WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Leadership CCC 'Character, Competence, Courage' - Talk the Walk
Confidence is more than just a feeling; it’s a skill—a message to the world that says, “You can trust me because I trust myself.”
Leadership CCC 'Character, Competence, Courage' - Key to Character, 'Understanding Yourself'
The Foundation of Leadership: Understanding Yourself Before exploring the depths of character, you must first confront the most crucial...
Leadership CCC 'Character, Competence, Courage' - A Model for Good Leadership
A leadership mantra I came across years ago encapsulates great leadership in three simple letters: CCC — Character, Competence, Courage
Leadership CCC 'Character, Competence, Courage' - Character 'Red Flags' & Antidotes
Good character is the cornerstone of exceptional leadership.
Leadership CCC 'Character, Competence, Courage' - Dealing with Deceptive Arguments
Language is a powerful tool, but it can also be wielded as a weapon to confuse, manipulate, and control.
Virtualization & CPU usage
A virtual machine (VM) CPU is not a physical, CPU but rather a logical CPU managed by the hypervisor. It represents a part of the real CPU.
Virtualization Monitoring & Incident Response - VMware
Virtualization platforms have become standard in many organizations and have been more commonly been exploited by threat actors.
Incident Response - Linux
Linux Incident Response Approach Overview When conducting incident response on Linux systems, certain types of analysis can be performed quickly and effectively using built-in Linux tools. This initial analysis often provides insights into how the system was compromised and the actions taken during the breach. However, advanced threat actors may employ techniques that complicate the investigation, requiring more time-consuming and sophisticated analysis methods. This Linux an
The story of the 'HeartBleed' SSL Vulnerability
The term "heartbleed" is a play off of the word "heartbeat" which was the OpenSSL function exploited for the attack. The VOX article,...
Elastic - Visualizing objects in tables with Zero records
If an elastic query in the dashboard does not return any records, the dashboard may not display zero values for the visualized data.
EDR Evaluation - EDR System Operations (SysOps)
EDR/XDR platforms often lack transparency in their detection logic.
Insider Threat
Three categories of Insider Threats: Malicious insiders Theft of IP Sabotage Espionage Negligent Insiders Ignoring policy and procedures...
First 90 Days
A highly recommended book for navigating a new leadership role is The First 90 Days.
Security Logging - Parent Events versus Base Events
Parent Events versus Base Events Concept The diagram below highlights the SOC Triad, with core cybersecurity tools like Network Detection...
Password Cracking - Hashcat
Three password cracking techniques that can be used with the password cracking tool hashcat. The three techniques are: Dictionary based...
Incident Response (IR) - Server/Host Analysis
Host based IR Approach The main categories of alerts come from the following sensor instrumentation: Network sensors Identity sensors...
Mimikatz
The Mimikatz story is fascinating to me. “Mimikatz first became a key hacker asset thanks to its ability to exploit an obscure Windows...
Interviewing Hiring - SOC Analyst, Cyber Security Engineer
SOC Analyst Screening Questions The questions below are some basic questions that most SOC analysts with some experience should be able...
Network Detection Response (NDR) - Web Traffic Analysis Part 2
Overview of major security tools related to web traffic protection Protection from Inside to Outside Traditional web protection largely...




















