earlier this year that reveals the "top 10 cybersecurity misconfigurations". These ten common mistakes can make it trivial for a threat actor to gain access to your infrastructure, so it's definitely a list everyone should pay close attention to.
The Mirai botnet brought the entirety of the internet to its breaking point back in 2016, taking down many prominent web sites. Now, an article from Wired has emerged that reveals the full story behind the scenes - how the threat actors got started, how the events played out, as well as what they're up to these days. Join Jay and Joao as they discuss this very interesting story!
In this episode, Jay and Joao catch up on recent stories. Among the topics they'll discuss another version of CentOS going end of life (and why upgrading isn't so straight-forward), the recent curl vulnerability, and more!
https://youtu.be/h1XTs1ed3MY On this episode of Destination Linux (344), we're reviewing the latest release of Ubuntu, Ubuntu 23.10 or Mantic Minotaur, we'll discuss its improvements and new features. We also touch on Linux security, debunking myths and highlighting the reasons why Linux is the most secure and useful OS of them all. Plus, we have our tips, tricks and software picks for you. Let's get this show on the road toward Destination Linux! Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/1d93be59-70f9-416e-9320-11df6ddaed13.mp3) SHOW NOTES ►► https://destinationlinux.net/344 Supported by: Namecheap = https://destinationlinux.net/namecheap LINBIT = https://destinationlinux.net/linbit Hosted by: Michael Tunnell = https://tuxdigital.com Ryan (DasGeek) = https://dasgeekcommunity.com Jill Bryant = https://jilllinuxgirl.com Want to Support the Show? Become a Patron = https://tuxdigital.com/membership Store = https://tuxdigital.com/store Chapters: 00:00:00 DL 344 Intro 00:01:11 Community Feedback 00:04:59 NAMECHEAP - [ link (https://destinationlinux.net/namecheap) ] 00:07:30 Ubuntu 23.10 Review (Mantic Minotaur) - [ link (https://discourse.ubuntu.com/t/mantic-minotaur-release-notes/35534) ] 00:37:20 LINBIT - [ link (https://destinationlinux.net/linbit) ] 00:38:39 Linux Security - [ source article (https://madaidans-insecurities.github.io/linux.html) ] 00:56:25 Gaming: Crimson Trials - [ link (https://bitwixt.itch.io/crimson-trials) ] 01:02:06 Software Spotlight: AppFlowy - [ link (https://appflowy.io/) ] 01:06:28 Tips and Tricks: Ubuntu Restricted Extras 01:08:10 Events - [ Ubuntu Summit (https://events.canonical.com/event/31/), SCALE (https://www.socallinuxexpo.org/scale/21x) ] 01:12:14 Outro Tip of the Week: sudo apt install ubuntu-restricted-extras Other Links: https://destinationlinux.net/279 https://imgur.com/a/p3VaKIH SHOW NOTES ►► https://destinationlinux.net/344
In this episode, Jay and Joao discuss the recent Exim news, which consists of several CVE's. Also, they'll discuss why it's a good idea to make sure you audit the services that are running on your Linux server, and remove the ones you're not using.
We've talked about Supply Chain Attacks on this podcast before, and in this episode Jay and Joao discuss another form of this popular attack vector - RepoJacking! RepoJacking occurs when a repository (such as one hosted on Github) changes information, and due to a link between the old repository info and the new - threat actors can take advantage of this. Join Jay and Joao for a discussion on this attack vector.
Join us on this episode of the Ask A CISO podcast as we discuss how to quantify defence with Anant Shrivastava, an information security professional with over 15 yrs of corporate experience and expertise in Network, Mobile, Application, and Linux Security. Along with host Mark Fuentes, he discusses looking at the big picture, why DevSecOps as a term should not exist, and the value of investing in cybersecurity. - About Horangi Cybersecurity -- More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast About Horangi Cyber Security: https://www.horangi.com - About the Guests -- Anant's LinkedIn: https://www.linkedin.com/in/anantshri/ Anant's Website: https://anantshri.info/
In this episode of the We Hack Purple podcast host Tanya Janca met with Anant Shrivastava! We talked about securing the entire software supply chain (including your CI/CD and where you get your packages from), and how it is more than just buying a software composition analysis (SCA) tool. He explained the new and very different risks of securing a mobile app versus a regular web app or an API, that's he's more of an ops than a dev person, and how the risks are all coming together now that many of us are doing DevOps. He shared his numerous open source projects, such as: Code vigilant: https://codevigilant.com/, TamerPlatform : https://tamerplatform.com/ and HackingArchivesOfIndia https://hackingarchivesofindia.com/. Anant's Bio:Anant Shrivastava is an experienced information security professional with over 15 years of corporate experience. He has expertise in Network, Mobile, Application and Linux Security. He is the founder of Cyfinoid Research, a cyber security research firm and has previously served as Technical Director at NotSoSecure Global Services, a boutique cyber security consultancy. He is a frequent speaker and trainer at international conferences such as BlackHat, Nullcon, and c0c0n. Additionally, Anant leads the open source projects Tamer Platform and CodeVigilant and maintains the Hacking Archives of India. He also participates in open communities targeted towards spreading information security knowledge such as null (null.community). His work can be found at anantshri.info and his blog is here https://blog.anantshri.info/!Very special thanks to our sponsor: The Diana Initiative!The Diana Initiative is seeking sponsors for their annual event happening Monday August 7, 2023 in Las Vegas - https://www.dianainitiative.org/sponsor/ for more informationThe Diana Initiative Call For Presentations opens on March 1, if you have a topic you want to share submit at tdi.The Diana Initiative Is: A diversity-driven conference committed to helping all underrepresented people in Information Security. This year the theme is “Lead the Change.” You can submit to be a speaker at tdi . mobi / CFP or if your company would like to support the event by sponsoring check out https://www.dianainitiative.org/sponsor/Join We Hack Purple!Join us in the We Hack Purple Community: A fun and safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter for even more free knowledge! You can find us, in audio format, on Podcast Addict, Apple Podcast, Overcast, Pod, Amazon Music, Spotify, and more!
Facebook Metaverse demo receives the meme treatment. Is Linux a secure operating system for online financial activity? How to start recording podcasts with hosts in different locations? What kind of a machine can I get to run an application like AutoCAD that isn't too expensive? Why is my camera system not working with my modem/router combo device? Can you limit an iPad to run one single app? Why is my LastPass desktop application not working all of a sudden? Plus conversations with Sam Abuelsamid about the Dodge Charger Daytona SRT & Rod Pyle calling again from the arctic circle! A New York Times article about a father being flagged by Google as a criminal. Mark Zuckerberg's metaverse demo receives the meme treatment. Sam Abuelsamid and the Dodge Charger Daytona SRT. Is Linux as an operating system secure enough for online financial activity? How to record podcasts online. Can a Man in the Middle attack occur between the user & a secure connection like a bank? Using AutoCAD on Windows or Mac? And how good of a machine do I need to run an application like AutoCAD? A caller's Wink camera hub is not working with a new modem/router. What's causing the Wink system to not work with the modem/router device? How to limit an iPad to a single application? Why is my SmartTV not connecting to my WiFi network? Why is my iPhone suddenly acting like it's a new phone after the iOS 15 6.1 update? Why are certain features disappearing from newer, more modern cellphones? Rod Pyle calls from the arctic circle! He talks about his adventures in the circle the past week. Why is my desktop LastPass application not working on my Mac? Do I even need the desktop application, or is the browser plug-in more than enough? Host: Leo Laporte Guests: Sam Abuelsamid and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1920 Download or subscribe to this show at: https://twit.tv/shows/the-tech-guy Sponsor: noom.com/twit
Facebook Metaverse demo receives the meme treatment. Is Linux a secure operating system for online financial activity? How to start recording podcasts with hosts in different locations? What kind of a machine can I get to run an application like AutoCAD that isn't too expensive? Why is my camera system not working with my modem/router combo device? Can you limit an iPad to run one single app? Why is my LastPass desktop application not working all of a sudden? Plus conversations with Sam Abuelsamid about the Dodge Charger Daytona SRT & Rod Pyle calling again from the arctic circle! A New York Times article about a father being flagged by Google as a criminal. Mark Zuckerberg's metaverse demo receives the meme treatment. Sam Abuelsamid and the Dodge Charger Daytona SRT. Is Linux as an operating system secure enough for online financial activity? How to record podcasts online. Can a Man in the Middle attack occur between the user & a secure connection like a bank? Using AutoCAD on Windows or Mac? And how good of a machine do I need to run an application like AutoCAD? A caller's Wink camera hub is not working with a new modem/router. What's causing the Wink system to not work with the modem/router device? How to limit an iPad to a single application? Why is my SmartTV not connecting to my WiFi network? Why is my iPhone suddenly acting like it's a new phone after the iOS 15 6.1 update? Why are certain features disappearing from newer, more modern cellphones? Rod Pyle calls from the arctic circle! He talks about his adventures in the circle the past week. Why is my desktop LastPass application not working on my Mac? Do I even need the desktop application, or is the browser plug-in more than enough? Host: Leo Laporte Guests: Sam Abuelsamid and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1920 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsor: noom.com/twit
Facebook Metaverse demo receives the meme treatment. Is Linux a secure operating system for online financial activity? How to start recording podcasts with hosts in different locations? What kind of a machine can I get to run an application like AutoCAD that isn't too expensive? Why is my camera system not working with my modem/router combo device? Can you limit an iPad to run one single app? Why is my LastPass desktop application not working all of a sudden? Plus conversations with Sam Abuelsamid about the Dodge Charger Daytona SRT & Rod Pyle calling again from the arctic circle! A New York Times article about a father being flagged by Google as a criminal. Mark Zuckerberg's metaverse demo receives the meme treatment. Sam Abuelsamid and the Dodge Charger Daytona SRT. Is Linux as an operating system secure enough for online financial activity? How to record podcasts online. Can a Man in the Middle attack occur between the user & a secure connection like a bank? Using AutoCAD on Windows or Mac? And how good of a machine do I need to run an application like AutoCAD? A caller's Wink camera hub is not working with a new modem/router. What's causing the Wink system to not work with the modem/router device? How to limit an iPad to a single application? Why is my SmartTV not connecting to my WiFi network? Why is my iPhone suddenly acting like it's a new phone after the iOS 15 6.1 update? Why are certain features disappearing from newer, more modern cellphones? Rod Pyle calls from the arctic circle! He talks about his adventures in the circle the past week. Why is my desktop LastPass application not working on my Mac? Do I even need the desktop application, or is the browser plug-in more than enough? Host: Leo Laporte Guests: Sam Abuelsamid and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1920 Download or subscribe to this show at: https://twit.tv/shows/total-leo Sponsor: noom.com/twit
Facebook Metaverse demo receives the meme treatment. Is Linux a secure operating system for online financial activity? How to start recording podcasts with hosts in different locations? What kind of a machine can I get to run an application like AutoCAD that isn't too expensive? Why is my camera system not working with my modem/router combo device? Can you limit an iPad to run one single app? Why is my LastPass desktop application not working all of a sudden? Plus conversations with Sam Abuelsamid about the Dodge Charger Daytona SRT & Rod Pyle calling again from the arctic circle! A New York Times article about a father being flagged by Google as a criminal. Mark Zuckerberg's metaverse demo receives the meme treatment. Sam Abuelsamid and the Dodge Charger Daytona SRT. Is Linux as an operating system secure enough for online financial activity? How to record podcasts online. Can a Man in the Middle attack occur between the user & a secure connection like a bank? Using AutoCAD on Windows or Mac? And how good of a machine do I need to run an application like AutoCAD? A caller's Wink camera hub is not working with a new modem/router. What's causing the Wink system to not work with the modem/router device? How to limit an iPad to a single application? Why is my SmartTV not connecting to my WiFi network? Why is my iPhone suddenly acting like it's a new phone after the iOS 15 6.1 update? Why are certain features disappearing from newer, more modern cellphones? Rod Pyle calls from the arctic circle! He talks about his adventures in the circle the past week. Why is my desktop LastPass application not working on my Mac? Do I even need the desktop application, or is the browser plug-in more than enough? Host: Leo Laporte Guests: Sam Abuelsamid and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1920 Download or subscribe to this show at: https://twit.tv/shows/the-tech-guy Sponsor: noom.com/twit
Ever wonder why there's so little information regarding macOS and Linux-oriented attacks? In this episode, we get the answer from the multi-talented Cat Self - an Adversary Emulation Engineer at MITRE, Cyber Threat Intelligence Team Leader on ATT&CK Evaluations and macOS/ Lead on MITRE ATT&CK Enterprise. We discuss defense tools, attacker TTPs, and what to consider when approaching defense for a macOS and Linux environment, and what trends we can expect in the future for these operating systems. Check out the resources below for links mentioned during this enlightening conversation!Our Guest: Cat SelfCat Self is the CTI Lead for MITRE ATT&CK® Evaluations, macOS/Linux Lead for ATT&CK® and serves as a leader of people at MITRE. Cat started her cyber security career at Target and has worked as a developer, internal red team operator, and Threat Hunter. Cat is a former military intelligence veteran and pays it forward through mentorship, technical macOS hunting workshops, and public speaking. Outside of work, she is often planning an epic adventure or climbing mountains in foreign lands. Follow Cat on Social MediaTwitter: @coolestcatiknowLinkedIn: Cat SelfResources mentioned in this episode:A highlight of new security changes in macOS Ventura:https://www.sentinelone.com/blog/apples-macos-ventura-7-new-security-changes-to-be-aware-of/ For securing a macOS device, I highly recommend installing Patrick Wardle's endpoint tools. https://objective-see.org/tools.html My favorites are BlockBlock, KnockKnock, Lulu, & Netiquette. Cat's “GoTo” blogsPatrick Wardle Objective-SeeJaron Bradley The Mitten MacHoward Oakley The Eclectic Light CompanyCody Thomas MediumSarah Edwards mac4n6Leo Pitt MediumChristopher Ross MediumCsaba Fitzl THEEVILBIT Blog Open Source ProjectsPlaybooks with Datasets to practice OTRFCode snippets aligned to MITRE ATT&CK Atomic Red TeamJupyter notebook environment setup by Anna PastushkoVirtual environment setup Hold My BeerSponsor's Note:Support for the Blueprint podcast comes from the SANS Institute.If you like the topics covered in this podcast and would like to learn more about blue team fundamentals such as host and network data collection, threat detection, alert triage, incident management, threat intelligence, and more, check out my new course SEC450: Blue Team Fundamentals.This course is designed to bring attendees the information that every SOC analyst and blue team membeJoin us in Scottsdale, AZ or virtually for the 2022 SANS Institute Blue Team Summit & Training. At the SANS Blue Team Summit, enhance your current skill set and become even better at defending your organization and hear the latest ways to mitigate the most recent attacks!