I. Tea. Security.
Musings and insights on all things IT Security, with a nice cup of tea.

Fun with Python: A Simple Password Generator
In this installment of FwP, the author provides a simple script that can randomly generate strong passwords.

Threat Intel Collaboration Resources for the Embattled Cyber Defender
The author provides a curated list of resources for sharing threat intelligence.

IT Security 101: Threats and Threat Actors
In this installment of ITSEC101, the author provides a definition of the term threat in the context of assessing risks, and takes a look at common threat actors.

Cybersecurity Trend Reports for the Well-Informed IT Security Pro
The author provides an overview of useful annual reports provided by various organizations, good for staying well-informed on trends and advancements.

Disrupting Adversarial AI: An Overview of Google’s Framework for Evaluating Emerging Cyberattack Capabilities of AI
The author provides a brief overview of Google’s new framework for evaluating adversarial AI capabilities.

I, Cyborg: A Shallow Dive Into the Security of Brain-Computer Interfaces (BCIs)
In this article, the author takes a look at the concept of Brain-Computer Interfaces (BCIs) and their potential risks.

Fun with Python: Log Analysis and Indicators of Compromise (IoCs)
In this installment of FwP, the author extends an existing script to search for Indicators of Compromise (IoCs).

IT Security 101: Advanced Persistent Threats (APTs) and their Tactics, Techniques and Procedures (TTPs)
In this installment of ITSEC101 the author provides an overview of Advanced Persistent Threats (APTs) and their Tactics, Techniques and Procedures (TTPs).

Tea with Copi: Diversity Training
In this installment, the author attempts to understand Copi’s concept of diversity.

IT Security 101: Essential Cyber Hygiene of the CIS Controls® v8.1
In another installment of IT Security 101, the author provides guidance on the IG1 Safeguards from the CIS Controls, dubbed essential cyber hygiene.

Tea with Copi: Movie Night
In an attempt to relax, the author converses with Copi to find a movie recommendation.

Fun with Python: File Search in Multiple Directories
In this installment of FwP, the author provides a simple script to search directories for files with specific strings in their names.

IT Security 101: Incident Response (IR)
In a new installment of ITSEC101, the author provides an overview Incident Response (IR), the IR Lifecycle, and IR Plans.

Podcasts for IT Security Pros
The author provides a curated list of podcasts for the well-informed IT Security pro.

Fun with Python - Log Analysis with Regex v2
In this installment of Fun with Python, the author adds functionality to the original log analysis code.

Cybersecurity Enhancement Through Gamification
The author provides some ideas to enhance Cybersecurity awareness and training engagement through gamification.

IT Security 101: The CIS Critical Security Controls® v8.1
In another installment of IT Security 101, the author provides an overview of the CIS Controls v8.1.

Tea with Copi Part III: Confessions of an Ethical AI
In the final installment of Conversations with Copilot, the author asks Copi about the ethics of AI.

Tea with Copi Part II: More Movies, Tea… and Combatting Skynet
The author chats with Copilot (“Copi”) about movies, tea and realistic techniques to combat a future AI uprising.

Tea with Copi: A Chat With Microsoft’s AI Companion Tool
The author and Copilot chat about movies, security, and then share a cup of tea.