I. Tea. Security.
Musings and insights on all things IT Security, with a daily cup of tea.

Fun with Python - Log Analysis with Regex v2
In this installment of Fun with Python, the author adds functionality to the original log analysis code.

Cybersecurity Enhancement Through Gamification
The author provides some ideas to enhance Cybersecurity awareness and training engagement.

IT Security 101 - The CIS Critical Security Controls® v8.1
In another installment of IT Security 101, the author provides an overview of the CIS Controls v8.1.

Conversations with Copilot Part III - Confessions of an Ethical AI
In the final installment of Conversations with Copilot, the author asks Copi about the ethics of AI.

Conversations with Copilot Part II - Movies, Tea, and Combatting Skynet
The author chats with Copilot (“Copi”) about movies, tea and realistic techniques to combat a future AI uprising.

Conversations with Copilot - A Chat With Microsoft’s AI Companion Tool
The author and Copilot chat about movies, security, and then share a cup of tea.

Fun With Python - Log Analysis with Regex
The author provides a handy Python script that uses RegEx to search for IPv4 addresses in a log file.

A Shallow Dive Into the Security of Signal
The author takes a look at the popular messaging app Signal and its history of vulnerabilities.

IT Security 101: Vulnerabilities
In the first installment of IT Security 101, the author takes a look at vulnerabilities and how they are scored.

Valuable Resources Every IT Security Pro Should Know
The author describes useful newsletters, advisories, feeds, and frameworks focused on threat and vulnerability intel.
