I. Tea. Security.
Musings and insights on all things IT Security, with a nice cup of tea.

Cybersecurity Trend Reports for the Well-Informed IT Security Pro
The author provides an overview of useful annual reports provided by various organizations, good for staying well-informed on trends and advancements.

Disrupting Adversarial AI: An Overview of Google’s Framework for Evaluating Emerging Cyberattack Capabilities of AI
The author provides a brief overview of Google’s new framework for evaluating adversarial AI capabilities.

I, Cyborg: A Shallow Dive Into the Security of Brain-Computer Interfaces (BCIs)
In this article, the author takes a look at the concept of Brain-Computer Interfaces (BCIs) and their potential risks.

Fun with Python: Log Analysis and Indicators of Compromise (IoCs)
In this installment of FwP, the author extends an existing script to search for Indicators of Compromise (IoCs).

IT Security 101: Advanced Persistent Threats (APTs) and their Tactics, Techniques and Procedures (TTPs)
In this installment of ITSEC101 the author provides an overview of Advanced Persistent Threats (APTs) and their Tactics, Techniques and Procedures (TTPs).

Tea with Copi: Diversity Training
In this installment, the author attempts to understand Copi’s concept of diversity.

IT Security 101: Essential Cyber Hygiene of the CIS Controls® v8.1
In another installment of IT Security 101, the author provides guidance on the IG1 Safeguards from the CIS Controls, dubbed essential cyber hygiene.

Tea with Copi: Movie Night
In an attempt to relax, the author converses with Copi to find a movie recommendation.

Fun with Python: File Search in Multiple Directories
In this installment of FwP, the author provides a simple script to search directories for files with specific strings in their names.

IT Security 101: Incident Response (IR)
In a new installment of ITSEC101, the author provides an overview Incident Response (IR), the IR Lifecycle, and IR Plans.

Podcasts for IT Security Pros
The author provides a curated list of podcasts for the well-informed IT Security pro.

Fun with Python - Log Analysis with Regex v2
In this installment of Fun with Python, the author adds functionality to the original log analysis code.

Cybersecurity Enhancement Through Gamification
The author provides some ideas to enhance Cybersecurity awareness and training engagement through gamification.

IT Security 101: The CIS Critical Security Controls® v8.1
In another installment of IT Security 101, the author provides an overview of the CIS Controls v8.1.

Tea with Copi Part III: Confessions of an Ethical AI
In the final installment of Conversations with Copilot, the author asks Copi about the ethics of AI.

Tea with Copi Part II: More Movies, Tea… and Combatting Skynet
The author chats with Copilot (“Copi”) about movies, tea and realistic techniques to combat a future AI uprising.

Tea with Copi: A Chat With Microsoft’s AI Companion Tool
The author and Copilot chat about movies, security, and then share a cup of tea.

Fun With Python: Log Analysis with Regex
The author provides a handy Python script that uses RegEx to search for IPv4 addresses in a log file.

A Shallow Dive Into the Security of Signal
The author takes a look at the popular messaging app Signal and its history of vulnerabilities.

IT Security 101: Vulnerabilities
In the first installment of IT Security 101, the author takes a look at vulnerabilities and how they are scored.