I. Tea. Security.
Musings and insights on all things IT Security, with a nice cup of tea.

A New Incident Response (IR) Life Cycle: An Overview of NIST SP 800-61r3
In this article the author provides an overview of NIST’s latest revision of SP 800-61, which improves the Incident Response (IR) life cycle and defines its place within the Cybersecurity Framework (CSF) 2.0.

IT Security 101: Security Content Automation Protocol (SCAP)
In this installment of ITSEC101, the author provides an overview of the Security Content Automation Protocol (SCAP).

Tea with Copi: The Last Overseer
In this installment of Tea with Copi, the author and the author’s assistant discuss AI’s impact on cybersecurity roles.

IT Security 101: Cloud Access Security Broker (CASB)
In this installment of ITSEC101, the author provides an overview of cloud access security brokers (CASBs).

IT Security 101: The OWASP Top 10 Web Application Security Risks
In this installment of ITSEC101, the author provides an overview of the OWASP Top 10 Web App Security Risks, and their common mitigation controls.

IT Security 101: DKIM, SPF and DMARC
In this installment of ITSEC101, the author provides an overview of three important components to email protection: DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), and Domain-based Message Authentication, Reporting, and Conformance (DMARC).

IT Security 101: Data Loss Prevention (DLP)
In this installment of ITSEC101, the author provides an overview of data loss prevention (DLP).

IT Security 101: the Structured Threat Information Expression (STIX) Standard
In this installment of ITSEC101, the author provides an overview of the Structured Threat Information Expression (STIX) standard.

Fun with Python: File Hashing v2
In this installment of FwP, the author combines the functionality of two previous scripts to hash multiple files in a director.

Tea with Copi: Cybersecurity as a Career Choice
In this installment of Tea with Copi, the author and the author’s assistant discuss what it takes to make it in the field of Cybersecurity.

IT Security 101: Common Network Ports and Protocols
In this installment of ITSEC101, the author provides tables of common ports and protocols.


Free Cybersecurity Tools for IT Security Pros
The author provides some free cybersecurity tools to help defenders operating with restrictive budgets.


Fun with Python: File Hashing
In this installment of FwP, the author provides a script that generates sha256 and md5 hash sums from a single file.

IT Security 101: The Open Systems Interconnection (OSI) Model
In this installment of ITSEC101, the author provides an overview of the OSI Model.

Ransomware Defense Resources for IT Security Pros
The author provides guidance on ransomware defense.

Fun with Python: Elite Hacker Handle Generator
In this installment of FwP, the author generates “Elite Hacker Handles”. Just for fun.

ITSEC101: Common Compliance Frameworks for Privacy and Security
In this installment of ITSEC101, the author takes a look at common regulatory frameworks that every IT Security Pro should know.

Tea with Copi: Music to Hack to
In this installment of Tea with Copi, the author and his assistant converse about music.