I. Tea. Security.
Musings and insights on all things IT Security, with a nice cup of tea.

IT Security 101: The OWASP Top 10 API Security Risks
In this installment of ITSEC101, the author provides an overview of the OWASP Top 10 API Security Risks, and their common mitigation controls.

IT Security 101: The OWASP Top 10 Web Application Security Risks
In this installment of ITSEC101, the author provides an overview of the OWASP Top 10 Web App Security Risks, and their common mitigation controls.

IT Security 101: DKIM, SPF and DMARC
In this installment of ITSEC101, the author provides an overview of three important components to email protection: DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), and Domain-based Message Authentication, Reporting, and Conformance (DMARC).

IT Security 101: Data Loss Prevention (DLP)
In this installment of ITSEC101, the author provides an overview of data loss prevention (DLP).

IT Security 101: the Structured Threat Information Expression (STIX) Standard
In this installment of ITSEC101, the author provides an overview of the Structured Threat Information Expression (STIX) standard.

Fun with Python: File Hashing v2
In this installment of FwP, the author combines the functionality of two previous scripts to hash multiple files in a director.

Tea with Copi: Cybersecurity as a Career Choice
In this installment of Tea with Copi, the author and the author’s assistant discuss what it takes to make it in the field of Cybersecurity.

IT Security 101: Common Network Ports and Protocols
In this installment of ITSEC101, the author provides tables of common ports and protocols.


Free Cybersecurity Tools for IT Security Pros
The author provides some free cybersecurity tools to help defenders operating with restrictive budgets.


Fun with Python: File Hashing
In this installment of FwP, the author provides a script that generates sha256 and md5 hash sums from a single file.

IT Security 101: The Open Systems Interconnection (OSI) Model
In this installment of ITSEC101, the author provides an overview of the OSI Model.

Ransomware Defense Resources for IT Security Pros
The author provides guidance on ransomware defense.

Fun with Python: Elite Hacker Handle Generator
In this installment of FwP, the author generates “Elite Hacker Handles”. Just for fun.

ITSEC101: Common Compliance Frameworks for Privacy and Security
In this installment of ITSEC101, the author takes a look at common regulatory frameworks that every IT Security Pro should know.

Tea with Copi: Music to Hack to
In this installment of Tea with Copi, the author and his assistant converse about music.

Fun with Python: A Simple Password Generator
In this installment of FwP, the author provides a simple script that can randomly generate strong passwords.

Threat Intel Collaboration Resources for the Embattled Cyber Defender
The author provides a curated list of resources for sharing threat intelligence.

IT Security 101: Threats and Threat Actors
In this installment of ITSEC101, the author provides a definition of the term threat in the context of assessing risks, and takes a look at common threat actors.