Threat Intelligence and Other Contemplations…

Author: kodama

  • Blog Freeze

    Hello readers! Life happens. For this chameleon that means putting a pause to blogging. It’s been a great adventure that I hope to pick up again one day, but when I assess all the competing priorities in life right now, something has to go. In a world of so much competing noise, you, the reader,…

  • Let Me See Your Halo

    Humans are irrational. Seriously, have you ever pondered the whole “halo effect” thing? So I’m digging my claws into this psychology book by Daniel Kahneman called Thinking Fast and Slow and growing more and more thankful to be a lizard. This halo effect appears to be some kind of cognitive bias which shapes human perceptions…

  • Network Security

    Networking is as fundamental to security as camouflage to a chameleon. So let’s just say I was super eager to chow down on everything this course had to offer. Seems fitting while writing this review during the holiday season to compare the course to fruitcake, a mixed texture of fruits and nuts. Some of the…

  • Call Me Gordon McPhish

    Immersed in the academic bubble of Georgia Tech’s Master’s program, it’s pretty common to get a bit of a one-sided view of the real world. Exploring the world of machine learning for Intrusion Detection Systems (IDS) and how malware can outsmart these systems is downright intriguing. Yet, truth be told, your average cyber crook isn’t…

  • Hunting the Predator

    In today’s article, we want to shine a spotlight on an extraordinary #osintforgood non-profit founded by Jeff Tiegs, known as Skull Games. Skull Games won OSMOSISCON Non-Profit of the Year for 2023. Their mission is to harness the power of open-source intelligence (OSINT) in the battle against sex trafficking in the United States. Their latest…

  • Made For Maltego

    When I first got to know Maltego, it was like love at first sight for this chameleon! It felt as if Transforms were whispering my name. We were a match made in data heaven. But just like any relationship, that initial infatuation needs to grow into something more substantial if it’s going to last. So,…

  • Arc (Awesome) X

    Greetings fellow cyber-sleuths! If you’ve been traversing the ever-evolving landscape of cybersecurity, you know the journey can be relentless. Not only must you stay ahead of the latest tech trends, but those certifications demand a never-ending stream of continuing education units (CEUs). In such a ravenous ecosystem, training providers are as plentiful as stars in…

  • Watchman on the Wall

    What is cyber threat intelligence (CTI)? The term is about as elusive as the color of my skin.

  • Information Security Policies

    If you read my OMSCS CS6035 review and surmised that the subsequent one would arrive in August, kudos to you – your intuition was spot on! An all-star cadre of Milton Mueller, Andreas Kuehn, and Beau Sommerville lead this introduction into Information Security Policies, PUBP 6725. The course is one of the two core classes…

  • Move Over, MOVEit, for Open-Source

    PrefaceReaders of my blog will know that I typically maintain a pretty casual tone. This post was originally written for an academic setting, so hang with me if you find yourself slogging through a bit denser material this time. AbstractThe MOVEit transfer campaign, orchestrated by the CL0P ransomware gang, targeted a wide range of victims,…