Defensive Security Handbook

The Defensive Security Handbook is written as a survey of the practices that blue team defenders should understand. It covers a lot of ground, touching on topics that range from vulnerability scanning, to disaster recovery, to compliance standards and frameworks, to essential…

Teaching communications security to lawyers

This article is meant mostly to run through how we ran a cryptoparty style training in realistic computer security & communications security for attorneys this weekend, and to encourage others to do the same.

Securing Mac OS X

Some configuration tips

This guide is inspired by @SwiftOnSecurity’s Decent Security, which is a Windows oriented guide to security for everyone. The information below is mostly a list of settings to configure, but as Decent Security notes, security is an ongoing…