Wicked Good Development Episode #16: Ted Neward’s Philosophy 101

Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and ...
New Radicals - You Get What You Give (Official Music Video)

Shine Theory / DevOps / Community

A podcast called The Allusionist (hosted by Helen Zaltzman) crossed my path that provided me with a light-bulb moment. The podcast focuses on language and etymology. This particular episode contextualised that focus ...
🙂

Should You Buy a Piece of SIEM?

We lament that people love to buy single-purpose security tools and then complain about it, but what about buying components of tools? For example, will you buy a normalization engine so that ...

Secure The Wrong Path or Change The Path?

How do I configure a firewall appliance in public IaaS? How do I install anti-virus inside a container? How do I filter calls to microservices via an appliance in my DMZ? Now, ...
🙂

Rule Based Detection?

One of the famous insults that security vendors use against competitors nowadays is “RULE – BASED.” In essence, if you want to insult your peers who, in your estimation, don’t spout “AI” ...
🙂

The Other Security Chasm

| | philosophy, security
You guys recall my security chasm post from 2014? Because clearly some of you obsessively reread what I wrote 5 years ago … not 🙂 That post basically built on an idea ...
🙂

Psychoanalyzing Security Cloud Fears

Here is a funny one: why so many security professionals (and leaders) still hate the cloud? OK, OK, I get it, many of you want to respond to this with a WHAT ...

On Operational Excellence

| | philosophy, security
So I spent much of last week reading a book about Second World War called “The Second World Wars: How the First Global Conflict Was Fought and Won.“ You do not have ...

Let’s Go Fight IT for Logs? Agents? Taps?

This is a depressing post about security in the real world (what … another one?) In any case, we are having those enlightened debates about log analysis (via SIEM/UEBA), network security monitoring ...
:-)

A Rant on Single Function Security Tools

| | philosophy, security
As you may guess, I was raised on Unix and in Unixland single-function tools rule the seas. From “ls” to “ping”, Unix is full of commands that are in reality tools that ...

Secure Guardrails