Weekly Cybersecurity Wrapup – 3/20/23

Webinars

Articles

Podcasts

Projects

TryHackMe – Working through SOC Analyst Level 1. I’m in Cyber Threat Intelligence.

White Papers

Proofpoint – 2022 The Cost of Insider Threats Global Report

Proofpoint – 2023 State of the Phish

Weekly Cybersecurity Wrapup – 3/12/23

Webinars

Articles

Podcasts

Projects

What is the Right Role for me?

There are a lot of different fields within cybersecurity. How do you know which one is right for you. Many people will tell you this is one of the first steps to do. It is important in order to apply for the right jobs for you. SANS has created a tool to help identify what roles would be right for you and define where your strengths are. Here is a sample of what mine looks like:

My top competencies
My recommended focus areas

Weekly Cybersecurity Wrap-up 3/6/23

Webinars

Articles

Podcasts

  • Security Now 912 – The NSA @ Home – Hosted by Steve Gibson, Leo Laporte LastPass hack details, Signal says no to UK, more PyPI troubles, QNAP bug bounty
  • Smashing Security 311 – TikTok, wiretapping, and your deepfake voice is your password
  • Security Now 913 – A Fowl Incident, Hosted by Steve Gibson, Leo Laporte, DDoS’ing Fosstodon, Strategic Objective 3.3, CISA’s Covert Red-Team

Projects

Splunk – Using Fields

Weekly Cybersecurity Wrap-up 2/27/23

Webinars

  • ChatGPT – good or evil? AI impact on cybersecurity – the business community is concerned about the AI’s potential to change the game for cyber criminals and wreak havoc in the world of defense organizations. Should businesses soon expect a wave of even more advanced cyber-attacks or simply more attacks? Will current cybersecurity solutions be enough? Or will ChatGPT instead provide cybersecurity specialists with more efficient and smarter defensive and threat hunting tools?
  • Splunk Training – As part of its $100 million Splunk Pledge, Splunk has committed to supporting nonprofit organizations that provide skills training to individuals from communities that have been traditionally underrepresented in the technology industry. It is our hope that the Splunk training you receive through WSC helps prepare you for a successful career in our increasingly data-driven economy.

Articles

Podcasts

Projects

Splunk – Pursuing Splunk Certified User Certificate

  • Completed What is Splunk Training
  • Completed Intro to Splunk Training

Pluralsight – Introduction to Information Security (2:53)

Weekly Cybersecurity Wrap-up 2/20/23

Articles

Projects

TryHackMe – Working Through SOC Level 1 path, Pyramid of Pain and Cyber Kill Chain are my most recent completions.

Cybersecurity Podcasts

Last month John on Mastodon asked what podcast people were listening to. I jumped in with my list, but I learned of a lot more out there then I was aware of. Being a big podcast fan this is one of the first mediums I turned to myself when looking for information about cyber security. Since replying to that post I have built a longer list of podcasts that I listen to and podcast that I want to listen to.

Podcast I listen to

  • Security Now – I have listened to this program for a long time. It is a weekly show that goes over the news and answers listener questions. It is part of the TWIT family of podcasts. I reccomend checking the rest of their podcasts out if you are into technology. They are wonderfully produced. This podcast is on the longer side, usually around 1.5 to 2 hours.
  • Smashing Security – This is also a weekly podcast, but has an emphasis on funny. They cover the wild part of security. The stories are always funny! This is a shorter podcast, usually under an hour. I never miss this one.
  • Risky Business – I haven’t listened to many episodes of this podcast, but I have enjoyed those I have caught. I hope to listen to many more soon.
  • Darknet Diaries – These episodes go very deep. The story telling is simply magnificent. If you only have time for one podcast in cybersecurity make it this one.
  • Paul’s Security Weekly – A quick weekly roundup of what is going on in cyber security.
  • Malicious Life – Great episodes that I found gripping. I loved the episode on SIM-swapping.
  • Hacking Humans – I’ve only caught one of these so far, I’m looking forward to listening to more though.

Podcast I have not yet listened to

Book Review | Countdown to Zero Day

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
by Kim Zetter

The Book in Three Sentences

  1. The first cyber war attack by the US targeting centrifuges in Iran.
  2. This was the first attack, but it is seen as only the beginning and shows that many systems all over the world are in danger of being exploited.
  3. Real physical destruction can be caused by a malicious computer code.

Impressions

This book is not the first cyber security book I’ve read. The story telling was done well, if a little long winded, like many non-fiction books I think this book could have been condensed further. At times it read as though the author was trying to make an article into a book, but at 400 plus pages, I think there was too much repetitive content. Nonetheless, this was an interesting book and covers a pivotal part of cyber history. Stuxnet is mentioned and discussed in many of the virtual training classes I have been taking in the last few months.

Who Should Read It

I think there are two categories of people who would be interested in this book. One being history people. I fit in this category as well. This was such a pivotal part of how technology is changing modern warfare that it can’t be ignored.

The second group that will be interested in this book are those with an interest in computers especially information security folks. This is the first virus designed specifically to target a very niche device. It was purposely written to attack, just that device to accomplish political goals.

My Takeaways

  • It made me aware that governments can leverage malicious code to attack each other, minimizing human loss
  • I learned that governments is keeping zero days to themselves in order to carry out attacks against their enemies