Blue Hat Security

Featured Posts

  • June 20, 2022

    How Does The Zero-Trust Architecture Work

    Zero-Trust is such a buzzword these days and yet there is little documentation online on how to build one. I recently read the Zero Trust Networks book by Gilman & Barth (which I recommend 100%), so I decided to share my notes. Hopefully you'll find them useful!

  • November 18, 2021

    10 Lessons Learned While Looking for a Security Job

    We've all been at that point in our career - when we feel we haven't progressed much lately, especially if we invest quite a bit of personal time for our career development. That was my case, too, just a few months back this year. And although I enjoyed working there, I decided it's time to move on. As such, I started interviewing and I learned a few lessons along the way, which I am sharing with you. Hopefully you'll find them useful!

  • April 07, 2021

    How to Crack the CISSP Certification

    CISSP is by far one of the most craved certifications for security professionals. And it is rightly so, considering the amount of effort one has to go through to get this qualification. Yes, a lot of work goes in, but it’s far from impossible and achieving it comes with great satisfaction and it truly opens new doors. Why? Companies trust CISSP. Got CISSP? Companies trust you.

  • April 06, 2021

    How to Improve Your Defensive Strategy by Using Cyber Deception, Honeypots and MITRE Shield

    Defending against attackers can feel at times a lost cause - motivated and well-funded attackers have good tools, impressive budgets, well-trained people and above all they have patience. They rarely run out of time and need to rush their attacks. On the opposite side, we, the defenders sit. We have limited budgets and as everything depends on the budget, we have some good tools, but some less good, some well-trained people and no patience: we do run out of time. There is always so much to do to prevent broad ranges of attacks and so little resources. Which makes it incredibly important to deploy effective controls and use well-grounded security strategies.

  • June 12, 2020

    How I passed TOGAF 9.2 Part 1

    Last year I decided to take the TOGAF exam. I made a plan, I read on reddit and around the Internet how others passed it and then I started learning using the most recommend resource I found out there: the self study pack, which I should had finished in a few weeks, according to a few. But I didn’t. I soon understood TOGAF was not written for my kind of background, a very technical one.

  • April 22, 2020

    Designing a Threat Hunting Process and a SOC Management Platform based on MITRE ATT&CK and SPLUNK

    Last March I attended the SplunkLive! 2020 event where Splunk and some of their clients shared their experience on using Splunk for system administration and security. It was a great experience and I learned a great deal in just a few hours spent there, so I decided to share with you some of the most important things I got from Splunk’s team and one of their clients’ SOC team – Bank of England’s. Here are all the lessons put together explaining you how to build a SOC environment and how to do threat hunting using Splunk.

  • July 31, 2019

    Best Email Signing and Encryption Solutions

    Hi and welcome! I was honored to present this topic at #dc4420. You can read here everything I presented if you’d like to run through some things one more time. I addressed yesterday’s questions at the end of the article. You can always drop me an email if you have questions and if I can help, I will.

  • January 14, 2019

    Rapid Threat Model Prototyping

    Last year I had the opportunity to take part to one of Geoffrey Hill’s presentation about the Rapid Threat Model Prototyping (RTMP) methodology he designed. I find it incredibly useful, so I decided to share with you the core principles and steps. This document is based on the Rapid Threat Model Prototyping official document.