Not all patterns are as powerful as they might seem, as made clear in this article by NCSC. However, in my opinion they drepends heavily on the context they are (not) implemented.
Threatpost made this practical guide, however this is more a journey of architecting. Read more.
Started playing with the freely available VMs from FireEye. Seems like nice Windows based alternatives to Kali and Parrot OS for at least basic pentesting and forensics tools. Personally I like Kali for its sustainability in the market, frequent updates and tools arsenal. However Parrot has grown on me with its sleek design.
Anyways, it seems FireEye got a lot from acquiring Mandiant a while ago. The Redline toolkit is quite nice, so it will be interesting to see how these two plays out:
Flare VM is for malware analysis.
Google just published a fourth article om how they implement(ed?) BeyondCorp. Great lessons learned from the creators of the all so fuzzy concept “zero trust”.
To play with, of course. See Kali Nethunter App Store.
From time to time we experience web sites and services are not working properly or is unavailable. To check if it’s me, my network, device, or the service itself I like Downdetector a lot. Based on user reports it is quite accurate and gives you a nice history of events if need be.
The NICE (NICE Cybersecurity Workforce Framework) initiative is lead by NIST as an initiative to boost cybersecurity education. It offers tools to assess and build cybersecurity workforce in organizations, private and government and supports cross-sectoral efforts for information and competancy sharing as utilized by the Japanese, cool! A Japanese government driven Cross-Sectoral Forum picked the NIST Framework to build in-house cybersecurity positions and organisations.
I especially like the reference spreadsheet as it can be used to map work roles required for completeness and the associated relevant knowledge. Further NIST have preliminary work for training plans. Check it out!
For reference, there are a lot of platforms to play for free with security preventive tools and techniques as well as vulnerabilities. OWASPs Juice Shop gives lets you play with the Top 10 OWASP risks. PwnAdventure lets you test your skills in hacking games.
CTFd is a Capture The Flag (CTF) framework that guides you in how to set it all up.
And then you have the common cloud platforms, AWS, Azure, Google Cloud, DigitalOcean etc. to easily set up and test security features on easy-to-deploy infrastructures, platforms and/or applications. Have to mention Heroku, a platform for apps, including Juice Shop as just mentioned.
Had fun designing and printing in 3D a house to be built, for someone in the family. It started with me photographing some entrepreneur sketches for the house they are planning to build.