Blue Hat Security

About

Overview

This website contains tutorials, guides and step-by-step instructions on improving the security posture of an organisation and other articles useful for blue-hat professionals. It follows a defensive perspective and explains topics that are less commonly discussed or agreed upon on the Internet or to provide yet another view on the subject.

How did this website start

The author's interest in achieving the best security state an organisation can afford within a specific budget led her to various in-depth questions. She soon realised there is not as much practical information on blue-hat security as it is on red-hat. There is some basic knowledge, such as baselines and tools. But there are quite few practical guides there on tailoring the tools, baselines and tailoring the security design as to an organisation's custom needs. Hence, this website was created to help other professionals by filling in the gaps found on defensive security shared knowledge.

Who is this website for

This website is designed especially for security professionals working as part of blue teams, but it can be useful to any security-focused professionals alike, due to understanding of the way defensive security may be implemented within organisations.

Who is the author

Ramona Tame is a security engineer focused on defensive security and especially passionate about security architecture, She is certified as a CISSP and TOGAF 9 Foundation professional and she holds both M.Eng. and B.Eng. degrees within Computer Engineering with focus on Cybersecurity and Distributed Computing.

Ramona has always been keen on sharing her knowledge with others, so she ocassionally attends and speaks at local security meetups held in London and Cambridge, UK. She firmly believes defensive security professionals should collaborate more, as the offensive ones do.

Disclaimer: The articles presented on this website are simply subjective perspectives and personal thoughts on achieving a good organisational security posture. They are not standards, nor are they accredited and the author is not responsible of any damages that may be caused by these articles, direct or indirect, to an entity's security state.