<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cybersec Café]]></title><description><![CDATA[Get ahead in cybersecurity with curated insights, strategies, solutions, and deep dives. Weekly - straight to your inbox.]]></description><link>https://www.cyberseccafe.com</link><image><url>https://substackcdn.com/image/fetch/$s_!ga51!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06b04bc-8e40-416a-aa85-7b5d3dbaa335_1080x1080.png</url><title>The Cybersec Café</title><link>https://www.cyberseccafe.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 22:40:11 GMT</lastBuildDate><atom:link href="https://www.cyberseccafe.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ryan G. Cox]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberseccafe@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberseccafe@substack.com]]></itunes:email><itunes:name><![CDATA[Ryan G. Cox]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ryan G. Cox]]></itunes:author><googleplay:owner><![CDATA[cyberseccafe@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberseccafe@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ryan G. Cox]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Detections as Code in DataDog (Pt. 2): How I Test Detections]]></title><description><![CDATA[Cybersec Caf&#233; #90 - 11/04/25]]></description><link>https://www.cyberseccafe.com/p/detections-as-code-in-datadog-pt</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/detections-as-code-in-datadog-pt</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 04 Nov 2025 14:03:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lEPf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lEPf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lEPf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!lEPf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!lEPf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!lEPf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lEPf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lEPf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!lEPf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!lEPf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!lEPf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa08947b8-c070-4297-9b59-daafc9b17acd_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A couple months back, I shared how I built a Detections-as-Code MVP implementation for my small security team using the DataDog SIEM - walking through the design decisions that let me ship an early version fast and start reaping the benefits of an &#8220;as-code&#8221; workflow within just a couple of weeks.</p><p>If you haven&#8217;t read that one yet, I&#8217;d recommend jumping back there first so this part makes more sense: <a href="https://www.cyberseccafe.com/p/detections-as-code-in-datadog-how">https://www.cyberseccafe.com/p/detections-as-code-in-datadog-how</a></p><p>One of the key benefits I mentioned briefly was automated testing through the CI/CD workflow, and that&#8217;s exactly what we&#8217;re diving into today.</p><p>I&#8217;ll break down how I test detections end-to-end, how this fits into the automation pipeline, and how you can replicate it in your own environment.</p><p>And for subscribers, I&#8217;ve set up a <a href="https://github.com/rcx23/datadog-dac-mvp">demo repository</a> that shows the entire implementation in action, Pt1 and Pt2 - available now inside Cybersec OS.</p><p>Let&#8217;s get into it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1> The Methodology</h1><p>Part of my solution is the methodology I use to ensure that a detection is truly ready to be pushed into production.</p><p>At its core, this approach serves as quality control, preventing broken or overly broad detections from slipping through and causing noise or missed alerts.</p><p>Now, there are certainly more advanced ways to test detections. In large-scale environments where cost and scale are critical, you could build out a full staging environment and validate detections there first.</p><p>But my goal here is speed and effectiveness. I wanted an MVP that serves as a practical, lightweight testing framework that adds confidence without slowing deployment down.</p><p><strong>Requirements</strong></p><p>Every detection must meet the following criteria before being merged:</p><ul><li><p><em>True Case (Mandatory) - Ensures the detection actually fires as intended. Each test must include at least one log containing all the necessary fields for the rule to trigger successfully.</em></p></li><li><p><em>False Case (Mandatory) - Validates that the detection doesn&#8217;t fire when it shouldn&#8217;t. This prevents overly broad logic and reduces false positives in production.</em></p></li><li><p><em>Edge Case (Optional) - An edge case should nearly match the detection logic but miss one key condition. This adds confidence that detections only fire under precise circumstances.</em></p><ul><li><p><em>Example: if a rule is meant to trigger on specific actions except when performed by a known service account, the edge case would simulate the action from that service account, ensuring it correctly returns false.</em></p></li></ul></li><li><p><em>Additional Cases (Optional) - In Datadog, detections often consist of multiple queries. During peer review, I recommend enforcing at least one true case per query. This keeps quality consistent across the entire detection, not just the main condition.</em></p></li></ul><h1>The Script</h1><p>After a bit of digging through the docs, I was able to find an <a href="https://docs.datadoghq.com/api/latest/security-monitoring/#test-a-rule">API endpoint</a> from DataDog that lets me test detection logic directly against sample logs - perfect for validating our test cases automatically.</p><p>The idea was simple: build a script that takes a detection&#8217;s YAML file, formats it into the JSON parameters the API expects, sends it to the endpoint, and outputs the results.</p><p>This is also where we enforce our testing requirements.</p><p>A detection &#8220;passes&#8221; only if it includes at least one True and one False test case, both behaving exactly as expected. If any single test case fails, that detection fails. And if one detection fails, the entire log source folder fails.</p><p>It&#8217;s surprisingly straightforward once you break it down. As long as we avoid overengineering early on, we can reach a functional, automated system much faster.</p><p>You can find the full code snippet at the bottom of this post or in the demo repository.</p><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AooM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AooM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!AooM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!AooM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!AooM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>IRHQ</strong> is a modern suite of tools designed to help security teams <strong>respond faster, reduce risk, and stay audit-ready</strong>. It&#8217;s the first platform to combine:</p><ul><li><p><strong>Incident Management</strong> - track and resolve incidents efficiently</p></li><li><p><strong>Built-in Post Mortem Frameworks</strong> - turn every incident into actionable and trackable action items</p></li><li><p><strong>Advanced Analytics</strong> - measure performance, spot trends, and improve security posture</p></li><li><p><strong>Compliance Reporting</strong> - simplify audits and show evidence of strong controls</p></li></ul><p>Take control of your IR operations and make <strong>IRHQ </strong>your<strong> go-to Incident Response Headquarters</strong>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://irhq.dev/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://irhq.dev/"><span>Learn More</span></a></p><div><hr></div><h1>Phase I: CI/CD Automation</h1><p>The first phase of my testing approach was, without question, the most critical.</p><p>It was logical that the CI/CD pipeline<strong> </strong>responsible for deploying detections should also handle their automated testing.</p><p>The first version of this workflow ran tests on every commit, with an option to manually trigger tests for specific detection folders when needed. And this entire pre-PR workflow had to pass before a Peer Review could even begin - meaning at least 1 folder must pass.</p><p>Why? Because no new detections should make it into production without passing the pipeline first.</p><p>Once tests passed, the Peer Review phase kicked in. Reviewers verified that the correct folders were tested, and authors were expected to attach a link to their passing test results in the pull request comments.</p><p>From there, reviewers confirmed that all mandatory test cases (one True and one False) were present, and encouraged authors to include the optional Edge and Additional cases for extra assurance.</p><p>Finally, once approved, the pipeline enforced that all log source subfolders in the detections directory had to pass testing. If even one unrelated detection to the Pull Request failed, no new deployments could proceed.</p><p>This is to strictly enforce that only functional detections can make it into our production environment.</p><p>This setup gave my team a solid foundation for our Detections-as-Code workflow, but it also surfaced a few pain points that would shape our next phase.</p><h1>Phase II: Local Testing</h1><p>As I started building my first batch of custom detections and porting over the out-of-the-box ones from DataDog into code, I began noticing clear friction in my testing workflow.</p><p>Every time I wanted to verify a small change, I had to commit the code, wait for the CI/CD job to spin up, let it run through Terraform checks, and finally manually trigger the test folder.</p><p>In total, a single test cycle could take 3-5 minutes just to confirm if a detection worked correctly. With the amount we&#8217;re expecting to utilize this workflow in the future, the time cost becomes painful fast.</p><p>So I asked myself: <em>I already have the testing infrastructure&#8230; what if I could know my code was correct before even committing it?</em></p><p>Enter the Python script.</p><p>I built it by repurposing the same logic from my CI/CD testing script and made it callable directly from the command line. This let me instantly test a single detection or an entire folder - no waiting, no pipeline delay.</p><p>The benefits were immediate: iteration became faster, wait times disappeared, and merge requests were cleaner since I no longer needed to squash a pile of micro-commits.</p><p>Best of all, it&#8217;s low-maintenance and consistent. By using the same core testing logic both locally and in CI/CD, I&#8217;ve kept testing predictable across environments - while moving a lot faster.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Moving Forward&#8230;</h1><p>While I have an MVP in front of me, it&#8217;s far from perfect.</p><p>For starters, my current implementation supports manually running specific folders. I made that choice intentionally because I felt it would give detection engineers flexibility to test only the detections they were actively working on, without waiting for the entire project to pass.</p><p>However, this has its drawbacks, because when developing detections, it means I have to manually kick off portions of the job each time. A better long-term approach would be for the pipeline to automatically detect which folders changed and dynamically run tests against only those. That&#8217;ll be my next quick win.</p><p>Another improvement on my roadmap is to dynamically set test case requirements based on each detection&#8217;s complexity. Instead of always requiring one true case, I could scale requirements based on the number of queries - ensuring every query has a mapped test case. This would tighten quality and scale much better over time.</p><p>Lastly, I plan to add support for additional detection types. While I&#8217;ve covered the most common ones, DataDog&#8217;s Terraform modules include quite a few variations. My YAML-based approach simplifies things, but it also adds complexity - requiring dynamic Terraform blocks rather than simple copy-paste patterns for new types.</p><p>That said, the turnaround from <em>no detections-as-code</em> to a fully automated CI/CD pipeline, complete with tests and our most popular detections migrated, was at just about one month.</p><p>The lesson? <strong>MVP &gt; Perfection.</strong></p><p>Ship fast, learn, and continuously evolve.</p><p><strong>Bash Script</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FUDH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FUDH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 424w, https://substackcdn.com/image/fetch/$s_!FUDH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 848w, https://substackcdn.com/image/fetch/$s_!FUDH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!FUDH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FUDH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png" width="464" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:464,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FUDH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 424w, https://substackcdn.com/image/fetch/$s_!FUDH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 848w, https://substackcdn.com/image/fetch/$s_!FUDH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!FUDH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff612f25a-ecd0-43d6-b6df-58f0c54f829e_464x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Python Script</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IC7z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IC7z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 424w, https://substackcdn.com/image/fetch/$s_!IC7z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 848w, https://substackcdn.com/image/fetch/$s_!IC7z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!IC7z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IC7z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png" width="799" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ceb25144-453b-4122-97fd-344e19ce043e_799x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:799,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IC7z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 424w, https://substackcdn.com/image/fetch/$s_!IC7z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 848w, https://substackcdn.com/image/fetch/$s_!IC7z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!IC7z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb25144-453b-4122-97fd-344e19ce043e_799x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How to Run a Table Top Exercise for Incident Response]]></title><description><![CDATA[Cybersec Caf&#233; #89 - 10/21/25]]></description><link>https://www.cyberseccafe.com/p/how-to-run-a-table-top-exercise-for</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/how-to-run-a-table-top-exercise-for</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 21 Oct 2025 13:00:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5Kk2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Kk2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Kk2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!5Kk2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!5Kk2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!5Kk2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Kk2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5Kk2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!5Kk2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!5Kk2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!5Kk2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6aa231-7b45-4a10-ba86-9ec47165a3ae_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The rollercoaster of emotions that comes with responding to a critical security incident is real, and nothing I say will fully capture that feeling.</p><p>Because of that, it&#8217;s nearly impossible to ever prepare perfectly. But what you <em>can</em> do is practice in a safe, low-stress environment so the team isn&#8217;t figuring things out for the first time during a real outage.</p><p>Enter the Table Top Exercise (TTX) - an informal discussion-based simulation where the team plays through different roles and decisions against a hypothetical incident scenario.</p><p>The main goal isn&#8217;t to break systems - it&#8217;s to practice processes, collaboration, and decision-making so that when something actually goes wrong, you&#8217;ve already worked through the hard parts together.</p><p>TTX&#8217;s are often a compliance checkbox once a year, but I&#8217;d argue that you should run them as often as your team finds them useful.</p><p>And putting a TTX together is easier than you think. Let&#8217;s run through the essentials.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>The Roles</h1><p>In order to run a successful TTX, there are various positions you&#8217;ll need to fill:</p><ol><li><p><strong>TTX Master</strong> - Facilitator and scenario driver. Usually a senior person who keeps the discussion moving, drops prompts when things stall, and ensures the exercise stays on track.</p></li><li><p><strong>Incident Commander </strong>- Leads the simulated response from open to close. Owns investigation, mitigation, and the overall course of action.</p></li><li><p><strong>Incident Deputy</strong> - Supports the Commander and owns documentation during the exercise (notes, timeline, decisions).</p></li><li><p><strong>SME (Subject-Matter Expert)</strong> - Brought in as needed (network, app, infra, legal, comms). Provide technical depth and business context.</p></li><li><p><strong>Cross-Functional Roles</strong> - <em>(Optional)</em> Invite representatives from IT, product, legal, PR, customer success - whoever you&#8217;d need for a real incident.</p></li></ol><h1>Ground Rules</h1><p>Set up expectations up front so the exercise is productive:</p><ol><li><p><strong>Focus on the Exercise, not the Incident</strong> - The scenario is artificial. Don&#8217;t get hung up on perfect realism. Prioritize process, communication, and decision-making.</p></li><li><p><strong>Work on Collaboration</strong> - Lean into your role. Ask questions. Play the worst-case assumptions and test your team&#8217;s response paths.</p></li><li><p><strong>No &#8220;Right&#8221; Answers</strong> - Encourage discussion and divergent thinking. That&#8217;s where the learning happens.</p></li><li><p><strong>Practice Like You Play</strong> - Capture timeline entries, decisions, artifacts, and open questions. The incident documentation plays a key part in your response and Post Mortem.</p></li></ol><h1>What You Need</h1><h3>Incident Response Processes</h3><p>A TTX is only as good as the processes it tests. The objective isn&#8217;t just to talk through a made-up incident - it&#8217;s to walk your team through your actual IR process from end to end and make sure everyone knows how to execute when the clock is ticking.</p><p>At a minimum, your team should have:</p><ul><li><p>An Incident Response documentation process (how you track timelines, artifacts, action items, meeting notes, etc.)</p></li><li><p>A Post-Mortem Process (how you capture root cause, lessons learned, improvement items, etc.)</p></li></ul><p>If you don&#8217;t have either in place, I got you covered. Check out my articles <a href="https://www.cyberseccafe.com/p/how-to-create-incident-response-documentation">How to Create Incident Response Documentation</a> and <a href="https://www.cyberseccafe.com/p/how-to-improve-your-security-posture">How to Improve Your Security Posture After a Security Incident</a>.</p><h3>TTX Scenario</h3><p>The scenario is the backbone of your exercise. Write it up in advance so the session flows smoothly.</p><p>A good scenario provides just enough detail to keep the conversation moving, but leaves plenty of space for the team to problem solve.</p><p>A few tips:</p><ul><li><p>Use real services and systems that exist in your environment.</p></li><li><p>Include specific assets like service accounts, container names, or endpoints to keep it grounded.</p></li><li><p>Keep it open-ended so the team has room to ask questions, pivot, and collaborate.</p></li></ul><p>Want a free set of Google Slides for your next TTX? Subscribers get it free on Cybersec OS! </p><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AooM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AooM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!AooM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AooM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!AooM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>IRHQ</strong> is a modern suite of tools designed to help security teams <strong>respond faster, reduce risk, and stay audit-ready</strong>. It&#8217;s the first platform to combine:</p><ul><li><p><strong>Incident Management</strong> - track and resolve incidents efficiently</p></li><li><p><strong>Built-in Post Mortem Frameworks</strong> - turn every incident into actionable and trackable action items</p></li><li><p><strong>Advanced Analytics</strong> - measure performance, spot trends, and improve security posture</p></li><li><p><strong>Compliance Reporting</strong> - simplify audits and show evidence of strong controls</p></li></ul><p>Take control of your IR operations and make <strong>IRHQ </strong>your<strong> go-to Incident Response Headquarters</strong>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://irhq.dev/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://irhq.dev/"><span>Learn More</span></a></p><div><hr></div><h1>Running Through the Incident Scenario</h1><p>When I run a TTX, I like to structure it around a simple, repeatable flow:<br><br><strong>Event &#8594; Outcome &#8594; Artifact</strong><br></p><ol><li><p><strong>Event</strong>: A short 1&#8211;2 sentence description of something that happens.</p></li><li><p><strong>Outcome</strong>: A summary of what results/findings from that event.</p></li><li><p><strong>Artifact</strong>: A deliverable that supports the outcome (for example, logs, screenshots, or emails).</p></li></ol><p>This flow keeps the incident moving in a way that feeds on itself.</p><p>I&#8217;ll typically repeat this 3-5 times throughout the exercise to create a natural rhythm and progression.</p><h3>The Beginning</h3><p>Start with an alert.</p><p>It could be a SIEM alert, a ticket from another team, or a low-level monitoring event that doesn&#8217;t seem like a big deal at first glance. The key is to make it realistic enough to start a conversation about risk, triage, and initial response steps.</p><p>Again, keep it open-ended. Your goal is to give the team just enough context to start discussing what they&#8217;d do next.</p><h3>The Middle</h3><p>This is the core of your exercise.</p><p>Plan for 3-5 events that progressively build the story and test different aspects of your IR process. Each event and outcome should be plausible and prompt critical thinking or decision making.</p><p>The idea is to come up with different things that could reasonably be found along the way while attempting to resolve the incident.</p><p>Each event/outcome should be something that could be thought up by the team through discussion.</p><p>A few tips:</p><ul><li><p>Assign fictional timestamps to events to simulate a real timeline</p></li><li><p>Include clear details on actors, systems, and actions involved.</p></li><li><p>Where possible, provide artifacts like JSON logs, screenshots, or mock files to give the scenario more realism.</p></li></ul><p>The middle of the TTX is where you&#8217;ll see collaboration, decision making, and process testing come to life.</p><h3>The End</h3><p>Close the scenario in a logical way for your exercise - whether it ends in a true positive or false positive is up to you.</p><p>This phase is also about reflection. Ask questions that help the team assess how well they worked together and what could be improved, such as:</p><ul><li><p>Was there an appropriate time along the way to communicate with stakeholders?</p></li><li><p>Were there any temporary actions that could have been taken along the way?</p></li><li><p>Were any response actions taken too early?</p></li><li><p>Was there a better way to contain the threat?</p></li></ul><p>As TTX Master, make sure to call out key learning objectives and check in with each participant. How confident do they feel with the tools, the processes, and their role in the response?</p><p>The goal is simple: identify opportunities for training and process improvement before a real incident forces you to.</p><h1>Running Through the Post Mortem</h1><p>The Post Mortem is just as important as the incident itself. It&#8217;s the time for all stakeholders to come together, reflect, and identify new areas for improvement.</p><p>The purpose here isn&#8217;t just to review what happened, it&#8217;s to practice running an effective Post Mortem so that when a real incident occurs, everyone already knows the process, their roles, and what&#8217;s expected of them.</p><p>This stage also gives the team experience in formally identifying root causes and spotting opportunities for improvement. Even in a simulated TTX scenario, there&#8217;s almost always something you can take away - whether it&#8217;s a process gap, documentation gap, or miscommunication that could slow you down in a real event.</p><p>The goal: make continuous improvement second nature, no matter if it&#8217;s a real incident or a practice run.</p><p>If you haven&#8217;t established your Post Mortem process yet, check out my article <a href="https://www.cyberseccafe.com/p/how-to-improve-your-security-posture">How to Improve Your Security Posture After a Security Incident</a>. It walks through exactly how to build one.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Measuring Success</h1><p>As TTX Master, your role is to observe how the team performs and identify where things can improve. Here are a few key areas to watch during the exercise:</p><ol><li><p><strong>Understanding of IR Processes</strong> - Make sure there&#8217;s no friction when it comes to spinning up resources, following playbooks, or referencing documentation. This is your chance to test how well your written processes actually hold up in practice.</p></li><li><p><strong>Communication and Collaboration - </strong>Watch how the team interacts under simulated pressure. Are they collaborating effectively? Are leaders guiding the conversation and fostering clear, open communication?</p></li><li><p><strong>Technical Familiarity -</strong> Pay attention to how comfortable the team is with the technologies involved. Misunderstandings here can reveal gaps in knowledge or training that could slow response time in a real incident.</p></li><li><p><strong>Role Execution - </strong>Each role should feel natural and defined. The Incident Commander should take clear ownership and direction, while the Incident Deputy maintains strong documentation and support. SMEs should demonstrate confidence within their areas of expertise.</p></li></ol><p>While there&#8217;s no single metric for success in a TTX, your job as facilitator is to take notes on any friction points, process gaps, or miscommunications that arise.</p><p>After the exercise, talk to your team. Gather their feedback, ask how comfortable they felt, and capture their perspectives on what worked and what didn&#8217;t.</p><p>Just like a SaaS company talks to its customers to understand pain points, you should talk to your team to understand <em>yours.</em></p><p>That&#8217;s how you improve your IR processes, your confidence, and ultimately - your security posture.</p><p>And finally, run TTXs often. Don&#8217;t limit them to a once-a-year compliance checkbox. Rotate roles, mix up scenarios, and give everyone the opportunity to build the experience and composure needed to thrive when the real thing hits.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How to Improve Your Security Posture After a Security Incident]]></title><description><![CDATA[Cybersec Caf&#233; #88 - 10/14/25]]></description><link>https://www.cyberseccafe.com/p/how-to-improve-your-security-posture</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/how-to-improve-your-security-posture</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 14 Oct 2025 13:02:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!P-Sn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P-Sn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P-Sn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!P-Sn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!P-Sn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!P-Sn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P-Sn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!P-Sn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!P-Sn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!P-Sn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!P-Sn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350b049-02a6-4e7f-9d13-5ffe0efc6367_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Security Incidents are some of the toughest situations you can be thrust into - not only as a security team, but as an entire organization.</p><p>They&#8217;re high-stakes, high-stress, and often come with reputational risk. The pressure is on to contain it fast and minimize the damage.</p><p>No matter what scenario puts you in this position, one thing&#8217;s certain - you&#8217;re in a tough spot.</p><p>But even when your back&#8217;s against the wall, there&#8217;s always an opportunity to turn the situation into something positive.</p><p>Every incident tells you something. It exposes weaknesses, highlights blind spots, and reveals parts of your attack surface you didn&#8217;t know existed.</p><p>Once you&#8217;ve contained the incident and things start to stabilize, don&#8217;t just move on. If it didn&#8217;t completely take you down, it should become an opportunity to make you stronger. Treat it as a lesson, not a loss.</p><p>As one of my old coaches used to say: &#8220;Mistakes are good, as long as you learn from them.&#8221;</p><p>That&#8217;s where the Post-Mortem, or what I prefer to call the After Action Report (AAR), comes in.</p><p>An AAR is your chance to slow down, bring all stakeholders to the table, and talk openly about what happened - what went wrong, why it went wrong, and how to make sure it doesn&#8217;t happen again.</p><p>It&#8217;s not about blame. It&#8217;s about growth. It&#8217;s about acknowledging shortcomings, celebrating wins, and walking away with a concrete plan to strengthen your security posture.</p><p>For me, conducting AARs after major incidents isn&#8217;t optional - it&#8217;s non-negotiable.</p><p>Here are my must-haves for running an effective AAR that actually improves your security posture.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Root Cause Analysis</h1><p>The first section of any AAR is also one of the most important: the Root Cause Analysis.</p><p>This is where all key stakeholders get the chance to formally discuss and agree on the true cause (or causes) of the incident.</p><p>The consensus forms the foundation for everything that follows. The root cause shapes not just the rest of the discussion, but also the bulk of the improvements that stem from it.</p><p>This is the moment to gather your SMEs and collectively identify what went wrong - not who went wrong. Blame doesn&#8217;t solve problems, but understanding does.</p><p>Nailing down the root cause is critical to ensuring history doesn&#8217;t repeat itself. When you start seeing the same causes appear across multiple incidents, it&#8217;s a red flag that your organization isn&#8217;t improving or maturing from a security perspective.</p><p>Once the group agrees on the cause, categorize it clearly and write a short description of what it entailed. That simple step makes later reporting, trend analysis, and follow-up work much easier.</p><p>A well-documented root cause sets the tone for a mature and transparent security culture - and that&#8217;s where real growth starts.</p><h1>AAR Rubric</h1><p>The AAR Rubric is a concept I coined to help objectively grade the team against a standardized framework each incident.</p><p>It&#8217;s a structured way to measure execution as a function, identify opportunities for improvement, and track performance over time.</p><p>Here&#8217;s some of my go-to questions, though there&#8217;s plenty of room to customize based on your environment:</p><ul><li><p>Was the incident detected in a timely manner?</p></li><li><p>Did members have sufficient training to handle this type of incident?</p></li><li><p>Was there an IR plan or playbook in place?</p></li><li><p>Were IR procedures adequate?</p></li><li><p>Were internal docs adequate to triage the incident?</p></li><li><p>Were stakeholders kept appropriately informed throughout the incident?</p></li><li><p>Were communications adequate?</p></li><li><p>Were mitigation efforts sufficient to prevent further impact?</p></li><li><p>Were the proper resources available to address the incident?</p></li><li><p>Did the response process avoid unnecessary downtime or collateral damage?</p></li><li><p>Is the team confident that similar incidents can be prevented in the future?</p></li></ul><p>I have a standardized grading system for each category:</p><ul><li><p>N/A (Not Applicable)</p></li><li><p>Poor</p></li><li><p>Needs Improvement</p></li><li><p>Good</p></li><li><p>Great</p></li><li><p>Highlight</p></li><li><p>Yes</p></li><li><p>No</p></li></ul><p>The purpose is twofold: to spot specific areas that need work, and to identify trends over time.</p><p>For instance, if the question <em>&#8220;Were IR procedures adequate?&#8221;</em> consistently gets marked as &#8220;Needs Improvement,&#8221; that&#8217;s a clear signal something systemic needs to change.</p><p>The real value of the AAR Rubric is in its trend analysis. It helps ensure your team isn&#8217;t just reacting incident to incident - but actually improving with each one.</p><p>Continuous improvement is the goal. The rubric gives you the data to prove it&#8217;s happening.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AooM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AooM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!AooM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AooM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!AooM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!AooM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4578d2c-8fdb-4a40-9c61-9e5a3297571e_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128680; <strong>Calling All Incident Responders!</strong> &#128680;</p><p>I&#8217;ve been building <strong>IRHQ</strong>, a new platform for security teams that makes incident response <strong>trackable, repeatable, and insightful</strong> - not a chaotic mix of Slack threads, docs, and spreadsheets.</p><p>If you&#8217;ve ever struggled to <strong>keep timelines straight</strong>, <strong>track details mid-incident</strong>, or <strong>wish you had real data to back up IR improvements</strong>, that&#8217;s <em>exactly</em> what IRHQ is built to fix.</p><p>I&#8217;m looking for a few experienced responders from the <em>Cybersec Caf&#233; Community</em> to test it out and share feedback that shapes where it goes next.</p><p>No sales pitch - just looking for thoughtful feedback to build something better for IR teams.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://irhq.dev/feedback&quot;,&quot;text&quot;:&quot;I'm Interested&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://irhq.dev/feedback"><span>I'm Interested</span></a></p><div><hr></div><h1>Discussion Items</h1><p>Discussion Items are a two-part process.</p><p>The first happens <em>during</em> the incident. These are notes or thoughts that you, or anyone on the team, capture in real time. They&#8217;re small things you don&#8217;t want to lose sigh of, like:</p><ul><li><p>Something that didn&#8217;t go smoothly</p></li><li><p>A tool you wish you had</p></li><li><p>A gap in documentation or communication</p></li></ul><p>I usually dedicate a section in my Incident Response document where participants can drop these items, along with a quick note or context.</p><p>The second part comes during the AAR itself. This is where we actually discuss each item in detail and document the outcomes of those discussions.</p><p>The purpose is to dig into the specifics - what went wrong, what could&#8217;ve gone better, and what we need to fix or improve. Whether it&#8217;s:</p><ul><li><p>A misconfiguration spotted</p></li><li><p>A process that needs to be formalized</p></li><li><p>An SOP that caused friction</p></li></ul><p>Whatever it is, make sure it gets surfaced and talked through. And always track <em>who</em> wrote down each item - the author will have the most context and can help drive a productive conversation.</p><p>The end goal of Discussion Items is to spark actionable improvements. Not every improvement ties directly to the root cause or the rubric. Some are smaller, one-off issues - but they still matter.</p><p>That&#8217;s where Discussion Items really shine - they capture the small details that often slip through the cracks but can have a huge impact when addressed.</p><h1>Cost</h1><p>One of the most underrated parts of an AAR is estimating the cost of the incident.</p><p>It&#8217;s not just about technical impact. It&#8217;s about illustrating exactly how much each incident <em>actually</em> costs the business. This transparency can be a powerful tool for driving executive buy-in and securing future funding for the improvements that matter most.</p><p>Here are the main categories I like to track.</p><ul><li><p><strong>Human Costs</strong>: Break this down into <em>human hours</em> and <em>estimated salary/hourly costs</em> for everyone involved, not just the security team. Think engineers, product managers, customer success, or anyone else pulled into the response.</p></li><li><p><strong>Tooling Costs</strong>: Capture any tools or licenses purchased specifically to aid the investigation or response.</p></li><li><p><strong>Service Costs: Track any external services or consulting engagements used during the incident.</strong></p></li><li><p><strong>Revenue Impact: Estimate the business impact. Did the incident cause downtime or interrupt operations that affected revenue?</strong></p></li></ul><p>Once you have your data, I like to summarize it into three clear metrics that tell the full story:</p><ul><li><p><strong>Estimated Incident Costs</strong> = Human + Tooling + Service</p></li><li><p><strong>Estimated Revenue Impact</strong></p></li><li><p><strong>Estimated Total Cost = Incident Costs + Revenue Impact</strong></p></li></ul><p>Over time, tracking these numbers helps you see patterns - especially if certain types of incidents keep costing you more.</p><p>If those costs start trending upward, you now have tangible data to justify additional spend in areas that will actually reduce your long-term risk and financial exposure.</p><p>Trust me, this is one adjustment I wish I&#8217;d started much earlier in my career.</p><h1>Improvement Items</h1><p>Improvement items are the <em>entire reason</em> you conduct an AAR in the first place.</p><p>They&#8217;re the concrete action items that are meant to prevent the same incident from happening again.</p><p>The most important thing here is ownership. Every improvement item must have a clear owner - because without ownership there is no accountability. And without accountability, those items will never get done.</p><p>Not every action item will be a top priority, and that&#8217;s okay. What <em>is</em> important is in the AAR to clearly document:</p><ul><li><p>What was discussed</p></li><li><p>Why it matters</p></li><li><p>Who is responsible</p></li></ul><p>Each root cause should be tied to at least one improvement item, if not more. Otherwise, you&#8217;re leaving parts of the incident unaddressed - and that&#8217;s how repeat issues happen!</p><p>During the AAR, I like to assign one member of the security team to take live notes on potential improvement items as the discussion unfolds. That way, by the time you get to this section, you&#8217;re not starting from scratch - you&#8217;re simply refining and assigning.</p><p>And finally, don&#8217;t let these items live and die inside your AAR document. Track them in your project management system or backlog where there&#8217;s visibility, reminders, and progress tracking.</p><p>Continuous improvement only happens when visibility and accountability go hand in hand.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Always Be Improving</h1><p>Remember - mistakes are good, as long as you learn from them.</p><p>While an incident is never ideal, every single one is a learning opportunity. It&#8217;s a direct signal point to where your security posture needs to improve.</p><p>The way I run my AARs has consistently helped pinpoint root causes, uncover org-wide areas for improvement, and drive accountability through clearly owned action items.</p><p>Doing things asynchronous and hoping they&#8217;ll just &#8220;get done&#8221; will never be as effective as sitting down for a formal discussion to hash out what actually happened and how to prevent it next time.</p><p>But now I want to hear from you - the Cybersec Caf&#233; community! How do you run your Post Mortems? This is one of those processes that rarely gets talked about openly, so I&#8217;d love to hear how others approach it. Drop your insights below!</p><p>And if you&#8217;re currently drowning in incidents, give AARs a shot. Worst-case scenario? You spend two hours talking with your team about how to get better. Best-case scenario? You continuously improve your security posture, start identifying long-term trends, and build a rock-solid business case for more investment in security.</p><p>Either way, you come out ahead.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Just Figure It Out]]></title><description><![CDATA[Cybersec Caf&#233; #87 - 10/07/25]]></description><link>https://www.cyberseccafe.com/p/just-figure-it-out</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/just-figure-it-out</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 07 Oct 2025 13:01:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ieok!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ieok!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ieok!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!Ieok!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!Ieok!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!Ieok!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ieok!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ieok!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!Ieok!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!Ieok!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!Ieok!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ba3ca51-a010-479d-b49a-467538d0df12_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In cybersecurity, the landscape never stops changing. If you want to succeed, you need to adapt. Fast.</p><p>Early in my career, I stumbled on a mindset that completely changed the way I work and accelerated my growth.</p><p>I call it the &#8220;Just Figure It Out&#8221; mindset.</p><p>Today, information is everywhere. A quick Google search or a single LLM prompt can unlock answers that once took weeks (or months) to put together.</p><p>And yet&#8230; I&#8217;m constantly surprised by how many people don&#8217;t leverage the powerful tools we have at our fingertips.</p><p>They get stuck, shrug their shoulders, and either move on or throw it over the fence to someone else.</p><p>With resourcefulness and the right mentality, you can solve problems faster, learn new skills on the fly, and keep pace with an industry that refuses to stand still.</p><p>Here&#8217;s how I&#8217;ve applied the &#8220;Just Figure It Out&#8221; mentality across different areas of cybersecurity, and why it&#8217;s been one of the biggest growth drivers of my career.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>New Tools &amp; Technologies</h1><p>Cybersecurity touches every corner of the tech industry, which means it&#8217;s constantly evolving alongside every tangent.</p><p>Attackers adapt their techniques daily, and staying ahead means adapting just as fast.</p><p>In my opinion, one of the best ways to do this is staying up to date with the latest tools. Whether it&#8217;s enterprise platforms or open-source projects, modern security teams have more options than ever.</p><p>Just see what problems people are solving out there.</p><p>And with the rise of SaaS and AI lowering the barrier to building products, each solution seems to have countless competitors - so you&#8217;ll be able to compare and contrast what works best for your use case.</p><p>The truth is, no two organizations will ever have an identical stack. Your next role might have a different SIEM, a new EDR, or a more expensive email getaway.</p><p>But no one is reinventing the wheel. The fundamentals remain the same.</p><p>Once you understand the core concepts behind tools like SIEMs, EDRs, and cloud providers, the differences lie in just the details.</p><p>That&#8217;s where the &#8220;Just Figure It Out&#8221; mindset kicks in. Learn to learn the nuances quickly without feeling like you&#8217;re starting from scratch.</p><h1>New Languages</h1><p>No, I&#8217;m not talking about French or Spanish. I&#8217;m talking about the different syntaxes you&#8217;ll come across as you pick up new tools and technologies.</p><p>Query Languages are a commodity these days. Every tool you&#8217;ll come across seems to have its own flavor.</p><p>But once you&#8217;ve mastered one, adapting to others gets easier.</p><p>At its core, they all work the same way: you&#8217;re selecting data from somewhere and filtering it down to what you find valuable.</p><p>The same goes for programming languages. If you learn the <em>major</em> language in the cybersecurity landscape (Python), you&#8217;ll find most security systems will support it.</p><p>And when you inevitably have to pivot, you&#8217;ll find it much easier to pick up that next language.</p><p>For example, with the rise of Infrastructure as Code, security engineers have been pushed to pick up Terraform. But a declarative language is much easier to pick up after learning the basics of an object-oriented language.</p><p>Plus, with LLMs at your fingertips, you can prompt to learn and prompt to solve. Leverage them to explain concepts, walk through examples, and accelerate your understanding - but don&#8217;t let it replace your critical thinking.</p><p>Accessibility isn&#8217;t an excuse to stay shallow.</p><p>Read, understand, implement. That&#8217;s how you&#8217;ll build lasting skills.</p><h1>Incident Response</h1><p>Every company is different. Tech stacks may look similar on paper, but architecture never is.</p><p>As you join a new organization, one of your first hurdles is learning the network and all of the services running inside of it.</p><p>Again - while the fundamentals don&#8217;t change, you&#8217;ll have to learn how the dots connect.</p><p>And even if you&#8217;re not new to an org, you&#8217;ll often respond to incidents in parts of the environment you never touched before. In fact, I&#8217;d argue most incidents don&#8217;t come neatly packaged with the full context you&#8217;d like.</p><p>You&#8217;ll be working with incomplete information, siloed knowledge, and business context you&#8217;re still piecing together.</p><p>That&#8217;s where &#8220;Just Figure It Out&#8221; really matters - learning how to make decisions with incomplete information.</p><p>You&#8217;ll need to learn how to quickly pull in the right team (system admins, developers, business owners) and piece together the puzzle on the fly.</p><p>That ability to adapt, learn, and connect the dots under pressure is what separates a good responder from a great one.</p><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether it&#8217;s <em>Detection Engineering, Incident Response, or Threat Huting</em> - Security Operations is built on data. And as a Security Engineer, you need to make that data work for you. <strong>Selecty is a database-agnostic, sidecar query assistant</strong> built to do just that. Generate queries based on your table schehmas, optimize them to your use case, iterate on them quickly, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h1>New SIEM Sources</h1><p>This one&#8217;s a given. You&#8217;re always going to be onboarding new log sources that you&#8217;ll need to learn in order to be effective at your job.</p><p>As business expands, so will the use cases for your SIEM - new tools, services, integrations. And with each comes a new schema to decipher.</p><p>We&#8217;d all love a world where logs are neatly standardized to a common schema, but that&#8217;s never going to happen. The reality is - that&#8217;s your job when you&#8217;re crafting your SIEM ingestion.</p><p>You&#8217;ll need to crack open raw logs, pick apart the key/value pairs, and figure out where the valuable fields lie.</p><p>Turning that noise into actionable data is a skill you only build by doing.</p><p>A &#8220;Just Figure It Out&#8221; mentality here can make you an assassin on the keyboard. The faster you can make sense of a new data source, the more valuable you become when an investigation lands on your plate.</p><p>Nothing is better than being so familiar with your log sources that you can write queries on a schema from memory.</p><p>And the only way to get to this level is by finding an excuse to work with your data:</p><ul><li><p>Run your own mini threat hunts</p></li><li><p>Find excuses to test new detection ideas</p></li><li><p>Build and refine a saved query library</p></li><li><p>Investigate alerts manually instead of relying only on dashboards</p></li></ul><p>Each of these builds a framework that forces you to &#8220;Just Figure It Out.&#8221;</p><p>And over time, those reps will make you reliable when it&#8217;s crunch time.</p><h1>Cloud Micro-Services</h1><p>It&#8217;s natural to get comfortable with the cloud services you touch every day. You build muscle memory, you learn the quirks, and you become incredibly efficient.</p><p>But as businesses evolve, new services will almost always get thrown into the mix.</p><p>That&#8217;s where the &#8220;Just Figure It Out&#8221; mentality comes in. When a new service lands on your plate, lean on every resource at your disposal:</p><ul><li><p>Leveraging official docs</p></li><li><p>Reading Blog Posts</p></li><li><p>Speaking with SMEs</p></li><li><p>Digging into Log Sources</p></li></ul><p>Personally, I prefer the latter - logs don&#8217;t lie.</p><p>Take AWS CloudTrail for example. By filtering down to a new service, you can piece together flows, establish baselines, and learn its schema in the context of your environment.</p><p>All of these skills start to stack. Once you&#8217;ve figured out a few services, your confidence will compound, and the next one won&#8217;t feel so intimidating.</p><p>And if you&#8217;re not there yet? That&#8217;s fine. You already know the answer: Just Figure It Out.</p><h1>New Responsibilities</h1><p>As you grow in your career, your responsibilities will inevitably expand.</p><p>And with that expansion comes the uncomfortable reality that you&#8217;ll be pushed into areas you&#8217;ve never touched before.</p><p>It&#8217;s part of growth not only as a professional, but as a person.</p><p>You won&#8217;t always be an expert. You may be asked to manage a team in a domain of cybersecurity you&#8217;ve never been hands-on with. Or lead a strategic initiative in an area that&#8217;s brand new to you.</p><p>In those moments, the &#8220;Just Figure It Out&#8221; mentality is your best tool.</p><p>Your job isn&#8217;t to know everything, it&#8217;s to learn fast enough to stay in the conversation and contribute meaningfully.</p><p>Knowledge is everywhere. But turning that knowledge into action is what makes you invaluable.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Seriously, Just Figure It Out</h1><p>The &#8220;Just Figure It Out&#8221; mentality is one of the fastest ways to grow.</p><p>It builds knowledge. It builds confidence. And it proves to yourself that you can handle whatever gets thrown your way.</p><p>At its core, it&#8217;s all about mindset - the belief that you not only <em>can</em> figure it out, but that you <em>will</em>.</p><p>Why? Because the information is out there. 99.9% of the time, we&#8217;re not reinventing the wheel.</p><p>The real skill is knowing how to find that information and apply it to solve problems.</p><p>So when in doubt&#8230; <em>Just Figure It Out.</em></p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Acronyms Suck… But Here’s Your Cybersecurity Acronym Guide Anyways]]></title><description><![CDATA[Cybersec Caf&#233; #86 - 09/30/25]]></description><link>https://www.cyberseccafe.com/p/acronyms-suck-but-heres-your-cybersecurity</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/acronyms-suck-but-heres-your-cybersecurity</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 30 Sep 2025 13:02:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3H1Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3H1Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3H1Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!3H1Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!3H1Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!3H1Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3H1Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3H1Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!3H1Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!3H1Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!3H1Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc660117b-27e2-42f3-9b91-38f903cfa43a_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When I first started in cybersecurity, I was lost.</p><p>Every meeting, it felt like I was listening to a foreign language. Not only was I trying to absorb a new industry and an endless stream of technical concepts, but the acronyms made it nearly impossible to follow along.</p><p>If I wasn&#8217;t confused going into a meeting, I most certainly was confused coming out of the meeting.</p><p>I think Elon Musk, a CEO with a track record of talking about efficiency in the workplace, said it best:</p><p>&#8220;Excessive use of made up acronyms is a significant impediment to communication&#8230; A few acronyms here and there may not seem bad, but if a thousand people are making these up, over time, the result will be a huge glossary that we have to issue to new employees. No one can actually remember all of these dumb acronyms and people don&#8217;t want to seem dumb in a meeting, so they sit there in ignorance. This is particularly tough on new employees.&#8221;</p><p>That quote sums up my first six months in cybersecurity perfectly.</p><p>But as much as we would like to ditch acronyms altogether, that&#8217;s not realistic. They exist for a reason - they make conversations faster and prevent us from saying five-word technical phrases over and over again.</p><p>Cybersecurity is already tough enough - let&#8217;s not make it harder with all of these acronyms.</p><p>While I can&#8217;t give you a guide to company specific acronyms, I decided to compile a list of acronyms spread across three categories: General Tech, Networks, and Cybersecurity Specific.</p><p>Whether you&#8217;re new to the field or just need a quick refresher in the middle of a meeting, use this as your cheat sheet.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>General Tech Acronyms</h1><ul><li><p><strong>API (Application Programming Interface)</strong>: A set of rules that lets software programs talk to each other.</p></li><li><p><strong>CLI (Command-Line Interface)</strong>: A text-based way to interact with your computer by typing commands instead of clicking.</p></li><li><p><strong>DNS (Domain Name System)</strong>: The &#8220;phonebook of the internet&#8221; that translates website names (like<em> google.com</em>) into IP addresses.</p></li><li><p><strong>GUI (Graphical User Interface)</strong>: The visual part of software (windows, icons, buttons) that makes it easier to use.</p></li><li><p><strong>IDE (Integrated Development Environment)</strong>: A software tool that gives programmers everything they need to write and debug code in one place.</p></li><li><p><strong>IP (Internet Protocol)</strong>: The addressing system that lets devices send and receive data across the internet.</p></li><li><p><strong>OS (Operating System)</strong>: The core software (like Windows, macOS, Linux) that manages your computer&#8217;s hardware and applications.</p></li><li><p><strong>RAM (Random Access Memory)</strong>: The short-term memory of a computer that stores data the system is actively using.</p></li><li><p><strong>SaaS (Software as a Service)</strong>: Cloud-based applications you access over the internet instead of installing locally (e.g., Gmail, Slack).</p></li><li><p><strong>SDK (Software Development Kit)</strong>: A collection of tools and libraries developers use to build applications for a specific platform.</p></li><li><p><strong>SQL (Structured Query Language)</strong>: The standard language used to interact with and manage databases.</p></li><li><p><strong>UI/UX (User Interface / User Experience)</strong>: UI is what you see and click, UX is how it feels to use the software overall.</p></li><li><p><strong>URL (Uniform Resource Locator)</strong>: The web address you type into a browser to visit a specific page or resource.</p></li><li><p><strong>VM (Virtual Machine)</strong>: A &#8220;computer inside a computer&#8221; that runs its own operating system on top of another system.</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>Networking Acronyms</h1><ul><li><p><strong>ARP (Address Resolution Protocol)</strong>: Maps an IP address to the physical MAC address of a device on a network.</p></li><li><p><strong>BGP (Border Gateway Protocol)</strong>: The routing protocol that decides how data travels between large networks across the internet.</p></li><li><p><strong>CIDR (Classless Inter-Domain Routing)</strong>: A way to represent IP address ranges more efficiently than the old class-based system.</p></li><li><p><strong>DHCP (Dynamic Host Configuration Protocol)</strong>: Automatically assigns IP addresses and network settings to devices.</p></li><li><p><strong>FTP (File Transfer Protocol)</strong>: An older protocol used to transfer files between computers over a network.</p></li><li><p><strong>FW (Firewall)</strong>: A security barrier that monitors and controls incoming and outgoing network traffic.</p></li><li><p><strong>HTTP/HTTPS (Hypertext Transfer Protocol / Secure)</strong>: The protocol that powers the web, with HTTPS adding encryption for security.</p></li><li><p><strong>ICMP (Internet Control Message Protocol)</strong>: Used by network devices to send error messages and diagnostics (like &#8220;ping&#8221;).</p></li><li><p><strong>ISP (Internet Service Provider)</strong>: The company that provides you access to the internet.</p></li><li><p><strong>LAN (Local Area Network)</strong>: A network of devices in a small physical area, like a home or office.</p></li><li><p><strong>MAC (Media Access Control)</strong>: A unique hardware address assigned to every network interface card (NIC).</p></li><li><p><strong>NACL (Network Access Control List)</strong>: A set of rules that control what traffic is allowed in or out of a network.</p></li><li><p><strong>NAT (Network Address Translation)</strong>: Lets multiple devices share a single public IP address by translating traffic.</p></li><li><p><strong>OSI (Open Systems Interconnection)</strong>: A conceptual model that describes how different layers of networking work together.</p></li><li><p><strong>QoS (Quality of Service)</strong>: Manages bandwidth and prioritizes network traffic to improve performance.</p></li><li><p><strong>SMTP (Simple Mail Transfer Protocol)</strong>: The protocol used to send email across the internet.</p></li><li><p><strong>SNMP (Simple Network Management Protocol)</strong>: Allows administrators to monitor and manage network devices.</p></li><li><p><strong>SSH (Secure Shell)</strong>: A secure way to remotely log into and manage servers over a network.</p></li><li><p><strong>TCP/IP (Transmission Control Protocol / Internet Protocol)</strong>: The foundational suite of protocols that power the internet.</p></li><li><p><strong>UDP (User Datagram Protocol)</strong>: A faster but less reliable protocol for sending data, often used for streaming or gaming.</p></li><li><p><strong>VPN (Virtual Private Network)</strong>: Encrypts your internet connection and hides your IP address for privacy and security.</p></li><li><p><strong>WAF (Web Application Firewall)</strong>: A firewall specifically designed to protect web applications from common attacks.</p></li><li><p><strong>WLAN (Wireless Local Area Network)</strong>: A Wi-Fi network that connects devices without cables.</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Cybersecurity Acronyms</h1><ul><li><p><strong>APT (Advanced Persistent Threat)</strong>: A long-term, targeted cyberattack where attackers quietly stay inside a network to steal data.</p></li><li><p><strong>AV (Antivirus)</strong>: Software that scans and removes malicious programs from computers.</p></li><li><p><strong>C2 (Command and Control)</strong>: The server that attackers use to remotely control compromised machines.</p></li><li><p><strong>CERT/CSIRT (Computer Emergency Response Team / Computer Security Incident Response Team)</strong>: Specialized teams that handle and respond to cybersecurity incidents.</p></li><li><p><strong>CVE (Common Vulnerabilities and Exposures)</strong>: A public catalog of known software and hardware security flaws.</p></li><li><p><strong>DLP (Data Loss Prevention)</strong>: Tools and policies that prevent sensitive data from leaking outside an organization.</p></li><li><p><strong>DDoS (Distributed Denial of Service)</strong>: An attack that floods a system or website with traffic from many sources to make it unavailable.</p></li><li><p><strong>EDR (Endpoint Detection and Response)</strong>: Security tools that monitor computers and devices for suspicious activity and attacks.</p></li><li><p><strong>IAM (Identity and Access Management)</strong>: The framework for managing user identities and controlling who can access what.</p></li><li><p><strong>IDS/IPS (Intrusion Detection System / Intrusion Prevention System)</strong>: Systems that detect (IDS) or block (IPS) malicious activity on a network.</p></li><li><p><strong>IOC (Indicator of Compromise)</strong>: A clue or artifact (like a file hash, IP, or domain) that suggests a system has been attacked.</p></li><li><p><strong>MITRE ATT&amp;CK</strong>: A knowledge base that documents real-world hacker tactics and techniques for defenders to study.</p></li><li><p><strong>MFA (Multi-Factor Authentication)</strong>: A login method requiring more than one proof of identity (like password + code on your phone).</p></li><li><p><strong>NIST (National Institute of Standards and Technology)</strong>: A U.S. agency that publishes widely used cybersecurity standards and guidelines.</p></li><li><p><strong>PKI (Public Key Infrastructure)</strong>: The system that manages encryption keys and digital certificates to enable secure communications.</p></li><li><p><strong>SIEM (Security Information and Event Management)</strong>: A platform that collects, analyzes, and alerts on security logs across an organization.</p></li><li><p><strong>SOC (Security Operations Center)</strong>: The team or facility that monitors and responds to security threats in real time.</p></li><li><p><strong>SAST/DAST (Static/Dynamic Application Security Testing)</strong>: Tools that scan code (SAST) or running apps (DAST) for vulnerabilities.</p></li><li><p><strong>SOAR (Security Orchestration, Automation, and Response)</strong>: Tools that automate security workflows and incident response tasks.</p></li><li><p><strong>TTPs (Tactics, Techniques, and Procedures)</strong>: The patterns of behavior attackers use, from strategy down to specific methods.</p></li><li><p><strong>XDR (Extended Detection and Response)</strong>: A security solution that integrates threat detection across endpoints, networks, and cloud systems.</p></li><li><p><strong>ZTA (Zero Trust Architecture)</strong>: A security model that assumes no one, inside or outside the network, should be trusted by default.</p></li></ul><div><hr></div><p>&#128172; <strong>Did I miss any? Drop them in the comments below!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/acronyms-suck-but-heres-your-cybersecurity/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberseccafe.com/p/acronyms-suck-but-heres-your-cybersecurity/comments"><span>Leave a comment</span></a></p><div><hr></div><h1>Acronym King</h1><p>As much as acronyms suck, they&#8217;re here to stay..</p><p>That means the faster you get up to speed, the easier it&#8217;ll be to follow along in architecture reviews, change boards, or even just your day-to-day team conversations.</p><p>And let&#8217;s be honest - nobody wants to say &#8220;Endpoint Detection and Response&#8221; every time when a simple &#8220;EDR&#8221; will do.</p><p>Use this as a guide to strengthen your acronym game, and better yet, contribute to it in the comments and help others out in the Cybersec Caf&#233; community!</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Security Engineer Starter Guide: Cloud Security]]></title><description><![CDATA[Cybersec Caf&#233; #85 - 09/23/25]]></description><link>https://www.cyberseccafe.com/p/security-engineer-starter-guide-cloud</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/security-engineer-starter-guide-cloud</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 23 Sep 2025 13:02:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iDmu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iDmu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iDmu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!iDmu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!iDmu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!iDmu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iDmu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iDmu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!iDmu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!iDmu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!iDmu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9782376e-1d30-41c3-bafb-48358fa01a5b_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>With the pace of business today, cloud adoption is a key ingredient to accelerating how businesses scale, ship products faster, and reach the market first.</p><p>But with that speed comes tradeoff: expanded attack surfaces.</p><p>This adoption of cloud infrastructure has fundamentally changed how we approach security. Unlike traditional on-prem environments, where perimeters are more defined, the &#8220;infinite perimeter&#8221; of the cloud means your resources can (theoretically) be accessed from anywhere.</p><p>Cloud providers operate under a shared responsibility model, which helps, but it doesn&#8217;t absolve customers of their part. At the end of the day, you&#8217;re still responsible for workloads, configurations, identity, and data.</p><p>That&#8217;s why the demand for Security Engineers with cloud expertise continues to grow. If you&#8217;re looking to pivot into this in-demand field, here&#8217;s how I&#8217;d start building a strong foundation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Cloud-Agnostic Security Concepts</h1><p>Each cloud provider (AWS, Azure, GCP, etc.) has its quirks, but the fundamentals remain consistent.</p><p>If you double down on the basics, you&#8217;ll be able to pivot into any provider quickly and adapt to whatever stack your company uses.</p><h3>Identity and Access Management (IAM)</h3><p>At its core, cloud security is really about identity.</p><p>That&#8217;s because identity has become the new perimeter. Attackers no longer need to brute force Firewalls and probe networks. If they can just hijack valid credentials, they can walk straight into your environment.</p><p>IAM has a few fundamental building blocks:</p><ul><li><p><em>Users</em> represent individual entities, like human users or service accounts.</p></li><li><p><em>Roles</em> are sets of permissions that can be assumed by users, apps, or services.</p></li><li><p><em>Groups</em> are logical collections of users that inherit policies.</p></li><li><p><em>Policies</em> are JSON-like permission sets that define what actions are allowed or denied.</p></li></ul><p>There are a few best practices when it comes to IAM:</p><ul><li><p>Avoid raw user accounts for day-to-day use and instead opt to federate users through SSO and enforce role-based access with Just-in-Time (JIT) provisioning.</p></li><li><p>Use groups to scale policy management across your user base.</p></li><li><p>Leverage the Principle of Least Privilege (PoLP) to design policies so users and services only get the access they need and nothing more.</p></li></ul><p>Overly broad roles and misconfigured policies are some of the most common (and costly) pitfalls in cloud security. Tight IAM controls are often the difference between a minor incident and a full blown breach.</p><h3>Networking &amp; Segmentation</h3><p>At a high level, cloud networking looks a lot like on-prem, just with some new terminology.</p><ul><li><p><em>VPCs (Virtual Private Clouds)</em> are essentially the cloud equivalent of a datacenter network. They cut out a private slice of the provider&#8217;s global infrastructure, letting you define your own IP ranges, routing rules, and connectivity. Misconfigurations here are one of the fastest ways to unintentionally expose workloads to the internet.</p></li><li><p><em>Subnets</em> work in much the same way as on-prem and are commonly split into public and private zones to control exposure.</p></li><li><p><em>Security Groups (SGs)</em> and <em>Network ACLs (NACLs)</em> act as your main filters. SGs are instance-level, stateful firewalls that handle both inbound and outbound rules. While NACLs are subnet-level, stateless filters with explicit allow/deny logic.</p></li></ul><p>The key here is microsegmentation. You can shrink your attack surface and minimize blast radius in the event of an incident just by applying fine-grained controls between your workloads.</p><h3>Data Protection</h3><p>You&#8217;ve heard it before, and you&#8217;ll hear it again: Encryption in Transit and At Rest in the Cloud.</p><p>Fortunately, most cloud providers make this straightforward. TLS is easy to enforce across internal APIs and external endpoints, and storage systems often encrypt at rest by default.</p><p>You&#8217;ll also have to get comfortable with a couple critical services:</p><ul><li><p><em>Key Management Systems (KMS)</em> are provider-managed services that handle key creation, rotation, and usage. You can define fine-grained access controls around who or what can use specific keys.</p></li><li><p>Secrets Managers centralize sensitive values, enforce rotation policies, and give you visibility into who access what, when - for those pesky audits.</p></li></ul><p>Used together, KMS and Secrets Managers provide a solid foundation for a data protection strategy in the cloud.</p><h3>Monitoring and Logging</h3><p>Visibility is non-negotiable in the cloud.</p><p>Cloud providers offer services that collect complete audit trails of who did what, where, and when. These logs are invaluable for forensics, so you&#8217;ll want to get them ingested into your SIEM ASAP in order to correlate, investigate, and get real-time alerting.</p><p>These providers also have their own flavors of anomaly and threat detection services that leverage machine learning and threat intelligence to surface anomalies. While they can&#8217;t replace custom detection, they&#8217;re a welcome compliment.</p><p>You&#8217;ll still need to put on your detection engineer hat to fight off alert fatigue, so if you&#8217;re already ingesting your cloud log sources into your SIEM - I&#8217;d suggest checking out my <a href="https://www.cyberseccafe.com/p/security-engineer-starter-guide-detection">Detection Engineering Starter Guide</a>.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>Key Threats in the Cloud</h1><p>To be an effective Cloud Security Engineer, you&#8217;ll need to get good at identifying potential indicators of misconfiguration (IOMs) and potential attack paths.</p><p>While finding advanced threats takes some experience, generally the most impact comes from nailing the fundamentals.</p><p>Here are some of the top threats you can start addressing from day one.</p><h3>Misconfigurations</h3><p>Misconfigurations are a primary cause of cloud breaches, and unfortunately - they&#8217;re everywhere. Even with Infrastructure as Code (IaC) reducing risk, mistakes still slip through.</p><p>Some classic examples include:</p><ul><li><p><em>Open storage buckets</em> are the byproduct of misunderstood defaults and rushed settings. Suddenly, your bucket is wide open to the internet. Attackers passively scan for these and what can leak out usually isn&#8217;t good: PII, credentials, or even proprietary source code.</p></li><li><p><em>Overly permissive IAM roles</em> occur when convenience takes precedence and caution is thrown to the wayside. It&#8217;s not uncommon to see blanket administrator roles attached to roles that have no business having those permissions. Ignoring the Principle of Least Privilege doesn&#8217;t just expand your attack surface, it creates a fleet of unnecessary high-privilege accounts waiting to be abused.</p></li><li><p>Even in IaC-driven environments, manual console tweaks can lead to <em>Infrastructure drift</em>. Those one-off changes create inconsistencies, complicate audits, and leave a hidden layer to your attack surface that will soon be forgotten.</p></li></ul><p>Misconfigurations are easy to make, and just as easy for attackers to find. Your job is to spot them early, correct them quickly, and to foster a culture that puts Infrastructure as Code first.</p><h3>Credential Theft &amp; Privilege Escalation</h3><p>Cloud credentials make the mouths of attackers water.</p><p>And even though credentials are known to be sensitive, it&#8217;s surprisingly common for developers to accidentally commit access keys into repositories.</p><p>If those repos are public, you&#8217;ve just gifted everyone the keys to the kingdom.</p><p>Even in private repos, once credentials are exposed, they can be chained with misconfigurations or overly permissive roles to move laterally and escalate privileges. And just like that, what may seem like a small leak can escalate to a full environmental compromise.</p><p>Even with a strong logging and monitoring strategy, credential misuse is notoriously hard to detect because it just looks like legitimate access at that point.</p><h3>Supply Chain Risks</h3><p>Just like any project, your cloud environment runs on top of countless dependencies, packages, images, and pipelines.</p><p>And each has risks associated:</p><ul><li><p><em>Dependency poisoning</em> can occur from a typosquatted malicious package, or even a legitimate library that quietly accepted a malicious pull request. Installing the wrong code can cause instant RCE, credential theft, or potentially even worse.</p></li><li><p><em>Insecure base images can often contain outdated libraries and known vulnerabilities that devs may not notice until too late. Pulling &#8220;latest&#8221; without validation is a recipe for trouble. Make sure to pin to a stable version.</em></p></li><li><p>CI/CD pipeline compromise can effectively allow an attacker to inherit trusted, privileged access to your cloud environment. Your pipeline is a crown jewel - protect the secrets, signing keys, and deployment credentials that it holds.</p></li></ul><p>If you don&#8217;t know and control what&#8217;s running in your environment, someone else will figure out a way to!</p><h1>Essential Cloud Skills for Security Engineers</h1><p>Understanding threats is only half the job.</p><p>The other half is building the skills to mitigate them. Cloud environments demand a mindset that balances speed, scale, and security without slowing down the business.</p><p>Here are the core skills I&#8217;d focus on to level up as a Cloud Security Engineer.</p><h3>Strong IAM Knowledge</h3><p>It&#8217;s one thing to understand IAM concepts, and another to actually enforce PoLP at scale.</p><p>That means:</p><ul><li><p>Granting only the minimum necessary permissions for roles.</p></li><li><p>Using groups and policies to manage users efficiently.</p></li><li><p>Striking a balance between strong security and developer productivity.</p></li></ul><p>On the operation side, partner with IT to federate your cloud environment into SSO or enforce MFA everywhere, and apply a logging strategy.</p><p>And of course - ban use of the root account unless in the case of emergencies. Monitor it closely, and make sure no one uses it for day-to-day operations.</p><h3>Zero Trust Networking</h3><p>The old mindset of &#8220;inside equals safe&#8221; doesn&#8217;t cut it in the cloud.</p><p>A Zero Trust approach means every request must be authenticated and authorized, even if it originates from inside your VPC.</p><p>In practice, this means building systems around continuous verification and treating internal traffic with the same scrutiny as external.</p><p>By leaving implicit trust at the door, you reduce the blast radius of compromise and force attackers to work harder for every step they try to take.</p><h3>Container &amp; Kubernetes Basics</h3><p>You&#8217;ll want a solid grasp of containerization concepts effectively with DevOps and Infrastructure teams while also spotting potential security gaps.</p><p>At minimum, you should be familiar with:</p><ul><li><p><em>Namespaces</em>: Logical isolation of workloads</p></li><li><p><em>Registry</em>: Servers that store and distribute container images</p></li><li><p><em>RBAC</em>: Role Based Access Control for fine-grained permissions</p></li><li><p><em>Pod Security Policies/Pod Security Admission</em>: Controls that prevent risky or insecure configurations</p></li></ul><p>From a security perspective, focus on protecting registries and images.</p><p>Use private registries with enforced access controls, regularly scan images for CVEs, implement signed images to prevent tampering, and avoid the &#8220;latest&#8221; tag by pinning to immutable versions.</p><p>These measures reduce risk and increase confidence in what&#8217;s running in production.</p><h3>IaC &amp; Drift Management</h3><p>Infrastructure as Code (IaC) is now a standard practice.</p><p>And while you don&#8217;t necessarily need to write production-ready templates, you should be able to read and understand them.</p><p>IaC enabled repeatability, version control, and peer review - which in turn makes infrastructure predictable and secure.</p><p>Although each tool has its own syntax and providers, the declarative approach is consistent.</p><p>As a security engineer, your role is to:</p><ul><li><p>Integrate security checks directly into the development workflow.</p></li><li><p>Help teams identify misconfigurations early.</p></li><li><p>Address infrastructure drift.</p></li></ul><p>Unmanaged drift creates &#8220;invisible&#8221; infrastructure - your attacker's ideal target. Staying on top of drift ensures you&#8217;re defending the actual state of your environment, not just the state defined in code.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Cloud-Native</h1><p>Cloud is the new baseline, and it&#8217;s becoming a requirement to have this kind of knowledge in the various security engineering disciplines.</p><p>Security engineers today are expected to protect this dynamic and distributed cloud infrastructure.</p><p>That shift means rethinking familiar concepts in new contexts:</p><ul><li><p>Running IR in the cloud.</p></li><li><p>Leveraging cloud-native threat intelligence.</p></li><li><p>Working with developers to embed security early in their pipeline.</p></li></ul><p>The work is different, but principles remain.</p><p>The key is continuous learning and adaptability. Build your foundation cloud-agnostically, then map them to the services and platforms your organization uses.</p><p>This approach keeps your skills portable, scalable, and resilient as the cloud continues to evolve - making you cloud-native.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Soft Skills in Cybersecurity]]></title><description><![CDATA[Cybersec Caf&#233; #84 - 09/16/25]]></description><link>https://www.cyberseccafe.com/p/soft-skills-in-cybersecurity</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/soft-skills-in-cybersecurity</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 16 Sep 2025 13:00:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eiji!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eiji!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eiji!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!eiji!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!eiji!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!eiji!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eiji!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eiji!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!eiji!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!eiji!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!eiji!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c730344-41d3-49db-bb95-0a349f7219d8_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybersecurity isn&#8217;t just about firewalls, exploits, or technical know-how. It&#8217;s also about people.</p><p>Too often, soft skills get overlooked in favor of technical abilities. And while technical skills are certainly a major part of the field, they&#8217;re only part of the equation. The other half, the part that makes you effective beyond the keyboard, is how you work with people.</p><p>Like it or not, people are always part of the security equation. You won&#8217;t be siloed to your department. You&#8217;ll collaborate across teams, partner with stakeholders, and negotiate with vendors.</p><p>That&#8217;s where soft skills come in. They help you influence decisions, lead with your vision, earn trust, and build rapport.</p><p>They can be the difference between landing a job and being passed over. The difference between being a good professional and a great one.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Key Soft Skills Every Cybersecurity Professional Should Develop</h1><h3>Communication</h3><p>Communication in cybersecurity isn&#8217;t just about sounding polished or articulate. It&#8217;s about making sure your message lands.</p><p>That means being able to:</p><ul><li><p>Translate technical findings into business language.</p></li><li><p>Write concise incident reports, executive summaries, and documentation.</p></li><li><p>Explain risk in a way that enables decisions.</p></li><li><p>Clearly lay out tradeoffs.</p></li></ul><p>But communication isn&#8217;t only about talking, it&#8217;s about listening. Don&#8217;t just listen to respond. In security, you need to listen to understand.</p><p>Take in the perspectives of engineers, executives, and stakeholders, and then weigh them with your own judgment. You don&#8217;t have to accept everything at face value, but you do need to account for it.</p><h3>Collaboration</h3><p>You won&#8217;t spend your career working only with other security engineers. In fact, most of your impact will come from how well you work with people outside of security.</p><p>Collaboration often looks like:</p><ul><li><p>Partnering with compliance teams on audits.</p></li><li><p>Helping IT refine policies.</p></li><li><p>Communicating incidents to executives.</p></li><li><p>Coordinating a diverse cast during an incident response.</p></li><li><p>Reviewing architectures with engineering teams.</p></li></ul><p>And that&#8217;s just the beginning.</p><p>Good collaboration is about finding common ground, speaking in a way others can understand, and working together toward solutions that stick.</p><p>In order to be a strong teammate, stay open to new ideas and approaches, even if they aren&#8217;t the ones you would have chosen first.</p><h3>Leadership</h3><p>Even if you&#8217;re not a manager, leadership qualities are some of the most valuable you can bring to the table.</p><p>Strong leadership drives projects forward, creates meaningful impact, and helps motivate those around you.</p><p>Even without the formal manager title, you might find yourself:</p><ul><li><p>Leading an incident response</p></li><li><p>Mentoring junior staff</p></li><li><p>Driving project direction</p></li><li><p>Setting strategic goals and milestones for the team</p></li></ul><p>Leadership is less about authority and more about trust.</p><p>Build that trust through having a reputation for action. Your teammates will notice, making them far more likely to follow your lead.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h3>Critical Thinking and Problem Solving</h3><p>The ability to take in data and make smart, informed decisions is a brain muscle that needs constant exercise.</p><p>In security, you&#8217;ll often make high-impact calls with incomplete information. That&#8217;s where weighing risk and trade-offs becomes essential.</p><p>There is also something I was once told by a friend, somewhat jokingly, but oddly resonated: &#8220;Don&#8217;t come to me with problems, come to me with solutions.&#8221;</p><p>No one wants to work alongside someone who only points out problems without moving the needle forward.</p><p>Be the person who takes initiative to drive solutions. Even if you don&#8217;t have the full answer, come prepared with potential options and kick off the dialogue.</p><p>At the end of the day, this job is problem-solving. The faster you embrace the mindset, the more effective you&#8217;ll be.</p><h3>Adaptability and Continuous Learning</h3><p>Technology is always changing, and the threat landscape constantly changes with it.</p><p>Curiosity and adaptability are survival skills in cybersecurity. You need to:</p><ul><li><p>Pick up new tools quickly.</p></li><li><p>Understand shifting business contexts.</p></li><li><p>Learn how to ask sharp, relevant questions.</p></li></ul><p>What&#8217;s critical today may be irrelevant tomorrow, and professionals who thrive are the ones who can pivot without losing momentum.</p><h3>Emotional Intelligence</h3><p>A large part of cybersecurity is managing the emotional rollercoaster.</p><p>On-call rotations, surprise incidents, and high-stakes decisions can start to take a toll.</p><p>The best security professionals learn how to manage stress and stay level-headed when it matters most.</p><p>Emotional intelligence also means empathy. You&#8217;ll often work with non-technical colleagues who don&#8217;t share your background, and occasionally with technical peers who have different priorities.</p><p>Patience, empathy, and the ability to communicate at their levels are core to building rapport.</p><p>At the end of the day, your role is just as much about securing systems as it is about educating and guiding the people you work with.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Soft Skills: Your Unfair Advantage</h1><p>Technical skills may open the door, but soft skills will be the ones that help move you up the ladder.</p><p>The skills we&#8217;ve covered: communication, collaboration, leadership, problem solving, adaptability, emotional intelligence - these help you build trust, influence others, and ultimately amplify the impact of your technical work.</p><p>The good news? Soft skills can be trained just like technical ones. A few practical ways to start:</p><ul><li><p>Seek feedback from your peers/managers.</p></li><li><p>Volunteer to give presentations in low-stakes settings.</p></li><li><p>Take the lead on small projects or meetings.</p></li><li><p>Mentor junior teammates and help them grow.</p></li></ul><p>Cybersecurity has always been about more than firewalls, logs, or alerts. The more intentional you are about strengthening these skills, the more effective you&#8217;ll become.</p><p>So, be honest with yourself: Which of these skills do you need to work on the most?</p><p>That&#8217;s your starting point. Because just like any muscle, soft skills only grow when you use them.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Lack of SOAR and AI Agents isn’t Killing Your SOC. Poor Alerts Are.]]></title><description><![CDATA[Cybersec Caf&#233; #83 - 09/09/25]]></description><link>https://www.cyberseccafe.com/p/lack-of-soar-and-ai-agents-isnt-killing</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/lack-of-soar-and-ai-agents-isnt-killing</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 09 Sep 2025 13:02:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hfXh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hfXh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hfXh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!hfXh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!hfXh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!hfXh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hfXh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/562b9640-856d-494f-94b0-37185c271f94_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hfXh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!hfXh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!hfXh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!hfXh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562b9640-856d-494f-94b0-37185c271f94_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>SIEM is the backbone of every detection engineering program.</p><p>It gives you log aggregation, near real-time alerting, and a single pane of glass where everything is searchable and (hypothetically) correlatable.</p><p>But as your detection program grows, if you don&#8217;t have a solid engineering process in front of it, alert fatigue will hit you fast. And just having a SIEM in place on its own won&#8217;t save you from that.</p><p>When teams hit this wall, that&#8217;s usually when teams start looking at the next shiny thing: SOAR platforms or, lately, the mystical &#8220;AI Agents.&#8221; Just picture it:</p><p><em>Automated initial triage. Response workflows. Branching logic that adapts with every new data point -</em> Sounds amazing, doesn&#8217;t it?</p><p>Well, I&#8217;m sure I&#8217;m not the first you&#8217;ve seen to say it, but more tools don&#8217;t automatically make your detection program better.</p><p>The promises of SOAR and AI Agents infatuate many detection engineering teams, but is it really the logical next step for you?</p><p>Yes, SOAR and AI tools can help reduce some noise and automate repetitive tasks. But they&#8217;re bandaid fixes to your problems, not cures.</p><p>And if your alerts are poorly designed, automation only helps you fail faster.</p><p>The real problem isn&#8217;t a lack of SOAR or AI Agents - it&#8217;s bad alerts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>How to Address Your Poor Alerts</h1><p>When I say &#8220;poor alerts,&#8221; I&#8217;m talking about the constant stream of detections in your SIEM that just aren&#8217;t pulling their weight. Usually, they fall into one of three buckets:</p><ul><li><p>They don&#8217;t provide any <em>real</em> value</p></li><li><p>They&#8217;re detached from your environmental context</p></li><li><p>They lack the context you need to actually investigate</p></li></ul><p>Bottom line: you need a methodical way to improve alert quality.</p><p>Here&#8217;s where I&#8217;d start.</p><h3>Tune Out Alerts that aren&#8217;t Valuable</h3><p>One of the biggest mistakes I see is letting weak alerts linger far too long because of <em>perceived</em> value.</p><p>This usually looks like keeping a detection around because the activity it picks up <em>sounds</em> suspicious, but in reality, it&#8217;s just flagging normal behavior over and over again.</p><p>Medium severity detections are notorious for this problem.</p><p>There are two approaches I take with high-volume, low-value alerts:</p><ol><li><p><strong>Tuning the Detection</strong>: While tuning sounds like the simple and obvious choice, it isn&#8217;t just an easy tweak and checkbox exercise. It requires a deep understanding of the log source and how attackers actually abuse the behavior you&#8217;re trying to pick up on. Without that context, you risk tuning yourself into blindness.</p></li><li><p><strong>Using the Detection in Conjunction with Others</strong>: Sometimes a noisy detection isn&#8217;t useless. It&#8217;s just weak on its own. Repurpose it to strengthen confidence when combined with other signals. By itself, it might be informational. Paired with another detection in the same time window, it might point to something more serious.</p></li></ol><p>The goal of either approach is to eliminate busy work chasing meaningless alerts.</p><p>But be cautious and don&#8217;t get too trigger-happy. If you tune too aggressively or downgrade everything, you&#8217;ll lose visibility into your environment fast.</p><p>Move slowly, validate changes, and make sure new behavior matches your expectations.</p><p>If you want a deeper dive, check out my article on my <a href="https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless">detection tuning</a> methodology. The TL;DR: start broad, collect data, and gradually refine down to granular coverage as you scale.</p><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether it&#8217;s <em>Detection Engineering, Incident Response, or Threat Huting</em> - Security Operations is built on data. And as a Security Engineer, you need to make that data work for you. <strong>Selecty is a database-agnostic, sidecar query assistant</strong> built to do just that. Generate queries based on your table schehmas, optimize them to your use case, iterate on them quickly, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h3>Get in Touch with Your Environment</h3><p>One of the earliest lessons in detection engineering is that most of your Indicators of Compromise (IOCs) come down to privileged actions being taken under the wrong guise.</p><p>However, you&#8217;ll also quickly find that these same privileged actions are also carried out legitimately every single day by real users and service accounts.</p><p>Without tuning, you&#8217;ll drown in false positives.</p><p>The fix starts with research. Over time, patterns begin to emerge, and it&#8217;s your job as a detection engineer to recognize them.</p><p>You&#8217;ll also find it valuable to communicate with stakeholders. They&#8217;ll likely be able to tell you exactly which accounts or teams routinely perform certain actions, and the business cases behind them.</p><p>And sometimes, the tuning idea comes from anecdotal experience. If you&#8217;re triaging the same false positive five times a day, it&#8217;s probably time to adjust your detection logic.</p><p>This is especially true when implementing out-of-the-box or open-source detection rules. They&#8217;re a great foundation, but they&#8217;re designed to flag potentially malicious actions.</p><p>What&#8217;s normal vs. abnormal in your environment is something that only you, as a detection engineer, have the information to define.</p><h3>Make Your Alerts Actionable.</h3><p>If your analysts can&#8217;t quickly understand and act on an alert, you don&#8217;t have a detection - you have noise.</p><p>Poor alerts are generic. They leave you asking: <em>Who was involved? What environment? From what IP? What was the target?</em></p><p>Without answers, you&#8217;re forcing your analysts to waste time digging for context.</p><p>Frankly, this is one of my biggest complaints with certain SIEM vendors (no names, but you know who you are). Their out-of-the-box rules often feel like they were designed by people who&#8217;ve never had to use them.</p><p>So how do you fix it? Start by asking yourself: <em>What would I want to know from a quick glance at this ticket?</em></p><p>In most cases, the answers are simple&#8212;users, actions, and targets. That&#8217;s the core. Build your alert logic and enrichment around them.</p><p>Then, make the alert human readable in a way that makes it easy to understand where and how to take action.</p><p>Titles should be clear and artifact-rich. Always include critical context like IP addresses, accounts, or targets. Add quick links that make triage almost effortless:</p><ul><li><p>A dashboard view pre-filtered for that user</p></li><li><p>A saved query for that action</p></li><li><p>A VirusTotal link with the IP already embedded.</p></li></ul><p>The less manual work, the better. Plus, you&#8217;ll achieve a SOAR-like benefit of easily accessible information by following these steps.</p><p>Personally, I have a motto for detection engineering. I am to make every alert something I can triage from my phone in Slack.</p><p>At a glance, I should know what happened, who&#8217;s involved, and whether it&#8217;s worth leaving the couch to log in.</p><p>That level of clarity isn&#8217;t just about efficiency, it&#8217;s also preventative towards burnout - especially on small teams.</p><p>Having alerts that explain themselves is the difference between sustainable operations and constant fatigue.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Processes, Not Products</h1><p>It&#8217;s easy to get wowed by a flashy product demo or sold on the promise of what a tool <em>should</em> deliver.</p><p>And while there&#8217;s a place for SOAR platforms and AI agents, we can&#8217;t let the bells and whistles distract us from what really matters: the fundamentals.</p><p>In detection engineering, the fundamentals boil down to having a clear framework and guardrails for how you design detections:</p><ul><li><p>Create detections that provide value, not noise.</p></li><li><p>Build with environmental context in mind.</p></li><li><p>Make the output actionable.</p></li></ul><p>Often, the real magic isn&#8217;t in what you add, but in what you choose to leave out. A SOAR platform is a fantastic <em>next</em> step for a mature detection program. But it&#8217;s not the step you need when you&#8217;re still building toward maturity.</p><p>The temptation to chase the shiny object is always there, but deep down, we know the truth: the answer lies in our processes, not our products.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Detections as Code in DataDog: How I Built an MVP for a Small Team]]></title><description><![CDATA[Cybersec Caf&#233; #82 - 09/02/25]]></description><link>https://www.cyberseccafe.com/p/detections-as-code-in-datadog-how</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/detections-as-code-in-datadog-how</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 02 Sep 2025 13:03:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rcnA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rcnA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rcnA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!rcnA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!rcnA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!rcnA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rcnA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rcnA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!rcnA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!rcnA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!rcnA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbefea6-b15d-468b-b79e-63e48af0f9ad_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over the past couple weeks, I&#8217;ve been heads-down building out a Detections as Code (DaC) implementation for my Security Operations team.</p><p>In past roles, I've worked with DaC setups, but they were always there before my arrival - already somewhat mature with the needed infrastructure in place.</p><p>But this time is different. I&#8217;m maturing the SecOps function from scratch. That means I have full creative control over how this solution gets built (within the constraints of the platform, of course).</p><p>It&#8217;s a project that&#8217;s been pushed down the backlog a few times for more urgent fires, but I finally carved out time to sit down in my IDE and get started.</p><p>Our SIEM of choice in this instance is DataDog. While they provide some high-level resources on DaC setup, primarily in the form of a <a href="https://www.datadoghq.com/blog/datadog-detection-as-code/">blog article</a>, they leave much of the implementation open-ended.</p><p>That freedom has given me the space to design something that works not only for us today, but hopefully scales well and sticks around long after I&#8217;ve moved on.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Why Detections as Code?</h1><p>We&#8217;re a small team, which means bandwidth is always stretched. That&#8217;s the main reason DaC has been on the backburner for months.</p><p>At first, our priority was coverage. We needed detections in place, fast - with the understanding that we&#8217;d later port them into an &#8220;as Code&#8221; framework.</p><p>But here&#8217;s the challenge: with just two senior engineers, one mid-level, and two analysts, time is our most precious resource. And DaC has some heavy up front cost: setting up pipelines, porting detections, and ironing out bugs.</p><p>But most of that cost is front-loaded. Once the pipelines and infrastructure are running, maintaining detections becomes far less painful than managing them purely through a UI.</p><p>Yes, there&#8217;s still upkeep. But compared to the manual overhead of UI-driven workflows, the long-term payoff is massive.</p><p>That&#8217;s why, even for a very small team, I&#8217;m convinced the investment is worth it.</p><h1>Benefits</h1><h3>As Code (In General)</h3><p>Once you get used to having your detections in an easily searchable codebase, you realize just how much friction the UI-only approach creates.</p><p>In the UI, you can&#8217;t simply search for detection logic. You can&#8217;t mass update rules from the same data source. You can&#8217;t easily reuse components. Every action feels one-off and manual.</p><p>With a centralized codebase, everything lives in one place - accessible through your IDE. That makes detection creation and maintenance dramatically easier.</p><p>And it&#8217;s not just about queries. With the right architecture, your DaC setup can also integrate things like runbooks, dashboard links, or quick links with embedded variables.</p><p>Bottom line - as your suite grows, a well-documented &#8220;as code&#8221; implementation actually scales better and becomes more maintainable than UI-based workflows.</p><h3>Version Control &amp; Code Reviews</h3><p>Managing detections strictly through the UI leaves you with little traceability. If a faulty rule is pushed, good luck rolling it back - you won&#8217;t have access to change history or context.</p><p>With DaC, quality control shifts into familiar engineering territory: Git, versioning, and peer review.</p><p>Peer reviews before merges help catch logic errors and ensure changes are documented. Compare that to the UI, where it&#8217;s all too easy to click &#8220;enable&#8221; without proper testing.</p><p>And, unless you&#8217;ve got detections on your audit logs set up for your SIEM platform (thankfully we do, even though they don&#8217;t ship with them out-of-the-box) - no one may even know a new detection was added. Or worse: disabled.</p><p>Version control also helps keep the team dynamic. Often, junior and mid-level engineers will hesitate to make changes because they&#8217;re afraid of &#8220;breaking something.&#8221; With reviews, traceability, and rollbacks baked into the workflow, that fear largely disappears.</p><p>You&#8217;d have to try pretty hard to mess things up.</p><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether it&#8217;s <em>Detection Engineering, Incident Response, or Threat Huting</em> - Security Operations is built on data. And as a Security Engineer, you need to make that data work for you. <strong>Selecty is a database-agnostic, sidecar query assistant</strong> built to do just that. Generate queries based on your table schehmas, optimize them to your use case, iterate on them quickly, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h3>CI/CD Linting and Testing</h3><p>A proper CI/CD pipeline for detections is like having a built-in safety net. Every commit automatically tests your syntax and detection logic - removing guesswork and reducing human error.</p><p>Think about it: every time you push code, your detections validate themselves before they ever reach production. If configured properly, you can&#8217;t even deploy unless your tests pass.</p><p>This does two powerful things:</p><ol><li><p>Creates a continuous feedback loop that minimizes the risk of broken detections slipping through.</p></li><li><p>Builds in positive friction Requiring test cases forces engineers to think more critically about their logic before submitting that PR.</p></li></ol><p>In short, automation not only catches mistakes but also raises the overall bar for quality.</p><h3>Detection Standardization</h3><p>Standardization might sound nitpicky at first, but in practice it&#8217;s a game-changer for maintainability. By creating a consistent framework for detection development, you make the process predictable, scalable, and easier for others to contribute.</p><p>Instead of reinventing the wheel every time, engineers follow the same structure. Almost like filling out a form. This lowers the barrier to entry, accelerates onboarding, and ensures your detection library grows in a way that&#8217;s sustainable.</p><p>The result? Anyone on the team can contribute without friction, while the codebase stays clean and manageable long-term.</p><p><em>Side Note: As I&#8217;ve been porting over detections, this standardization also helps me fly through transferring them over. I literally feel like I&#8217;m filling out a form!</em></p><h1>DataDog Implementation</h1><p>When it came time to actually build, I set myself one rule: keep it simple, but don&#8217;t sacrifice scalability or maintainability.</p><p>After digging through the DataDog Terraform docs, I landed on an approach that templatizes my terraform module while leaning on YAML files as the configuration file for detections.</p><p>Instead of writing Terraform for every detection, my team can now fill out a YAML file that looks and feels more like a form than raw code. The pipeline then takes care of the Terraform layer behind the scenes by looping through my detection folders.</p><p>While some may call this overengineering, I like to call it simplification.</p><p>By minimizing Terraform complexity and reusing a YAML template, we can port existing detections faster, create new detections with less friction, and empower everyone on the team (even those less comfortable writing code) to contribute meaningfully.</p><p>YAML gives us the right balance - structure enough to scale, simple enough for broad adoption.</p><div><hr></div><p><strong>&#128193; Scroll to the end to see the files. Or, want the raw files? Subscribers get them free through Cybersec OS!</strong></p><p><strong>Update 10/20/25 - Subscribers now get access to the MVP Repository in Cybersec OS. Kickstart your own DataDog DaC implementation now!</strong></p><div><hr></div><h3>Deploy</h3><p>On the deployment side, I added one extra layer to the typical Terraform flow.</p><p>Beyond the standard <em>terraform plan</em> and<em> terraform apply</em>, our CI/CD pipeline automatically runs tests against each detection using <a href="https://docs.datadoghq.com/api/latest/security-monitoring/#test-a-rule">DataDog&#8217;s API</a>.</p><p>Any folder with updated detection files triggers automated test runs, and all tests must pass before anything can be deployed.</p><p>My rule of thumb is that every detection must include at least three test cases: one true positive, one false positive, and one edge case. This is the number I landed on that forces the detection engineer to ensure their detection works as expected.</p><p>The pipeline enforces the true/false checks, while the edge case is a required part of peer review. This ensures detections aren&#8217;t just technically correct, but also thoughtfully designed.</p><p>Deployment becomes just as much about quality control as it does about pushing detections to production.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Why I View This as Our Ideal MVP Solution</h1><p>Is this the most elaborate, rigorously tested detection-as code pipeline, battle hardened by our (non-existent) red team?</p><p>No.</p><p>What it is, though, is a minimal viable product that brings detections-as-code to a small team without the overhead of a massive pipeline, and still delivers most of the benefits of an as-code approach.</p><p>This solution lays the foundation for scalability and maintainability. It lowers the barrier to contribution, requiring only minimal Terraform knowledge, and keeps the team focused on what matters: shipping and refining detections.</p><p>It&#8217;s simple. It&#8217;s learnable. And it works.</p><p>And to me, seeing my team actually use this lightweight but powerful approach - that&#8217;s the real win.</p><div><hr></div><p><strong>Terraform File:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sZfk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sZfk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 424w, https://substackcdn.com/image/fetch/$s_!sZfk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 848w, https://substackcdn.com/image/fetch/$s_!sZfk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!sZfk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sZfk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png" width="884" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:884,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sZfk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 424w, https://substackcdn.com/image/fetch/$s_!sZfk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 848w, https://substackcdn.com/image/fetch/$s_!sZfk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!sZfk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998cb631-103e-4261-a2f5-7d820583e6af_884x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>YAML File:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Sahu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Sahu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 424w, https://substackcdn.com/image/fetch/$s_!Sahu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 848w, https://substackcdn.com/image/fetch/$s_!Sahu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!Sahu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Sahu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png" width="884" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:884,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Sahu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 424w, https://substackcdn.com/image/fetch/$s_!Sahu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 848w, https://substackcdn.com/image/fetch/$s_!Sahu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!Sahu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0a34a55-e62f-470b-9693-4f9bc85c62df_884x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[You Should Prioritize Writing as a Security Engineer]]></title><description><![CDATA[Cybersec Caf&#233; #81 - 08/26/25]]></description><link>https://www.cyberseccafe.com/p/you-should-prioritize-writing-as</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/you-should-prioritize-writing-as</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 26 Aug 2025 13:00:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yy5o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yy5o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yy5o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!yy5o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!yy5o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!yy5o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yy5o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/414066c8-2957-4740-b273-8cc814026478_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yy5o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!yy5o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!yy5o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!yy5o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F414066c8-2957-4740-b273-8cc814026478_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For the past year and 80 posts here at the Cybersec Caf&#233;, I&#8217;ve preached the same mantra: get technical, sharpen your programming skills, and deepen your technical expertise to set yourself apart as a security engineer.</p><p>But today, I&#8217;m flipping the script. I&#8217;m here to talk about something very different - writing.</p><p>Now, I know what you might be thinking: Writing? As a security engineer? We&#8217;re supposed to <em>write</em> code, give security recommendations, and enforce security best practices - where does writing words fit into that equation?</p><p>Or maybe you&#8217;re running toward the tech industry because you hate writing or thought you were bad at it.</p><p>Don&#8217;t worry, same here - writing was by far my worst subject in school. If you asked my old teachers, they&#8217;d probably agree.</p><p>But I&#8217;m lucky that early in my career I figured out the impact that being a quality writer can make on your work. That&#8217;s one of the primary reasons I started this newsletter, to improve. And here I am, a year and a half into writing a weekly newsletter.</p><p>So how did I get here? And why do I believe writing is one of the most underrated skills for a security engineer?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Why Writing?</h1><p>At first, writing seems almost contradictory to an engineering role. After all, engineers are judged on technical chops - system design, debugging, and complex coding interviews.</p><p>But here&#8217;s the thing - clear and concise writing is criminally underrated in tech, and can be a major differentiator.</p><p>Ryan Peterman put it well in a LinkedIn <a href="https://www.linkedin.com/posts/ryanlpeterman_distinguished-engineers-e9-at-meta-make-activity-7295117210195243008-IhYX/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAACfYOl4BnUf8UpBRcc4D5k7-2_S005bDHQE">post</a>:</p><ul><li><p>&#8220;Distinguished engineers at Meta make upwards of $3M per year. Every diff description, launch post, or directional doc [these engineers] write is crystal clear. I don&#8217;t need to work in their domain to understand what they say.&#8221;</p></li></ul><p>Think about it. Who doesn&#8217;t appreciate a well explained design document? Or a detailed, easy-to-follow bug bounty report? Or even just a thoughtfully written ticket?</p><p>Money aside, writing is just part of modern engineering. Building systems isn&#8217;t just pounding out code and writing tests - it&#8217;s planning, documenting, and communicating ideas before a single line even gets written.</p><p>And from a personal perspective, writing forces you to organize your thoughts. If you can lay them out clearly on the page, you&#8217;ll communicate more clearly when you speak too. That&#8217;s a skill every engineer benefits from.</p><p>I&#8217;m a firm believer that you don&#8217;t even need to be a <em>great</em> writer. Just an above-average one can have a massive impact on your effectiveness as a security engineer.</p><p>And here&#8217;s how.</p><h1>Real-World Writing for Security Engineers</h1><h3>Requirements Documents</h3><p>Ah yes - the trusted requirements doc. I&#8217;m not going to lie - the first time I had to write one back in university for my senior design project, I thought it was a complete waste of time.</p><p>But little did I know, it would save me an incredible amount of time down the road.</p><p>At its core, a requirements doc defines the scope of a project and the features needed for it to be considered a success. In other words: it sets the success criteria.</p><p>If done well, it makes the project crystal clear to all stakeholders and acts as a guardrail against scope creep.</p><p>But let&#8217;s be real - if your company&#8217;s current approach is to throw projects at the wall, iterate quick, and see what sticks, then requirements docs probably aren&#8217;t part of your workflow.</p><p>But if you&#8217;re serious about building something meaningful, then requirements docs become less of a formality and more of an opportunity to align cross-functionally.</p><p>Skip this step, and you&#8217;ll waste far more time later trying to fix misaligned expectations, rather than taking that extra time to spell it out and discuss first.</p><h3>Technical Design Documents</h3><p>Once you&#8217;ve nailed down the <em>what</em> and <em>why</em> in your requirements doc, the next step is the <em>how</em>. That&#8217;s where the technical design document comes in.</p><p>The purpose of a design doc is simple: think through your solution before you build it. Taking the extra time saves you from painful redesigns, costly mistakes, and the dreaded &#8220;rip it all out and start over&#8221; scenario.</p><p>Benefits of design docs really shine through when it comes to peer review. Sharing it gives others a chance to strengthen your work before it&#8217;s set in stone:</p><ul><li><p>Infrastructure teams can validate architecture.</p></li><li><p>Security team members can flag risks.</p></li><li><p>Network engineers can ensure efficient data flows.</p></li><li><p>DevOps can review for any CI/CD implications.</p></li><li><p>Product can confirm it still solves the right problem.</p></li></ul><p>Not every project will need this level of rigor. A small internal tool might not warrant a 10-page design doc. But if you&#8217;re building a complex system, this is where the serious work begins.</p><h3>Vendor Evaluation Documents</h3><p>These days, no matter what kind of product you&#8217;re looking at, there are dozens of competing vendors - each with their own strengths, weaknesses, and trade-offs.</p><p>Business best practice is always to evaluate multiple options before committing to the one that best fits your organization&#8217;s needs. And the best way to keep that process organized is with a vendor evaluation document.</p><p>A vendor evaluation doc lets you clearly outline what each product brings to the table, where it falls short, and how it stacks up against your defined requirements (yep, those requirements again&#8230;.).</p><p>By putting everything on paper, you strip away emotion and shiny marketing pitches, and instead make decisions based on the facts.</p><p>A good evaluation allows you to quantify your options against your requirements - that way you&#8217;re not left with gut feelings, you&#8217;re left with data-backed decisions.</p><p>You may not be writing vendor evaluation later in your career, but early on? Expect to write quite a few.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h3>Pull Requests &amp; Tickets</h3><p>Pull Requests (or Merge Requests) are part of daily life anywhere code is written.</p><p>They&#8217;re how changes make their way into production, and the quality of your PRs says a lot about your professionalism as an engineer.</p><p>At minimum, your PR should include a clear title describing what it does, break down commits in a way that&#8217;s easy to follow (or squash them if needed), and include a description that provides relevant business and technical context.</p><p>PRs are usually tied back to tickets, which act as the main artifact for work efforts by attaching relevant conversations, documents, and supporting materials. If done well, this makes it possible to verify that the code does exactly what it&#8217;s supposed to.</p><p>If you&#8217;ve ever had to review a RP labeled &#8220;Bug Fixed&#8221; with a description of &#8220;Fixed bugs in the process,&#8221; you know how painful bad documentation can be.</p><p>A vague PR isn&#8217;t just annoying for reviewers - it&#8217;s a nightmare later when something breaks and you&#8217;re trying to figure out what changed and why.</p><p>Well-written PRs save time, reduce mistakes, and make rollback scenarios easier. Think of it as documentation for your future self (or whoever inherits your code).</p><h3>Bug Bounty Reports</h3><p>This one&#8217;s a bit of a more niche, but one I&#8217;ve studied quite a bit.</p><p>Last year, I spent 100 days reading and dissecting a different bug bounty report every day (you can dig deep into my Twitter archives if you want to see). After going through that many, one thing became painfully obvious when it came to those achieving high payouts, and those getting minimum bounties.</p><p>Let me explain.</p><p>I previously worked at a company with an in-house bug bounty program. Although I wasn&#8217;t the primary triager, I saw plenty of submissions and even had the opportunity to sit in during some payout discussions. What stood out to me was how much the writing quality influenced the reward:</p><ul><li><p>A technically valid report that was confusing, incomplete, or hard to reproduce? Minimum payout.</p></li><li><p>A report with clear reproduction steps but no stated impact? A bit more.</p></li><li><p>A polished report with step-by-step instructions, a clearly articulated impact, and a working proof of concept? That was top payout every time.</p></li></ul><p>Why? To reward hunters who made the work of fixing bugs easier, and to incentivize them to continue hunting on the program.</p><p>Clarity, reproducibility, and impact were just as valuable as the technical finding itself. I can&#8217;t speak for every bug bounty program out there, but I&#8217;d bet most follow a similar philosophy.</p><p>What I learned is simple: if you want to maximize both payouts and your credibility, learn to write bug reports that are clear, concise, and impossible to misinterpret.</p><h3>Runbooks</h3><p>Runbook is kind of a catch-all term in security, but at its core it&#8217;s simple: a runbook tells you exactly what to do in a specific situation to achieve a specific outcome.</p><p>They come in all flavors - alert triage, routine processes, incident response - but the guiding principle is always the same: speed, accuracy, and reliability.</p><p>When someone grabs your runbook, it&#8217;s usually not during a calm, controlled moment. It&#8217;s during a high-stress situation where mistakes are costly.</p><p>The last thing you want is ambiguity.</p><p>If your instructions are unclear, outdated, or missing steps, the entire point of the runbook is lost. That means writing matters. Every runbook should:</p><ul><li><p>Start with a clear purpose.</p></li><li><p>Spell out each step unambiguously.</p></li><li><p>Account for branching logic (e.g., <em>if this fails, then do that</em>).</p></li></ul><p>Think of runbooks as automation for humans. They should be so well written that anyone on your team, even someone half-asleep at 3am, can follow them to the letter and get the right result.</p><h3>Incident Response Documentation</h3><p>Quality IR documentation is one of those things that you don&#8217;t appreciate until you&#8217;re in the middle of an incident where it makes all the difference.</p><p>For smaller incidents, you can usually scrape by with a loose process and verbal updates on an incident bridge.</p><p>But when <em>that</em> time comes when multiple teams get involved and the situation becomes increasingly difficult to manage - clear, well-structured documentation becomes a lifeline.</p><p>Good documentation speeds up onboarding for new SMEs - Instead of wasting an hour digging through Slack threads or waiting on a call for context, they can immediately understand the scope of the incident, their responsibilities, and the current state.</p><p>That hour saved could be the difference in resolving the incident faster.</p><p>It also streamlines executive communication. Providing a crisp status report is often time consuming: What happened? What&#8217;s been done? What&#8217;s next?</p><p>But when details are already documented in a central, organized way, reporting becomes simple.</p><p>Ultimately, strong IR documentation removes guesswork. It gives everyone clarity on their role, reduces overhead, and frees people to focus on the incident itself - not on catching up or chasing information.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Clarity is Your Competitive Advantage</h1><p>At the core of everything we&#8217;ve covered is one theme: communication.</p><p>Strong writing doesn&#8217;t just help you document your work - it makes your ideas land.</p><p>It helps you collaborate, persuade and lead. When it&#8217;s time to push for a solution, the clarity of your words will often determine whether your ideas gain traction or get lost.</p><p>If you&#8217;ve ever faced unnecessary pushback, endless revisions, or a rocky transition from a legacy tool, remember this: the responsibility for clarity lies with the sender, not the receiver.</p><p>For engineers, writing is more than a soft skill. The better you write, the more influence you have. And the more influence you have, the more impact you make.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[40 Cybersecurity Tips for Everyday Life]]></title><description><![CDATA[Cybersec Caf&#233; #80 - 08/19/25]]></description><link>https://www.cyberseccafe.com/p/40-cybersecurity-tips-for-everyday</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/40-cybersecurity-tips-for-everyday</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 19 Aug 2025 13:03:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qjZz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qjZz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qjZz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!qjZz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!qjZz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!qjZz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qjZz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qjZz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!qjZz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!qjZz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!qjZz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d4212e-7ce3-4c1c-940b-14908abe6bfc_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In today&#8217;s world, threat actors are always circling, looking for any signs of weakness to snatch away valuable data from the bottomless pile of SaaS products that cluttering our phones and computers.</p><p>While these products make our lives easier in countless ways, they also come with a trade-off: you hand over personal data, trusting the vendor to keep it safe.</p><p>And while you might not be the intended target of these attacks, the reality is that with the modern day digital footprint each one of us carries, it doesn&#8217;t take much to be caught in the crossfire.</p><p>What may seem obvious for security professionals is not always obvious to the masses (something I&#8217;ve come to realize recently. And what you may not know is that securing your own precious data is not as difficult as you might expect.</p><p>What feels second nature to security professionals often isn&#8217;t obvious to everyone out there - and I&#8217;ve been reminded of that more than once lately.</p><p>The good news? Securing your data isn&#8217;t nearly as hard as you might think.</p><p>You don&#8217;t need to overhaul your life to protect your digital assets. Small, intentional changes make big differences.</p><p>My philosophy is simple: make yourself a harder target than the person next to you. If an attacker sees you or your accounts as too much work, they&#8217;ll move on to an easier mark.</p><p>If I were building my personal security posture from scratch today, these are the 40 steps I&#8217;d take to do it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Essentials</h1><p>These are those practical habits everyone should do, even if you&#8217;re not tech savvy.</p><ol><li><p><strong>Enable Two-Factor Authentication (Impact: 9/10 | Effort: 4/10)</strong>: 2FA adds a second barrier of authentication to your accounts. Even if your password is stolen, attackers still need the second factor, drastically reducing your risk of compromise.</p></li><li><p><strong>Use a Password Manager (Impact: 9/10 | Effort: 5/10)</strong>: Use your password manager to generate strong, unique passwords for every account and remove the need to memorize them. This prevents one breach from endangering multiple of your accounts.</p></li><li><p><strong>Update Your Devices Regularly (Impact: 8/10 | Effort: 2/10)</strong>: Software updates patch vulnerabilities attackers actively exploit, and delaying updates leaves you exposed to known threats. Just set your devices to update while you sleep!</p></li><li><p><strong>Don&#8217;t Reuse Passwords (Impact: 8/10 | Effort: 4/10)</strong>: Reusing passwords allows one breached account to unlock many others. Unique passwords stop attackers from snowballing their access to your entire account portfolio.</p></li><li><p><strong>Avoid Clicking Unknown Links (Impact: 8/10 | Effort: 3/10)</strong>: While it may sound obvious, suspicious links in emails or texts can lead to phishing sites or malware. Hover before clicking and verify the sender. Or, just navigate directly to the site in your browser.</p></li><li><p><strong>Use Unique Security Questions &amp; Answers (Impact: 7/10 | Effort: 3/10)</strong>: Real answers are often guessable or public. Use fake but memorable answers stored in your password manager for stronger account recovery security.</p></li><li><p><strong>Check Website URLs Before Entering Credentials (Impact: 8/10 | Effort: 2/10)</strong>: Phishing sites mimic legitimate ones. Quickly check the URL to ensure you&#8217;re on the real domain before logging in.</p></li><li><p><strong>Install Antivirus/Endpoint Protection (Impact: 7/10 | Effort: 4/10)</strong>: These software offerings detect and block malware before it can damage your system or steal your information. Some are even free!</p></li><li><p><strong>Log Out on Shared Devices (Impact: 6/10 | Effort: 3/10)</strong>: Prevents others from accessing your accounts when using shared computers, phones, or tablets.</p></li><li><p><strong>Use + Email Aliasing (Impact: 6/10 | Effort: 5/10)</strong>: Adding +sitename to your email before the &#8220;@&#8221; lets you see where spam originates and limits damage if one account is compromised, all while still receiving email at the same email address.</p></li></ol><h1>Securing Your Digital Footprint</h1><p>If you want more control over how your data is spread online, prioritize these actions.</p><ol start="11"><li><p><strong>Google Yourself Regularly</strong> (Impact: 7/10 | Effort: 3/10): Search your name to see what personal details are floating around online. If you find something sensitive, take steps to get it removed before an attacker finds it first.</p></li><li><p><strong>Limit Public Social Media Info</strong> (Impact: 8/10 | Effort: 4/10): Your vacation pics and work updates can double as a goldmine for social engineers. Keep personal details locked down and share selectively. If you&#8217;re really serious, make all of your accounts private.</p></li><li><p><strong>Remove Old Accounts You Don&#8217;t Use</strong> (Impact: 7/10 | Effort: 5/10): Every forgotten account is a potential breach waiting to happen. Shut them down and shrink your digital footprint.</p></li><li><p><strong>Avoid Oversharing in Public Posts</strong> (Impact: 8/10 | Effort: 3/10): Birthdays, addresses, even your favorite coffee shop are all clues a highly motivated hacker could piece together. Don&#8217;t give them the puzzle pieces.</p></li><li><p><strong>Opt Out of Data Broker Sites</strong> (Impact: 9/10 | Effort: 6/10): Sites like Whitepages and Spokeo sell your personal info to anyone who pays. Use opt-out guides or services to make yourself harder to find.</p></li><li><p><strong>Use Disposable Emails for Sign-Ups</strong> (Impact: 7/10 | Effort: 4/10): For one-off sign-ups, use disposable addresses to keep spam and trackers out of your main inbox.</p></li><li><p><strong>Use Different Profile Pictures</strong> (Impact: 3/10 | Effort: 3/10): Reverse image searches can link accounts you thought were separate. Switch up your photos to keep them unconnected.</p></li><li><p><strong>Revoke Permissions from Unused Apps</strong> (Impact: 7/10 | Effort: 4/10): Old apps can still track you or access your data long after you stop using them. Cut them off before they become a liability.</p></li><li><p><strong>Clear Old Cloud Storage Files</strong> (Impact: 6/10 | Effort: 5/10): Sensitive files in cloud storage are easy to forget about&#8212;and easy for attackers to grab if they get in. Clean house regularly.</p></li><li><p><strong>Separate Work and Personal Accounts/Devices</strong> (Impact: 8/10 | Effort: 5/10): One compromised login shouldn&#8217;t take down your whole life. Keep work and personal data in their own lanes.</p><div><hr></div></li></ol><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lhLH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lhLH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!lhLH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!lhLH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!lhLH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lhLH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:46826,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!lhLH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!lhLH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!lhLH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!lhLH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75f0d10c-e444-4c7b-be6c-c9dbb34f4afe_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Navigating personal digital security can feel overwhelming. <strong>SecuriBeat makes it easy by breaking down complex security practices into simple, actionable steps so you can build confidence in your cybersecurtiy decisions.</strong> Use the Security Dashboard to visualize your footprint over 15+ categories, understand your risk level, and track your progress over time. <strong>Take control of your digital footprint today.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securibeat.com/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securibeat.com/"><span>Learn More</span></a></p><div><hr></div><h1>Privacy Habits</h1><p>If you want to stay off the radar and keep your data private, start implementing these behaviors.</p><ol start="21"><li><p><strong>Use a Privacy-Focused Browser</strong> (Impact: 8/10 | Effort: 4/10): Browsers like Brave and Firefox block trackers by default, keeping advertisers from quietly building a file on you.</p></li><li><p><strong>Install Tracker-Blocking Extensions</strong> (Impact: 8/10 | Effort: 3/10): Tools like uBlock Origin and Privacy Badger cut off advertisers and data brokers at the source.</p></li><li><p><strong>Use a VPN on Public Wi-Fi</strong> (Impact: 9/10 | Effort: 4/10): Public hotspots are hacker hunting grounds. A VPN encrypts your traffic so no one can spy on your data.</p></li><li><p><strong>Turn Off Location Tracking When Not Needed</strong> (Impact: 7/10 | Effort: 3/10): Your phone doesn&#8217;t need to log your every move. Disable always-on location tracking for all your apps and opt for &#8220;only while using&#8221; options.</p></li><li><p><strong>Use Encrypted Messaging Apps</strong> (Impact: 9/10 | Effort: 3/10): Signal and WhatsApp use end-to-end encryption to keep your conversations private - even from the platform itself.</p></li><li><p><strong>Disable Ad Personalization</strong> (Impact: 6/10 | Effort: 3/10): Tell Google, Facebook, and friends to stop profiling you for &#8220;better&#8221; ads. You&#8217;ll still see ads, just less that make you feel like these platforms are listening.</p></li><li><p><strong>Avoid Linking Accounts Across Services</strong> (Impact: 8/10 | Effort: 6/10): If that master account gets breached, you&#8217;ll experience a cascade across every account you own. Keep them siloed and link selectively.</p></li><li><p><strong>Use Privacy-Friendly Search Engines</strong> (Impact: 7/10 | Effort: 2/10): DuckDuckGo, Startpage, or Kagi won&#8217;t turn your searches into ad targeting profiles.</p></li><li><p><strong>Use Burner Numbers for Sign-Ups</strong> (Impact: 7/10 | Effort: 4/10): Google Voice and similar services keep your real number out of marketers&#8217; and scammers&#8217; hands.</p></li><li><p><strong>Encrypt Your Hard Drive</strong> (Impact: 9/10 | Effort: 5/10): Disk encryption makes sure your data stays locked away, just in case you lose your laptop.</p></li></ol><h1>The Next Level</h1><p>For those of you who want to go all-in on security best practices, these are for you.</p><ol start="31"><li><p><strong>Enable hardware security keys for logins</strong> (Impact: 10/10 | Effort: 7/10): Physical keys like YubiKey or Titan provide the strongest defense against phishing, ensuring only someone with the key can log in.</p></li><li><p><strong>Segment your home network</strong> (Impact: 8/10 | Effort: 8/10): Place IoT devices (smart bulbs, cameras, speakers) on a separate Wi-Fi network from your computers and phones to limit the blast radius if one is compromised.</p></li><li><p><strong>Run regular security audits on your accounts</strong> (Impact: 9/10 | Effort: 6/10): Review login history, connected devices, and suspicious activity to catch problems early.</p></li><li><p><strong>Review and rotate passwords every 6&#8211;12 months</strong> (Impact: 7/10 | Effort: 7/10): Refreshing credentials reduces exposure from breaches that may not yet be public.</p></li><li><p><strong>Use email forwarding rules for breach monitoring</strong> (Impact: 7/10 | Effort: 5/10): Set up rules to flag suspicious incoming messages, helping you spot breaches and phishing faster.</p></li><li><p><strong>Set up alerts for your name and email on breach databases</strong> (Impact: 8/10 | Effort: 3/10): Use HaveIBeenPwned or similar to get notified when your information shows up in a breach.</p></li><li><p><strong>Sandbox suspicious files</strong> (Impact: 9/10 | Effort: 8/10): Open unknown files in an isolated, secure environment to check for malware without risking your main system.</p></li><li><p><strong>Use virtual machines for risky browsing</strong> (Impact: 9/10 | Effort: 7/10): Contain high-risk activity (like downloading from untrusted sites) in a disposable VM to protect your main OS.</p></li><li><p><strong>Disable macros in Office documents by default</strong> (Impact: 8/10 | Effort: 3/10): Macros are a top malware delivery method. Keeping them off blocks a huge attack vector, although it may cause some friction in your workflow.</p></li><li><p><strong>Create an &#8220;If I&#8217;m hacked&#8221; response plan</strong> (Impact: 10/10 | Effort: 5/10): A personal incident response plan helps you react quickly, secure accounts, and limit damage if the worst happens.</p><div><hr></div></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><p>Personal security is a commitment, but it doesn&#8217;t have to be overwhelming.</p><p>Even tackling just the 20 easiest steps from this list can put you ahead of 90% of people out there.</p><p>Start small, chip away at them one by one, you&#8217;ll feel that background anxiety start to fade and be replaced with the confidence that you&#8217;ve made yourself a much harder target.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Your SOC is not an IT Helpdesk. So Stop Running it like One.]]></title><description><![CDATA[Cybersec Caf&#233; #79 - 08/12/25]]></description><link>https://www.cyberseccafe.com/p/your-soc-is-not-an-it-helpdesk-so</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/your-soc-is-not-an-it-helpdesk-so</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 12 Aug 2025 13:03:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uWKw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uWKw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uWKw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!uWKw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!uWKw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!uWKw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uWKw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uWKw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!uWKw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!uWKw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!uWKw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa563004d-a0f3-4caa-835c-ca9bb91c966c_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Close your eyes for a second and think: <em>How does my SOC actually operate?</em></p><p>Are analysts cherry-picking alerts? Sitting around waiting for tickets to roll in, only to close them with a lazy two-word update like &#8220;False Positive&#8221; or &#8220;Expected Activity&#8221;? Are they more focused on hitting a ticket quota than actually improving your security posture? Desensitized to threats because of fatigue?</p><p>If any of that triggered you in any way, then I hate to break it to you: Your SOC is functioning like an IT Helpdesk.</p><p>And look, no shade to IT. They&#8217;re often the unsung heroes keeping the org running. But your Security Operations Center has a different mission: detect and respond to threats, not to just clear a queue.</p><p>Modern threats demand a modern SOC. One that runs on curiosity, context, and critical thinking. Not one that measures success in ticket count per analyst.</p><p>To get there, you need to build a culture of proactivity. That means giving analysts space to grow and share their environmental knowledge, to threat hunt, to explore the unusual, and to dig deeper into high-fidelity signals.</p><p>But shifting from a culture of ticket-closing and towards one of threat hunting takes more than a pump-up speech and a good night&#8217;s sleep.</p><p>It requires leaving the helpdesk mindset behind and building systems that enable your team to become the proactive, threat-focused machine you&#8217;ve been dreaming of.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Remove Friction</h1><p>In order for your team to shift towards a proactive methodology, the first thing you need to do is remove friction throughout your operation.</p><p>A frictionless SOC doesn&#8217;t mean alerts top flowing or incidents never happen. It means your analysts don&#8217;t feel stuck, confused, or overwhelmed during the process of completing their tasks.</p><p>It&#8217;s about clearing the path so your team can focus on what matters, rather than focus on moving through rugged processes.</p><p>Here&#8217;s how you start:</p><h3>Build a DLC that Encourages Value, not Volume</h3><p>Your Detection Lifecycle (DLC) is one of the most powerful tools in your fight against alert fatigue.</p><p>And let&#8217;s be honest - alert fatigue is the number one killer of proactivity.</p><p>If your team is drowning in low-quality alerts, they won&#8217;t have the time or energy to dig deeper into emerging threats.</p><p>That&#8217;s why your DLC should be designed to prioritize value over volume - and that&#8217;s a cultural shift that needs buy in at every level:</p><ul><li><p>Analysts should feel empowered to flag noisy or useless alerts.</p></li><li><p>Engineers should be encouraged to propose detection creation and tuning ideas.</p></li><li><p>Everyone should contribute environmental knowledge to improve coverage.</p></li></ul><p>Make this a regular cadence - biweekly, monthly, whatever works. But make detection quality a recurring conversation.</p><p>When you build space for these conversations, you invest in long-term efficiency, trust, and better threat coverage.</p><h3>Engineer Your Alerts to be Actionable</h3><p>Too many SOCs suffer not from a lack of alerts - but an influx of <em>bad alerts</em>.</p><p>There&#8217;s nothing more deflating than opening a ticket that says: &#8220;A user performed this sensitive action.&#8221;</p><p>Okay, cool. But&#8230; <em>What user? In what system? What&#8217;s the potential impact? Why should I care?</em></p><p>I have a theory when it comes to designing alerts: Every click matters.</p><p>If analysts have to dig through raw logs, dashboards, and runbooks just to figure out what happened and what to do - that&#8217;s the definition of friction. Time wasted. And that&#8217;s entirely avoidable.</p><p>The solution? Take the extra time to design alerts that actually make sense from a glance. Include:</p><ul><li><p>The impacted user/system</p></li><li><p>Contextual enrichment</p></li><li><p>Potential impact</p></li><li><p>Suggested next steps with applicable links</p></li></ul><p>And if you&#8217;re using a SIEM that ships with garbage default alerts (there&#8217;s a few of you out there I&#8217;m looking at), don&#8217;t be afraid to repurpose them into custom ones yourself.</p><p>Thoughtful alert design is the first kindness you can give your analysts.</p><h3>Make Escalation Paths Accessible</h3><p>Escalation should never be a guessing game.</p><p>When something serious pops up, the last thing your team needs is to ask: <em>Who&#8217;s on call? Is this IR-worthy? Who do I tag in which Slack channel? Do I need to page someone?</em></p><p>Make sure escalation paths are clear, documented, and easily accessible:</p><ul><li><p>Maintain and share on-call schedules</p></li><li><p>Define IR triggers and response thresholds</p></li><li><p>Clarify responsibilities - who owns what, and when.</p></li></ul><p>Not only does this reduce response time and stress, it helps ensure your high-severity incidents get the right eyes on them fast, without burdening the wrong people.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether it&#8217;s <em>Detection Engineering, Incident Response, or Threat Huting</em> - Security Operations is built on data. And as a Security Engineer, you need to make that data work for you. <strong>Selecty is a database-agnostic, sidecar query assistant</strong> built to do just that. Generate queries based on your table schehmas, optimize them to your use case, iterate on them quickly, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h1>Automations are the Unsung Hero of the SOC</h1><p>Every SOC knows that SOAR is part of the equation when it comes to designing a modern security function.</p><p>What&#8217;s unfortunate is that a majority of teams never actually make it there. But the impact of having a well thought out solution is difficult to overstate.</p><p>Have you ever triaged an alert from your phone just by looking at a Slack channel? I have. And let me tell you, it&#8217;s as glorious as it sounds.</p><p>Spotting automation opportunities isn&#8217;t always intuitive. But one of the highest-impact lowest-effort places to start is with automating the initial triage process - where analysts spend the bulk of their time just trying to understand the context around an alert.</p><p>When you&#8217;re deep in the triage trenches, you&#8217;re often pulling the same queries, checking the same dashboards, and referencing the same OSINT tools over and over.</p><p>Start broad. Begin at the source level, then move to the service-level, and finally down to the detection level.</p><p>It&#8217;s all about iteration over time, not getting it perfect out the gate. Over time, you&#8217;ll layer in these automations until the entire initial triage process runs without human input, and you&#8217;ll be able to triage a ticket from a quick glance.</p><p>This is one of the most effective ways to reduce alert fatigue. It frees analysts from the noise and lets them focus on alerts that are actually suspicious with real context, not just a vague title and arbitrary severity score.</p><h1>Constantly Expand your Knowledgebase</h1><p>Documentation is the king of &#8220;we know we should, but we don&#8217;t.&#8221;</p><p>And yet, it&#8217;s the single biggest contributor to consistency across your SOC.</p><p>Everyone on the team shares responsibility for maintaining internal knowledge. That means keeping resources up to date and ensuring critical information is just a quick search away when needed most.</p><p>At minimum, you should have:</p><ul><li><p>An org chart</p></li><li><p>An architecture overview of your environment</p></li><li><p>A master list of applications and their owners</p></li><li><p>An on-call schedule</p></li><li><p>Escalation procedures and your incident response guide</p></li></ul><p>And at the heart of it all: Runbooks.</p><p>Runbooks are the main character in operational consistency. They need to be:</p><ul><li><p>Actionable, with correct queries and clear next steps.</p></li><li><p>Concise, with no fluff and no ambiguity.</p></li><li><p>Contextual, with links to relevant tools and dashboards.</p></li><li><p>Flexible, with branching logic to account for different outcomes.</p></li><li><p>Escalation-ready, with explicit instructions when help is needed.</p></li></ul><p>Don&#8217;t expect perfection from the start., Think of your runbooks as living documents that are iterated on with every shift, incident, or handoff.</p><p>Because when people leave, and they will, your knowledge base is what keeps the SOC humming.</p><h1>Make Threat Hunting a Recurring Meeting</h1><p>We&#8217;ve all sat through that one meeting that everyone knows is a waste of time, and yet we still prioritize attending them.</p><p>So why don&#8217;t we apply that same consistency to threat hunting?</p><p>Threat hunting is the definition of proactively searching for threats, and the clearest way to shift your team from reactive defense toward proactive detection.</p><p>Whether done as a full team, in small groups, or solo deep dives, setting a regular cadence for threat hunting starts by acknowledging a simple truth: Your detection stack isn&#8217;t perfect. No stack is.</p><p>Threats slip through, and that&#8217;s just part of the game.</p><p>And while threat hunting often gets treated as a &#8220;nice to have,&#8221; if you&#8217;re serious about improving your security posture, it will quickly become clear that it&#8217;s a necessity.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Analytics Run the SOC</h1><p>If you&#8217;ve been hanging around the Cybersec Caf&#233; for a while, you&#8217;ve heard me say this before - probably more times than you can count. (Anyone up for counting how many times I&#8217;ve actually alluded to this?)</p><p>But I&#8217;ll say it again: Analytics are a must.</p><p>Sure, anecdotal experiences have their place. It can help shape your detection strategy in the early days. But as your SOC matures, it&#8217;s the data that will show you what&#8217;s working and what isn&#8217;t.</p><p>That's why it&#8217;s critical to methodically build metrics into every step of your operations. If you&#8217;re not measuring it, you&#8217;re not managing it.</p><p>Here are a few low-effort, high-impact ways to start embedding metrics <em>today</em>:</p><ul><li><p><strong>Detections</strong>: Track alert classification (True Positive, Confirmed Activity, False Positive, etc.) when closing tickets. These metrics reveal detection quality and help highlight candidates for tuning or automation.</p></li><li><p><strong>Alert Triage: </strong>Measure Mean Time to Triage (MTTT) and Mean Time to Remediation (MTTR). This will tell you which alerts are burning the most hours on your team and what should be first in line for automation.</p></li><li><p><strong>Incident Response: </strong>This is a gold mine for tracking improvements. A great starting point is mapping MITRE ATT&amp;CK techniques to affected platforms during incidents. It&#8217;s a quick win that reveals blind spots in your coverage.</p></li><li><p><strong>Post Mortem Improvement Items: </strong>Track your team&#8217;s ability to follow up on action items. What&#8217;s complete? What&#8217;s in progress? What&#8217;s been sitting on the backlog for too long?</p></li><li><p><strong>Day to Day: </strong>How much of the team is completing assigned project work each sprint? If deliverables keep slipping, is alert fatigue the culprit?</p></li></ul><p>Metrics don&#8217;t necessarily paint the entire picture. But they&#8217;re a reliable way to track progress and spot bottlenecks before they become systematic issues.</p><p>And remember, the goal isn&#8217;t to micromanage. The goal is to run an efficient, proactive, high-performing SOC. Metrics just help you figure out where to look.</p><h1>Remember: Proactive is the Goal</h1><p>Your SOC doesn&#8217;t rise to the level of the talent you have. Rather, it falls to the level of the systems that you build around it.</p><p>If you structure your team like a Security Helpdesk, that&#8217;s exactly what it will become.</p><p>But if you invest in strategy, build scalable systems, foster a culture of continuous improvement, and fiercely protect your team&#8217;s time - you&#8217;ll unlock the full potential of your analysts and engineers.</p><p>Give your team the space and structure to hunt threats and embed security deep into your organization - not reactively, but intentionally.</p><p>It&#8217;s no easy task.</p><p>As an engineer, your job isn&#8217;t just to execute. It&#8217;s also to pause, reflect, and architect the systems that make long-term success possible. Anyone can build things, but few build with intent.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[I Wish I Knew This When I Started in Cybersecurity]]></title><description><![CDATA[Cybersec Caf&#233; #78 - 08/05/25]]></description><link>https://www.cyberseccafe.com/p/i-wish-i-knew-this-when-i-started</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/i-wish-i-knew-this-when-i-started</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 05 Aug 2025 13:03:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o7UU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o7UU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o7UU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!o7UU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!o7UU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!o7UU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o7UU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o7UU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!o7UU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!o7UU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!o7UU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca75567f-25cc-4412-8d26-9e1146c26648_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether you&#8217;re new to the industry or pivoting into cybersecurity, I&#8217;m here to tell you that it&#8217;s easier than you think to stand out in this hyper-competitive field.</p><p>But, I&#8217;m blown away by how many professionals I&#8217;ve met who never do it, and also those who have no aspirations to do it.</p><p>And no, I&#8217;m not going to tell you to chase another certification.</p><p>Sure, certs can help if you need a foot in the door. But if you&#8217;ve been following this newsletter for a while, you&#8217;ll know I&#8217;m a big fan of building tangible skills, not just collecting PDFs.</p><p>Because the people who make a real impact in cybersecurity? They&#8217;re the ones who build, break, and solve things. Not the ones who spend every other month cramming for an exam.</p><p>Here&#8217;s the secret: get technical from day one.</p><p>That&#8217;s it.</p><p>Now, I get it - you&#8217;re probably thinking, &#8220;Okay Ryan - Sure, getting technical sounds great in theory, but what does that actually mean in practice?&#8221;</p><p>In this article, I&#8217;ll give you the foundations to get started. And the best part? Everything you absolutely need to learn is free.</p><p>But, the rest is up to you.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>The Foundation</h1><p>This is where it all begins. If you&#8217;re serious about building technical skills in cybersecurity, you need to start with the core concepts.</p><p>They may not be glamorous or exciting, but they&#8217;re critical. These fundamentals will form the mental scaffolding for future concepts, tests, and solutions you&#8217;ll encounter throughout your career.</p><p>Everything you learn will build upon these foundations in some way, so take the time to truly understand them. I&#8217;ll give you exactly what you need here to get started, but I challenge you to be curious and dive deeper into them.</p><h3>Infrastructure Basics</h3><p><strong>Firewalls</strong></p><p>Firewalls are security devices or software that monitor and filter network traffic based on a defined set of rules - either incoming (ingress) or outgoing (egress) traffic. Think of them as digital security guards standing at the perimeter of your device or network.</p><p>There are two primary types:</p><ul><li><p><em>Host Based</em>: Installed on individual machines to filter traffic specific to that device. (Ex. Windows Defender Firewall)</p></li><li><p><em>Network Based: Deployed at the edge of a network to control traffic between the internal network and internet. (Ex. Palo Alto, Cisco ASA)</em></p></li></ul><p>Misconfigured firewalls are one of the easiest ways attackers can sneak in. As a security engineer, you&#8217;ll frequently need to review logs or help create firewall rules - especially during security incidents.</p><p><strong>Network Basics</strong></p><p>To understand how systems communicate, you need to understand the OSI model. It breaks networking into 7 logical layers:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZIh9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZIh9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!ZIh9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!ZIh9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!ZIh9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZIh9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZIh9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!ZIh9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!ZIh9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!ZIh9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbbb88ba-f784-43dd-9176-514bb327d92f_1456x1048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It consists of 7 layers:</p><ol><li><p><em>Physical: Hardware like cables and switches.</em></p></li><li><p><em>Data Link: Manages MAC addresses and switching on local networks.</em></p></li><li><p><em>Network: Routes data across networks using IP addresses, subnets, and routers.</em></p></li><li><p><em>Transport: Ensures reliable data delivery.</em></p></li><li><p><em>Session: Manages communication sessions between applications.</em></p></li><li><p><em>Presentation: Handles data formatting, encryption, and compression.</em></p></li><li><p><em>Application: The user-facing layer (e.g. web browsers, email clients).</em></p></li></ol><p>Each layer relies on specific protocols for communication. Here are some common ones you&#8217;ll run into:</p><ul><li><p><em>TCP</em> (Layer 4): A reliable, connection-oriented protocol used fin most web traffic and email</p></li><li><p><em>UDP</em> (Layer 4): A faster, connectionless protocol used for streaming, DNS, and VoIP.</p></li><li><p><em>ICMP (Layer 3): Used for diagnostics and often abused by attackers during reconnaissance.</em></p></li><li><p><em>SFTP (Layer 7): Secure file transfer using SSH, differing from the insecure FTP protocol.</em></p></li></ul><p>Each layer also has ports associated with various services. They&#8217;re often tied to Layer 4 protocols:</p><ul><li><p><em>22 - SSH</em>: Secure shell access to remote machines.</p></li><li><p><em>53 - DNS</em>: Domain name resolution.</p></li><li><p><em>80 - HTTP</em>: Unencrypted web traffic.</p></li><li><p><em>443 - HTTPS</em>: Encrypted web traffic.</p></li></ul><p><strong>Web Protocols</strong></p><p>Whether it&#8217;s tooling or applications, much of what we deal with as security engineers involves the web in one way or another.</p><p>That&#8217;s why it&#8217;s essential to understand how the web works at a foundational level</p><p>As I mentioned earlier, ports 80 and 443 are delegated by default to HTTP and HTTPS. The differences between the two are:</p><ul><li><p><em>HTTP</em>: Data is sent in plaintext and is vulnerable to sniffing.</p></li><li><p><em>HTTPS</em>: Data is encrypted via TLS, protecting it in transit.</p></li></ul><p>Over these protocols, web applications use core HTTP methods to communicate:</p><ul><li><p><em>GET</em>: Retrieves data.</p></li><li><p><em>POST</em>: Submits data.</p></li><li><p><em>PUT</em>: Updates or replaces data.</p></li><li><p><em>DELETE</em>: Removes data.</p></li></ul><p>There are also three fundamental components to understand how web applications work and how all aid the layered security approach:</p><ul><li><p><em>Cookies</em>: Store session data on the client side and can be hijacked if not properly secured.</p></li><li><p><em>Headers</em>: Metadata passed with requests and responses.</p></li><li><p><em>Sessions</em>: Track users after login and are crucial to maintain state and identity.</p></li></ul><p>Getting a handle on these web basics will help you contribute confidently in web security conversations.</p><p><strong>DNS</strong></p><p>DNS is a foundational topic to how the internet works. It&#8217;s essentially the internet&#8217;s phone book.</p><p>It translates human-readable domains into machine friendly IP addresses.</p><p>At a high level, DNS resolution involves a recursive lookup process, typically flowing form:</p><ol><li><p>Local DNS Resolver</p></li><li><p>Root Name Server</p></li><li><p>Top-Level Domain (TLD) Name Server</p></li><li><p>Authoritative Name Server</p></li></ol><p>Each step helps you route to the correct IP address behind a domain.</p><p>I highly recommend watching this explanation video from PowerCert on YouTube for all the details: </p><div id="youtube2-mpQZVYPuDGU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;mpQZVYPuDGU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/mpQZVYPuDGU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3>Cybersecurity Basics</h3><p>Now that you&#8217;ve covered the foundational knowledge of how networks and the web work (from a mile-high view), it&#8217;s time to jump into some cybersecurity basics - after all, that is the industry you&#8217;re looking to get into.</p><p><strong>Authentication vs Authorization</strong></p><p>At its core, cybersecurity is about ensuring secure access to data. That starts with secure applications.</p><p>Applications rely on two key concepts:</p><ul><li><p><em>Authentication</em>: Verifies who you are. (Ex. username/password, MFA code, fingerprint scan)</p></li><li><p><em>Authorization</em>: Determines what you&#8217;re allowed to do after you&#8217;ve been authenticated.</p></li></ul><p>These two go hand-in-hand: authentication gets you in the door, and authorization determines what rooms you can access once you&#8217;re inside.</p><p><strong>Encryption</strong></p><p>Encryption is one of the most fundamental cybersecurity concepts - and for good reason.</p><p>It&#8217;s all about protecting data from unauthorized access by converting it to unreadable formats.</p><p>There are two main types:</p><ul><li><p><em>Symmetric</em>: Uses the same key to encrypt and decrypt data. It&#8217;s fast, efficient, and great for large volumes of data. (Ex. AES)</p></li><li><p><em>Asymmetric</em>: Uses a public key to encrypt and a private key to decrypt. It solves the key exchange problem and enables use cases like secure web browsing, email encryption, and digital signatures. (Ex. RSA)</p></li></ul><p>A real world example: When you visit a website over HTTPS, asymmetric encryption helps initiate the secure connection. After the handshake, symmetric encryption takes over for faster performance.</p><p><strong>Hashing</strong></p><p>Hashing is the process of turning data into a fixed-length string using an algorithm. Unlike encryption, it&#8217;s one-way - meaning you can hash data, but you can&#8217;t &#8220;unhash&#8221; it.<br><br>But here&#8217;s the key: the same input will always produce the same output when using the same hashing algorithm.</p><p>It&#8217;s important to note that hashing is not encryption. It&#8217;s not meant for secrecy, it&#8217;s meant for integrity. And it&#8217;s not secure by default. Hashes can be brute-forced or cracked using rainbow tables if they&#8217;re not properly salted.</p><p>Some common use cases for hashing algorithms, like SHA256 and MD5, are:</p><ul><li><p><em>Password Storage</em>: Hash and salt password before saving them to a database.</p></li><li><p><em>File Integrity</em>: Verify a file hasn&#8217;t been tampered with.</p></li><li><p><em>Digital Signatures</em>: Ensure authenticity and data integrity.</p></li></ul><p><strong>Popular Vulnerabilities</strong></p><p>Or as I like to call them: the ticket sellers of cybersecurity.</p><p>Let&#8217;s be real - most of us got interested in this field because of the hacks, the breaches, and the drama we saw in news articles. That&#8217;s why you should know about the most common (and some of the coolest) vulnerabilities:</p><ul><li><p><em>Cross-Site Scripting (XSS)</em>: Allows attackers to inject malicious scripts into web pages. It&#8217;s often used to steal cookies or hijack sessions, but can be prevented with proper input sanitization and proper output encoding.</p></li><li><p><em>SQL Injection (SQLi): Attackers can manipulate SQL queries via user input to access or modify data they shouldn&#8217;t. It&#8217;s common in poorly coded login forms or search boxes and can easily be mitigated by using parameterized queries.</em></p></li><li><p><em>Buffer Overflow: Happens when more data is written to a buffer than it can handle and can lead to crashing or code execution. It&#8217;s typically found in lower-level languages like C and C++.</em></p></li></ul><h3>Command Line</h3><p>You can&#8217;t be effective in security without getting comfortable in the terminal.</p><p>Whether you&#8217;re on Linux, macOS, or Windows, the core concepts stay the same - you&#8217;ll just need to learn the different syntaxes.</p><p>Mastering the command line will help you navigate systems, investigate EDR alerts, use command-line tooling - all while looking like a pro hacker in the coffee shop.</p><p>Here are a few foundational basic unix based commands to know:</p><p><strong>Navigating Files</strong></p><ul><li><p>cd - Used to move between folders</p><ul><li><p>Ex. cd /var/log</p></li></ul></li><li><p>ls - View files and directories in the current folder</p><ul><li><p>Ex. ls</p></li></ul></li><li><p>cat - Concatenate and view file content in the terminal</p><ul><li><p>Ex. cat config.txt</p></li></ul></li><li><p>find - Search for files</p><ul><li><p>Ex. find / -name &#8220;*.log&#8221;</p></li></ul></li></ul><p><strong>Permissions</strong></p><ul><li><p>chmod - Change file permissions to control who can read, write, or execute files</p><ul><li><p>Ex. chmod 755 script.sh</p></li></ul></li><li><p>chown - Change the owner or group of a file</p><ul><li><p>Ex. chown root:admin secure.txt</p></li></ul></li><li><p>unmask - Sets default permissions when new files/folders are created</p><ul><li><p>Ex. unmask 022</p></li></ul></li><li><p>sudo - Execute a command as superuser</p><ul><li><p>Ex. sudo npm install package</p></li></ul></li></ul><p><strong>Network Troubleshooting</strong></p><ul><li><p>ping - Tests is a host is reachable and how fast</p><ul><li><p>Ex. ping cyberseccafe.com</p></li></ul></li><li><p>traceroute - Track the path to a host</p><ul><li><p>Ex. traceroute cyberseccafe.com</p></li></ul></li><li><p>curl - Send requests to web servers</p><ul><li><p>Ex. curl -I https://www.cyberseccafe.com</p></li></ul></li><li><p>nmap - Scan hosts and networks for open ports and services</p><ul><li><p>Ex. nmap -sV 192.168.1.1</p></li></ul></li></ul><p>If want hands-on practice, a brilliant resource for learning command line fundamentals is OverTheWire&#8217;s Bandit challenge: <a href="https://overthewire.org/wargames/bandit/">https://overthewire.org/wargames/bandit/</a></p><h3>SQL</h3><p>SQL isn&#8217;t just nice to know anymore - it&#8217;s a must-have.</p><p>In a field driven by logs, alerts, and data streams, your ability to extract insights with a simple query can make or break an investigation.</p><p>Even if your tooling doesn&#8217;t use SQL directly, most security platforms use SQL-inspired languages (like KQL, Lucene, or SPL).</p><p>Start with these core SQL concepts and dig down from there:</p><ul><li><p>SELECT - Choose the columns you want to view</p><ul><li><p>Ex. SELECT username, login_time</p></li></ul></li><li><p>FROM - Specify the table where the data lives</p><ul><li><p>Ex. FROM login_events</p></li></ul></li><li><p>WHERE - Filter rows based on conditions using operators like:</p><ul><li><p>= (Exact Match)</p><ul><li><p>WHERE status = &#8216;failed&#8217;</p></li></ul></li><li><p>LIKE (Pattern Matching)</p><ul><li><p>WHERE email LIKE &#8216;%@<a href="http://gmail.com">gmail.com</a>&#8217;</p></li></ul></li><li><p>IN (Multiple values)</p><ul><li><p>WHERE country IN (&#8216;US&#8217;, &#8216;UK&#8217;, &#8216;CA&#8217;)</p></li></ul></li></ul></li><li><p>LIMIT - Restrict the number of rows returned.</p><ul><li><p>Ex. LIMIT 50</p></li></ul></li><li><p>ORDER BY - Sort the results</p><ul><li><p>Ex. ORDER BY timestamp DESC (most recent events first)</p></li></ul></li><li><p>GROUP BY - Aggregate similar values</p><ul><li><p>Ex. GROUP BY ip_address</p></li></ul></li><li><p>COUNT() - Count rows returned. Often used with GROUP BY</p><ul><li><p>SELECT ip_address, COUNT(*) FROM logins GROUP BY ip_address</p></li></ul></li></ul><p>You can use a resource like <a href="https://www.sql-practice.com/">SQL Practice</a> and <a href="https://selecty.ai/">SELECTY</a> to write, test, and understand queries in real time.</p><p>If you want to go deeper, I&#8217;d suggest reading my article <a href="https://www.cyberseccafe.com/p/why-knowing-how-to-query-is-an-essential">Why Knowing How to Query is an Essential Cybersecurity Skill</a>.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>Programming with Python</h1><p>With so many languages out there, choosing where to start can often feel overwhelming.</p><p>Truthfully, you can pick almost any major programming language and be fine. But if you&#8217;re heading into cybersecurity, I strongly recommend starting with Python. Here&#8217;s why:</p><ul><li><p>It&#8217;s beginner friendly and reads like plain English.</p></li><li><p>It makes automation easy - perfect for eliminating repetitive tasks.</p></li><li><p>It helps you focus on problem-solving, not memorizing confusing syntax.</p></li><li><p>It&#8217;s widely used across the security landscape - from detection engineering, to incident response, SOAR, and open-source tooling.</p></li></ul><p>The best part is you don&#8217;t even need to master complex topics. If you get the basics from this article, you&#8217;re off to a strong start.</p><p><strong>Basic Data Types</strong></p><ul><li><p>Strings (str) - text</p></li><li><p>Integers (int) - whole numbers</p></li><li><p>Floats (float) - decimal numbers</p></li><li><p>Booleans (bool) - True or False</p></li><li><p>NoneType (None) - Represents the absence of a value</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zd7H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zd7H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 424w, https://substackcdn.com/image/fetch/$s_!Zd7H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 848w, https://substackcdn.com/image/fetch/$s_!Zd7H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 1272w, https://substackcdn.com/image/fetch/$s_!Zd7H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zd7H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png" width="586" height="708" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:708,&quot;width&quot;:586,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zd7H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 424w, https://substackcdn.com/image/fetch/$s_!Zd7H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 848w, https://substackcdn.com/image/fetch/$s_!Zd7H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 1272w, https://substackcdn.com/image/fetch/$s_!Zd7H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a9dc572-e71d-41d0-9c6d-a050501aa604_586x708.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Collections</strong></p><ul><li><p>Array (list) - ordered, changeable (mutable) sequence</p></li><li><p>Set - unordered collection of unique values</p></li><li><p>Dictionary (dict) - key-value pairs</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BJQu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BJQu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 424w, https://substackcdn.com/image/fetch/$s_!BJQu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 848w, https://substackcdn.com/image/fetch/$s_!BJQu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 1272w, https://substackcdn.com/image/fetch/$s_!BJQu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BJQu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png" width="940" height="484" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:484,&quot;width&quot;:940,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BJQu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 424w, https://substackcdn.com/image/fetch/$s_!BJQu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 848w, https://substackcdn.com/image/fetch/$s_!BJQu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 1272w, https://substackcdn.com/image/fetch/$s_!BJQu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737df86f-6e65-4ebc-9e95-32f5f521a29f_940x484.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Basic Scripting</strong><br>These control structures form the foundation of logic for any script.</p><ul><li><p>if Statements - for decision making</p></li><li><p>for Loops - for iterate over data</p></li><li><p>Functions - for packaging and reusing logic</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-tdG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-tdG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 424w, https://substackcdn.com/image/fetch/$s_!-tdG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 848w, https://substackcdn.com/image/fetch/$s_!-tdG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 1272w, https://substackcdn.com/image/fetch/$s_!-tdG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-tdG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png" width="1008" height="894" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:894,&quot;width&quot;:1008,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-tdG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 424w, https://substackcdn.com/image/fetch/$s_!-tdG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 848w, https://substackcdn.com/image/fetch/$s_!-tdG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 1272w, https://substackcdn.com/image/fetch/$s_!-tdG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2c6892-841e-49e3-a4e8-41b0d180fff8_1008x894.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>JSON</strong></p><p>You&#8217;ll frequently encounter JSON data when working with APIs and logs. JSON (Javascript Object Notation) looks almost exactly like a Python dict, and Python has built-in tools to work with it seamlessly.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g9Dz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g9Dz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 424w, https://substackcdn.com/image/fetch/$s_!g9Dz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 848w, https://substackcdn.com/image/fetch/$s_!g9Dz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 1272w, https://substackcdn.com/image/fetch/$s_!g9Dz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g9Dz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png" width="1176" height="558" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:1176,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g9Dz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 424w, https://substackcdn.com/image/fetch/$s_!g9Dz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 848w, https://substackcdn.com/image/fetch/$s_!g9Dz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 1272w, https://substackcdn.com/image/fetch/$s_!g9Dz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72a9e494-d993-49cc-a7e4-4d7e992a975a_1176x558.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Advanced Concepts</strong></p><p>Security professionals frequently write scripts that talk to other tools via APIs.</p><p>Python has a library called requests that makes this simple:</p><ul><li><p>requests.get()</p></li><li><p>requests.post()</p></li><li><p>requests.put()</p></li><li><p>requests.delete()</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NN7S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NN7S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 424w, https://substackcdn.com/image/fetch/$s_!NN7S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 848w, https://substackcdn.com/image/fetch/$s_!NN7S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 1272w, https://substackcdn.com/image/fetch/$s_!NN7S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NN7S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png" width="1210" height="670" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:1210,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NN7S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 424w, https://substackcdn.com/image/fetch/$s_!NN7S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 848w, https://substackcdn.com/image/fetch/$s_!NN7S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 1272w, https://substackcdn.com/image/fetch/$s_!NN7S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292ae42f-6fb8-4b62-aaa4-a4f73ae35aba_1210x670.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s common to work with CSV files. Whether you&#8217;re parsing logs or generating reports, Python&#8217;s csv module has csv.reader and csv.writer methods to perform these operations with ease.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4Uyh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4Uyh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 424w, https://substackcdn.com/image/fetch/$s_!4Uyh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 848w, https://substackcdn.com/image/fetch/$s_!4Uyh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 1272w, https://substackcdn.com/image/fetch/$s_!4Uyh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4Uyh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png" width="1176" height="782" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:782,&quot;width&quot;:1176,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4Uyh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 424w, https://substackcdn.com/image/fetch/$s_!4Uyh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 848w, https://substackcdn.com/image/fetch/$s_!4Uyh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 1272w, https://substackcdn.com/image/fetch/$s_!4Uyh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59c9881d-4754-42f6-9e81-3e5ecd96eeac_1176x782.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Next Step</h3><p>The best way to learn is by building. Try this project to apply everything above:</p><p>Build a simple Flask API in Python. Ask ChatGPT to help you brainstorm what it should do (but don&#8217;t let it code the whole thing for you). For example: upload a CSV of your weekly expenses and return them sorted by price range.</p><p>Then&#8230;</p><p>Create a CLI tool to talk to your Flask API. An example use case could:</p><ul><li><p>Take a CSV filename from your local system</p></li><li><p>Send the data to your Flask endpoint</p></li><li><p>Write the returned response to a JSON file.</p></li></ul><p>You have the tools. You have the blueprint - what are you waiting for?</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>Bonus Exercise: Web App Security</h1><p>In today&#8217;s world of SaaS platforms and microservices, web applications are everywhere - so understanding how they work (and, just as important, how they break) is key.</p><p>One of the best beginner-friendly ways to learn is by using <a href="https://owasp.org/www-project-juice-shop/">Juice Shop</a> - a deliberately vulnerable web app that teaches security through hands-on hacking. You&#8217;ll explore these real-world concepts in a legal environment and gain insight into how websites actually work.</p><p>You&#8217;ll also develop essential debugging skills - like using browser developer tools to inspect requests and responses.</p><p>Pro Tip: Pair Juice Shop with Burp Suite - a powerful tool used by AppSec pros to intercept and manipulate HTTP requests. Their free <a href="https://portswigger.net/">Web Academy</a> is one of my favorite online resources (unsponsored) and is a fantastic way to go even deeper and build confidence in your skills.</p><h1>Why Being Technical Matters</h1><p>Cybersecurity is more competitive than ever, and standing out is getting even harder. The industry is shifting, and technical skills are becoming a must.</p><p>The truth is, most people don&#8217;t put in the extra time to sharpen their skills. That&#8217;s your opportunity. It could be the difference between landing the job or missing it, getting promoted or staying stuck.</p><p>As professionals, we owe it to ourselves to keep growing. If you&#8217;ve been in the field and know your technical skills need work - this is your sign to start.</p><p>If you&#8217;re just getting started - this is your chance to build a strong foundation early.</p><p>If you already have the skills - double down and keep rounding yourself out.</p><p>Because at the end of the day, growth matters. And leveling up your technical skills is one of the most powerful ways to grow.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cybersecurity is Data: Collect, Analyze, Interpret]]></title><description><![CDATA[Cybersec Caf&#233; #77 - 07/29/25]]></description><link>https://www.cyberseccafe.com/p/cybersecurity-is-data-collect-analyze</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/cybersecurity-is-data-collect-analyze</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 29 Jul 2025 13:03:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2ir6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2ir6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2ir6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!2ir6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!2ir6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!2ir6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2ir6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2ir6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!2ir6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!2ir6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!2ir6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a8d81c6-ca29-4cc7-b0a8-aa872dcacc13_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Forget the movie scenes. Most days in cybersecurity aren&#8217;t about zero-days, red teaming, or duct-taped Python scripts written in the heat of an incident.</p><p>The real work often revolves around data.</p><p>Security professionals spend a large bulk of their time collecting, interpreting, and responding to streams of telemetry across systems, endpoints, and networks.</p><p>Without quality data, robust systems, and intelligent people to interpret and take action - there is no security team.</p><ul><li><p>You can&#8217;t write effective detection rules.</p></li><li><p>You can&#8217;t hunt for threats retroactively or proactively.</p></li><li><p>You can&#8217;t investigate, contain, or recover from incidents.</p></li></ul><p>If there&#8217;s no visibility into your environment, you&#8217;re flying blind. Or just as dangerous is having the data and not knowing how to read it.</p><p>That&#8217;s why data analytic and statistical knowledge aren&#8217;t just nice-to-haves. They&#8217;re critical.</p><p>In this field, if you don&#8217;t understand your environment, you can&#8217;t protect it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Challenges</h1><p>Even with the right tools and a skilled team, logging and monitoring isn&#8217;t as simple as flipping a switch.</p><p>There&#8217;s more to it than plugging different platforms into the SIEM, waving your magic wand, and suddenly you have valuable insights.</p><p>There are tradeoffs, tough choices, nuance, and plenty of considerations to be made along the way.</p><h3>What do we collect?</h3><p>Not all logs are created equal. You can&#8217;t collect everything - at least not realistically.</p><p>So a conscious decision must be made for every source.</p><p>At its simplest form, you need to determine what log sources are valuable by taking the time to spell out <em>why</em>.</p><p>Start by asking:</p><ul><li><p>What&#8217;s the actual value of this log source?</p></li><li><p>Is it needed for real-time detection?</p></li><li><p>Does it help with incident response?</p></li><li><p>Does it enrich other logs through context?</p></li><li><p>Is it required for compliance?</p></li></ul><p>A shared understanding of <em>what</em> you&#8217;re collecting and <em>why</em> helps avoid wasted effort and bloated pipelines.</p><p>This is the foundation of a smart, sustainable strategy.</p><h3>Where do we store it?</h3><p>Storage is a constant balancing act between cost and capability. Budget is not infinite and log storage is expensive.</p><p>You&#8217;ll likely have two primary tiers:</p><ul><li><p>High-cost storage (e.g. your SIEM) for logs that support real-time detection use cases and require fast access.</p></li><li><p>Low-cost storage (e.g. AWS S3) for logs that provide investigative context or are required for compliance retention.</p></li></ul><p>There&#8217;s no one-size-fits-all solution. It&#8217;s no longer realistic nor cost-effective to store all log sources in a single source.</p><p>As a team you&#8217;ll need to understand what you prioritize - speed, budget, a single-pane-of-glass&#8230;</p><p>If you have the budget to keep all logs in one place - consider yourself lucky!</p><h3>How long do we keep it?</h3><p>It&#8217;s not always obvious what data you will need, or when you will need it.</p><p>The safest answer is often: &#8220;Keep everything, for as long as you can stomach it.&#8221;</p><p>But the reality is storage costs add up fast, especially for high-volume, high-cost platforms like SIEMs.</p><p>Many teams default to keeping logs for 12-15 months, which aligns with common compliance requirements.</p><p>But what happens if a threat has been lurking quietly for beyond then? What if a legal hold or regulatory inquiry suddenly requires access to old logs?</p><p>These are the kinds of scenarios that make retention strategy a critical part of your logging plan. The key is balancing cost, compliance, and risk - while also preparing for the unknown.</p><h3>How do we drive action from our data?</h3><p>With so many sources, fields, and values flooding your SIEM every day, separating noise from real signals can feel impossible.</p><p>But at the end of the day, that&#8217;s the job. Turning raw data into meaningful insight is what makes a security program proactive instead of reactive. And that takes skill.</p><p>You&#8217;ll need to write queries, look for patterns, understand business context, and recognize anomalies. It&#8217;s not just an analyst&#8217;s job - it&#8217;s a core skill for anyone working in cybersecurity - whether you&#8217;re red team, blue team, or somewhere in between.</p><p>The good news? Once you learn how to work with data, that skill travels with you.</p><p>The hard part? Getting there. But once you&#8217;re on the other side, it&#8217;s one of the most valuable tools for your career.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether it&#8217;s <em>Detection Engineering, Incident Response, or Threat Huting</em> - Security Operations is built on data. And as a Security Engineer, you need to make that data work for you. <strong>Selecty is a database-agnostic, sidecar query assistant</strong> built to do just that. Generate queries based on your table schehmas, optimize them to your use case, iterate on them quickly, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h1>Architecture</h1><h3>The Traditional Approach</h3><p>The go-to strategy for many cybersecurity teams has long been to send all logs to the SIEM.</p><p>The goal? A mythical &#8220;single pane of glass&#8221; - or one place to see everything. But in today&#8217;s landscape, is that even practical? Or smart?</p><p>Relying on a single platform can quickly lead to vendor lock-in. The more time and effort you invest into the one platform, the harder it becomes to leave.</p><p>Migrating your data, retraining your team, rebuilding your infrastructure, reconfiguring alerts - it&#8217;s a heavy lift.</p><p>And vendors know this. But at this point, you become a slave to their pricing because they know you&#8217;re stuck. There are a couple vendors that are notorious for insanely high cost (but I won&#8217;t put them on blast here).</p><p>Then there&#8217;s the issue of siloed data. Along with security specific data, security teams also often ingest some similar sources as other departments - leading to double ingestion costs and unnecessary complexity.</p><p>The truth is, the traditional model is showing its age. New players are entering the market with flexible, cost-effective approaches.</p><p>That &#8220;single pane&#8221; is cracking, and it might be time to rethink what centralized visibility should really look like.</p><h3>Data is on the Move</h3><p>Data lakes are rapidly becoming the backbone of modern security architectures.</p><p>Why? Because they&#8217;re not just cheaper, they&#8217;re smarter. A well-architected data lake allows you to store security-relevant data at scale, run advanced analytics, and break down silos between teams.</p><p>All while avoiding traditional vendor lock-in. You have the ability to:</p><ul><li><p>Centralize and unify data across departments.</p></li><li><p>Lower storage and compute costs.</p></li><li><p>Scale effortlessly.</p></li><li><p>Support more complex detection and investigation workflows.</p></li></ul><p>As this model continues to gain traction, SIEM vendors are being forced to adapt. They&#8217;re now figuring out how to work on top of your data lake - a major shift in power and flexibility.</p><p>The result? You take back ownership of your data. You control the architecture. And you can swap in and out tools as your needs evolve without feeling handcuffed to a single platform.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dp7g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76994,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberseccafe.com/i/169183205?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dp7g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Dp7g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68d3682c-9c9e-4aa1-93b7-3e941137dacb_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The Cybersec Caf&#233; Discord is officially live! </strong>Join a growing community of cybersecurity professionals who are serious about leveling up. Connect, collaborate, and grow your skills with others on the same journey. From live events to real-world security discussions &#8212; this is where the next generation of defenders connects. <strong>Join for free below.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.gg/BARBahA5tt&quot;,&quot;text&quot;:&quot;Join Now!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://discord.gg/BARBahA5tt"><span>Join Now!</span></a></p><div><hr></div><h1>How Security Teams are Operationalizing Data</h1><p>Statistics is the science of collecting, analyzing, interpreting, presenting, and organizing data.</p><p>The SIEM is a big data engine. It provides the tools to ingest, store, and visualize your security telemetry. But without the skills to analyze and operationalize the data, it&#8217;s like owning a library and not being able to read.</p><p>Security teams must develop strategies to act on their data at scale. Otherwise detection engineering, triage, hunting, and incident response all break down.</p><h3>Detections</h3><p>Detections are the heart beat of security operations.</p><p>Traditional detections often rely on black and white boolean logic to determine whether an event matches known bad behavior. But as threats grow more subtle and user behavior more dynamic, this approach starts to fall short.</p><p>That&#8217;s where statistical thinking steps in.</p><p>Behavioral detections, especially user-based ones, are notoriously tricky to get right. But by applying basic statistical analysis like mean and standard deviation to historical activity, you can begin to identify anomalies by searching for outliers.</p><p>These are specific activities that are statistically improbable.</p><p>This mindset shift allows you to go beyond simple pattern matching and to find signals that are truly anomalous.</p><p>Combine this with boolean logic, and you&#8217;ve got a powerful hybrid.</p><h3>Alert Triage</h3><p>Whether you&#8217;re manually triaging alerts or building automated SOAR workflows, statistical reasoning is a crucial skill.</p><p>Every alert is in a sense, a question: &#8220;Is this worth our time to investigate further?&#8221;</p><p>To answer it, you need to think like both a security analyst and a data analyst - you need to sift through raw telemetry, identify the relevant pieces, and organize them into a coherent story about a user, system, or behavior.</p><p>The goal is to contextualize the signal and assess the likelihood that it represents real risk. Sounds straightforward - but the challenge lies in variety and business context.</p><p>Different log sources, enrichment layers, and detection types all introduce complexity. And in these moments, environmental knowledge becomes just as important a technical skill.</p><h3>Performance</h3><p>The numbers don&#8217;t lie.</p><p>When you&#8217;re dealing with massive volumes of data, gut feelings won&#8217;t cut it - you need your metrics to prove your security function is performing.</p><p>Start collecting performance data across your operations as soon as possible: detection, response, and SOC workflows. These metrics provide an honest snapshot of where you stand today and how you&#8217;re trending over time.</p><p>Track the fidelity of your detections, the mean time to triage, and how long it takes to resolve incidents.</p><p>This data will quickly become your compass - pointing the way to efficiency and continuous improvement.</p><h3>Threat Hunting</h3><p>At its core, threat hunting is about finding what doesn&#8217;t belong.</p><p>It&#8217;s a manual process rooted in curiosity, intuition, and a methodical approach.</p><p>The best hunters don&#8217;t just stumble upon threats - they use structured techniques to interrogate data, spot anomalies, and test their hypotheses.</p><p>That means slicing through big datasets, surfacing patterns, and building a story based on evidence.</p><p>It takes a blend of technical skill and investigative mindset. The challenge? Knowing what to look for and how to get there without drowning in the noise.</p><h3>Security Incident Response</h3><p>Incident response thrives on precision, and your data is the foundation.</p><p>You&#8217;re not just collecting metrics to see how your team responds, you&#8217;re also building a full timeline of events based on historical data.</p><p>Attacks often sprawl. Your job is to trace them: sift through logs, correlate data sources, and identify the start and spread of an incident.</p><p>That means narrowing scope, identifying what&#8217;s relevant, and cutting the rest.</p><p>If you can compare current activity against historical baselines, even better. You&#8217;ll move faster, make stronger decisions, and resolve incidents with confidence.</p><div><hr></div><p>&#128172; <strong>How else do you utilize data analytics and statistics concepts in your day-to-day as a security engineer? Let me know below!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/cybersecurity-is-data-collect-analyze/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberseccafe.com/p/cybersecurity-is-data-collect-analyze/comments"><span>Leave a comment</span></a></p><div><hr></div><h1>The Narrative</h1><p>By now, you&#8217;re probably noticing a theme: using data and statistical analysis to craft a narrative.</p><p>In cybersecurity, it&#8217;s not enough to just make sense of data - you need to translate it into something others can understand and act on.</p><p>That means making data actionable - the skill of filtering through massive amounts of telemetry, identifying what matters, and drawing conclusions that drive decisions.</p><p>Sure, if you&#8217;re communicating engineer to engineer, raw data might be enough.</p><p>But let&#8217;s be honest - that&#8217;s not how the real world works. Most of the time you&#8217;ll need to explain your findings to people who don&#8217;t live in the logs like you do.</p><p>Data is the evidence. The narrative is the conclusion.</p><p>This is exactly why statistical proficiency is so critical in cybersecurity. It&#8217;s the intersection of math and communication - taking something complex and making it understandable.</p><p>The professionals who can look at a wall of numbers and translate it into a compelling, security-relevant story are the ones who stand out. That skill of turning raw data into a clear and confident narrative is a superpower.</p><p>Cybersecurity is challenging for this exact reason. It&#8217;s not just one discipline - it&#8217;s many combined.</p><p>You need technical chops across a massive stack, data fluency, communication skills, and strategic thinking. All working in harmony.</p><p>But like anything else worth mastering, it takes practice. You won&#8217;t learn this overnight, but you will learn it if you show up, do the work, and build on the basics.</p><p>If you&#8217;re looking to improve this specific skillset, I&#8217;d highly recommend checking out these two articles next:</p><ul><li><p><a href="https://www.cyberseccafe.com/p/my-log-source-agnostic-methodology">My Log Source-Agnostic Methodology to Understanding Big Data</a></p></li><li><p><a href="https://www.cyberseccafe.com/p/why-knowing-how-to-query-is-an-essential">Why Knowing How to Query is an Essential Cybersecurity Skill</a></p></li></ul><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Day in the Life of a Security Engineer]]></title><description><![CDATA[Cybersec Caf&#233; #76 - 07/15/25]]></description><link>https://www.cyberseccafe.com/p/day-in-the-life-of-a-security-engineer</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/day-in-the-life-of-a-security-engineer</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 15 Jul 2025 13:01:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!C5Zj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C5Zj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C5Zj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!C5Zj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!C5Zj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!C5Zj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C5Zj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C5Zj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!C5Zj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!C5Zj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!C5Zj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44fc7432-605b-4f80-9431-c9b7f0831a67_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s easy to get swept up in the hype and buzzwords around cybersecurity careers. I know I did - that&#8217;s a big part of what initially drew me to the field.</p><p>But it&#8217;s important to understand what the day-to-day <em>actually</em> looks like as a Security Engineer.</p><p>It&#8217;s not nonstop writing POC scripts for CVEs. It&#8217;s not waking up every morning to fend off DDoS attacks. And no, you&#8217;re probably not battling a ransomware threat every month (at least I hope not).</p><p>But often, the real glamor is in the unglamorous.</p><p>Day-to-day as a Security Engineer is about tackling the tasks that truly move the needle. It&#8217;s the steady, consistent efforts that prepare you for when the inevitable happens.</p><p>Here&#8217;s what a typical day in my life as a Security Engineer looks like.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Morning Routine (5:30am-6:15am)</h1><p>I&#8217;m a firm believer that setting yourself up for success starts the moment you wake up. For me, that means getting straight to it as soon as the alarm goes off and keeping my phone tucked away for a majority of the morning.</p><p>I always start with a 20-minute yoga/stretching routine. Sitting at a desk all day can wreak havoc on your body, so this is a non-negotiable for me. It not only gets me feeling energized and focused, but helps prevent long term damage from sitting for hours.</p><p>Next is my daily morning walk. This 10-15 minute effort helps switch my brain on, gets light in my eyes, and gets my blood moving. And honestly, some of my best ideas come during these walks.</p><p>Finally, I wrap up my morning routine with a mix of athletic greens while I take my daily supplements.</p><p>By the time that&#8217;s done, I&#8217;m fully dialed in and ready to start the day.</p><h1>Daily Preparation (6:15am-7:00am)</h1><p>Proper preparation is the single biggest productivity hack. When you know exactly what you&#8217;re going to focus on, you waste less time deciding and spend more time doing real, deep work.</p><h3>Security Alerts</h3><p>A big part of working in Detection and Response or Security Operations is security alerts from the SIEM and other reporting platforms.</p><p>This early review not only helps to get my brain going, but is also to ensure no critical <a href="https://www.cyberseccafe.com/p/understanding-the-full-spectrum-of">IOCs</a> were missed overnight by the SOC team. I&#8217;ll spend a few minutes reviewing for any suspicious activity, then triage any leftover alerts that may have come through during the handoff between shifts.</p><h3>Emails &amp; Tickets</h3><p>Next up is catching up on emails and tickets. I&#8217;m looking for anything new to add to my to-do list for the day, or updates on ongoing work that needs to be documented.</p><p>It&#8217;s not the most thrilling of activities, but staying on top of comms helps in prioritizing tasks for your day.</p><h3>News Catchup</h3><p>It&#8217;s essential to stay aware of any critical news or emerging threats in the cybersecurity world.</p><p>I usually spend 10-15 minutes scanning articles or threat intel updates that might impact me or my industry.</p><p>This step is small but important, as it can easily inspire new detections to create, or even spark a threat hunt if something stands out.</p><h3>Day Planning</h3><p>This is arguably the most important part of the morning. There&#8217;s always too much to do and not enough time to do it - so prioritization is key.</p><p>I generally split tasks into three buckets</p><ol><li><p><strong>Day-to-Day</strong>: Ongoing, discipline-based tasks. For me, that includes managing the detection lifecycle (creation, tuning, SOAR maintenance), plus upkeep of the tools I administer.</p></li><li><p><strong>Projects: Usually planned by the quarter. As you mature in your role, you have to carve out time for these medium-to-heavy lifts to keep them on schedule. They&#8217;ll vary depending on your security posture and priority as a team.</strong></p></li><li><p><strong>Ad-Hoc: One-off tasks that pop up through the week. They can take anywhere from 5 minutes to 2 hours and can vary wildly in priority. I always have a backlog of these, so I make sure to review and prioritize based on time and effort.</strong></p></li></ol><p>Each day, I pick out my highest-priority tasks and block off time on my calendar to tackle them. If you treat working on your tasks like attending a meeting, you&#8217;ll make sure to show up and get it done.</p><h1>Stand Up (7:00am-7:20am)</h1><p>When 7am rolls around, it&#8217;s time to celebrate. Not just because it&#8217;s time to chat and align with the team, but also because it&#8217;s time for my first cup of coffee.</p><p>Alignment on key tasks is crucial for making real progress, especially when you&#8217;re working across time zones. And like most teams, we leverage two-week sprint cycles for planning our efforts.</p><p>This stand-up is our chance to get everyone on the same page, unblock anything holding people up, and coordinate collaboration. It&#8217;s also where I check whether I can stick to my plan for the day or if I need to pivot to support other efforts.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>Deep Work (7:30am-10:00am)</h1><p>Now, it&#8217;s time to dial in.</p><p>For me, that means filling up my second cup of coffee, queuing up <a href="https://www.youtube.com/watch?v=jfKfPfyJRdk">LoFi Girl</a>, throwing on my noise-cancelling headphones, and locking in on my most important tasks.</p><p>My morning deep work block is reserved for the biggest lifts: usually high-priority day-to-day tasks and project work.</p><p>Since I find my mornings are my most productive hours, I want to make sure I&#8217;m ready to hit the ground running. This is exactly where my early planning pays off. I can jump straight in without losing time figuring out what to do next.</p><p>When I say deep work, I mean it: phone away, notifications off, distractions limited - don&#8217;t underestimate the power of your flow state. Tackling your hardest tasks first thing in the morning is a great trick to build momentum for the rest of your day.</p><p>I also like to break my deep work session into smaller time blocks based on how long I think each task will take. That way I can plan to take quick breaks between items to reset before jumping straight into the next one.</p><h3>The Looming Inevitable&#8230;</h3><p>Of course, it&#8217;s not uncommon for my entire morning to get overtaken by a security incident.</p><p>Incident response is part of the job. It can completely derail what you planned for your day, but it&#8217;s also part of what makes this industry exciting.</p><p>You never know exactly what or when it will happen, but you have to plan for it. And if you&#8217;re lucky and don&#8217;t get many incidents in a quarter, that just means you&#8217;ll have extra time on your hands to prioritize other projects or efforts.</p><h1>Meetings (10:00am-11:30am)</h1><p>If I&#8217;m lucky, I can schedule any meetings for late morning so that I don&#8217;t disrupt my flow state during my deep work block.</p><p>Meetings are a necessary part of any role. While security engineering isn&#8217;t as meeting heavy as other jobs in tech, they are still very much a part of the job..</p><p>If I&#8217;m the one scheduling the meeting, I always provide attendees with an agenda. It doesn&#8217;t need to be overly detailed and outlined to the minute, but having a clear plan keeps us on topic, ensures everyone comes prepared and aligned, and makes sure not to waste anyone&#8217;s time.</p><h1>Lunch (11:30am-12:30pm)</h1><p>Lunch is my first meal of the day and is my time to refuel and mentally reset.</p><p>As boring as it might sound, I eat pretty much the same thing every day. It&#8217;s healthy and light, which keeps me from feeling sluggish the rest of the day, and also removes the decision-making overhead.</p><p>During lunch, I also try to be productive in other parts of my life. I&#8217;ll work on learning Spanish with Pimsleur or catch up on some of my favorite podcasts like Startups for the Rest of Us, Darknet Diaries, or Crime Junkie.</p><p>Most importantly, I fully disconnect from work during this time. It&#8217;s essential for refreshing my mind before diving back in for the afternoon.</p><h1>Collaborative Work (12:30pm-2:00pm)</h1><p>Afternoons tend to be less productive for heads-down solo work because more teammates are online and looking to collaborate.</p><p>That&#8217;s why I deliberately front-load my day with deep work.</p><p>This block is dedicated to anything that requires collaboration - whether that&#8217;s async strategizing over Slack, ad-hoc discussions, or formal meetings with other teams or departments.</p><p>Typically, this time is filled with project-related work or addressing ad-hoc tasks that pop up.</p><h1>Afternoon Solo-Session (2:00pm-2:50pm)</h1><p>Because I front-load my most challenging work in the morning, my afternoons are reserved for easier, low-effort day-to-day or ad-hoc tasks.</p><p>This approach works well around afternoon meetings since it&#8217;s much easier to fit these tasks in between calls since they don&#8217;t demand as much focus. Even if you get pulled away in the middle, it won&#8217;t derail your flow the way it would with a complex task.</p><h1>Wind Down (2:50pm-3:00pm)</h1><p>Part of setting yourself up for success tomorrow is properly closing out today.</p><p>I like to quickly document the things I accomplished, note any tasks that spun off from those efforts, and list anything I left unfinished.</p><p>This way, I can pick up exactly where I left off the next morning - especially helpful if &#8220;tomorrow&#8221; is the Tuesday after a long weekend.</p><h1>Workout (3:00pm-4:30pm)</h1><p>My workout is a non-negotiable part of my day.</p><p>It&#8217;s essential for my physical health, but equally important for my mental reset. It also creates a clear boundary between my job and my entrepreneurial work.</p><p>I train Monday through Friday without fail, and generally try to fit in another session on the weekends. My workouts rotate between weight training, cardio, yoga, and skill-sports (Basketball, Tennis, Golf, and Pickleball).</p><p>I genuinely believe that pushing yourself physically every day pays dividends in every other aspect of your life.</p><h1>Afternoon into Evening Session (4:30pm-8:30pm)</h1><p>This is where I switch gears and focus on my entrepreneurial endeavors - whether it&#8217;s writing this newsletter, building digital products, or growing my personal brand.</p><p>After my workout reset, I find it easy to get back in front of the screen and dive into creative work. Some days it&#8217;s two hours, others it&#8217;s a full four - it depends on how I feel and what I need to get done. But I try not to pressure myself too much during this block.</p><p>Funny enough, this part doesn&#8217;t feel like work. When you&#8217;re building something you care about, time flies.</p><p>I then like to reserve the last 60-90 minutes of my evening to wind down, disconnect, and rest before heading to bed.</p><div><hr></div><p>&#128172; <strong>If you work in cybersecurity, how does my day compare to yours? Let me know below!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/day-in-the-life-of-a-security-engineer/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberseccafe.com/p/day-in-the-life-of-a-security-engineer/comments"><span>Leave a comment</span></a></p><div><hr></div><h1>Takeaways</h1><p>You can definitely take this article at face value to see what a day in the life of a Security Engineer looks like and whether it aligns with your expectations. But I&#8217;d also love to leave you with a few lessons I&#8217;ve learned from how I structure my days:</p><p><strong>Planning Works</strong></p><p>Project management isn&#8217;t just for work. Applying it to your personal life clears up mental space and makes following through easier - whether that&#8217;s writing things down, tracking goals, or reviewing progress. Like my end-of-day wrap-up, it helps you pick up exactly where you left off and gauge your progress over time.</p><p><strong>Use Your Time Intentionally</strong></p><p>When you block time for a task, give it your full attention. Eliminating distractions allows you to finish faster, achieve higher quality work, and enjoy your free time guilt-free. Put your phone down, lock in, and be present - you might find you have more time later than you think.</p><p><strong>Small Efforts Lead to Big Results</strong></p><p>Progress isn&#8217;t always loud. Small, consistent efforts toward your goals compound over time. Success is less about giant leaps and more about showing up every day and putting in the work.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p>Just a heads up, The Cybersec Cafe's got a pretty cool weekly cadence.</p><p>Every week, expect to dive into the hacker&#8217;s mindset in our Methodology Walkthroughs or explore Deep Dive articles on various cybersecurity topics.</p><p>. . .</p><p>Oh, and if you want even more content and updates, hop over to Ryan G. Cox on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Can't wait to keep sharing and learning together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Understanding the Full Spectrum of Threat Indicators]]></title><description><![CDATA[Cybersec Caf&#233; #75 - 07/08/25]]></description><link>https://www.cyberseccafe.com/p/understanding-the-full-spectrum-of</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/understanding-the-full-spectrum-of</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 08 Jul 2025 13:03:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Nzlv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nzlv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nzlv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!Nzlv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!Nzlv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!Nzlv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nzlv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Nzlv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!Nzlv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!Nzlv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!Nzlv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdbe130-b440-46ad-86e7-63f6e4983c47_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you&#8217;ve spent more than a day in cybersecurity, you&#8217;ve definitely heard the phrase <em>Indicators of Compromise</em>, or IOCs, thrown around.</p><p>It&#8217;s often used as a blanket term for signals or behaviors that point to a potential threat, but it really only scratches the surface.</p><p>Threat indicators span a broader spectrum. Some are technical - concrete data points that may signal an attack or breach. While others are behavioral - suspicious activity or patterns that suggest something might be off.</p><p>By understanding the various terms and associated indicators, you can leverage them to sharpen your detections, improve your monitoring strategy, and proactively harden your defenses. They can also play a key role in shaping incident response plans by helping build processes tailored to the threats specific to your environment.</p><p>Not to mention, they&#8217;ll help you communicate clearly to your team members.</p><p>Put simply: knowing the full range of threat indicators means spotting and stopping threats before they escalate into something bigger.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>While some of the terms we&#8217;ll cover are formal cybersecurity lingo, others are more contextual and used flexibly depending on the team or environment. I&#8217;ll highlight both, along with any alternate terminology you may hear.</p><h3>Indicators of Compromise (IOC)</h3><p>Indicators of Compromise observable pieces of evidence showing that a system or network has been breached. These typically surface during forensics work or investigations and act as proof that an attack has succeeded. Examples include known malicious IP addresses, malware hashes, or traces of unauthorized activity.</p><p><strong>Alternate Terminology: </strong>Forensics, Artifacts, Evidence</p><h3>Indicators of Attack (IOA)</h3><p>Indicators of Attack signal that an attack is underway, even if an attacker hasn&#8217;t fully compromised systems yet. These clues often come from SIEM alerts, threat hunts, or patterns in logs that point to malicious activity in progress, like DoS attempts or suspicious process creations. Some common examples include command injection attempts, known malicious patterns in logs, or blocked lateral movement.</p><p><strong>Alternate Terminology: </strong>Attack Activity, Attack Patterns</p><h3>Indicators of Fraud</h3><p>Indicators of Fraud point to social engineering, potential financial fraud, or account abuse - often surfacing as behavioral threat indicators. They can take many forms, from multiple failed payment attempts to phishing campaigns or signs of account takeovers. These indicators help teams spot and respond to abuse before significant damage occurs.</p><p><strong>Alternate Terminology: </strong>Fraud Signals, Fraud Markers</p><h3>Indicators of Misconfiguration (IOM)</h3><p>Indicators of Misconfiguration are signs that systems or controls have been set up incorrectly. These can show up across your entire stack, but are especially common in cloud environments, infrastructure-as-code, and weak internal processes. Think open S3 buckets, overly permissive firewall rules, excessive user permissions, or default administrator credentials left unchanged.</p><p><strong>Alternate Terminology: </strong>Misconfiguration Findings, Configuration Weaknesses</p><h3>Indicators of Exposure</h3><p>Indicators of Exposure are signs that sensitive data or infrastructure is publicly accessible or discoverable by attackers. They often live in plain sight and can be difficult to track. Sometimes on the surface web, sometimes leaked on the dark web. Examples include leaked credentials, exposed developer databases, open services found via Shodan, or code repositories containing hardcoded secrets.</p><p><strong>Alternate Terminology: </strong>Exposure Signals, Public Data Leakage</p><h3>Indicators of Behavior (IOB)</h3><p>Indicators of Behavior are anomalies in either user or system activity that may suggest malicious intent or policy violations. While powerful, behavior-based indicators are notoriously finicky and often require human investigation due to high potential for false positives. Examples include impossible travel logins, unusual access patterns, abnormal working hours, or signs of automated user behavior.</p><p><strong>Alternate Terminology: </strong>User Behavior Analytics, Entity Behavior Signals</p><h3>Indicators of Vulnerability</h3><p>Indicators of vulnerability are details about known weaknesses in systems that attackers could exploit. These can typically be rectified through regular patching, updates, or configuration changes. Examples include CVEs, deprecated software versions, and vulnerability scan results.</p><p><strong>Alternate Terminology: </strong>Vulnerability Findings</p><h3>Indicators of Reconnaissance (IOR)</h3><p>Indicators of Reconnaissance are signs that an attacker is gathering information about your environment, likely before attempting an attack. While they can be more difficult to mitigate if they&#8217;re targeting your external attack surface, they&#8217;re often detectable due to their automated nature. Examples include network scans, DNS enumeration, OSINT collection of employee details, or social engineering efforts.</p><p><strong>Alternate Terminology: </strong>Recon Activity</p><h3>Indicators of Insider Threat</h3><p>Indicators of Insider Threat are signs of malicious or risky actions by legitimate users within your organization. Insider threats can be particularly challenging to detect, but careful behavioral analysis can reveal warning signs. Examples include mass downloads of sensitive data, unusual privilege escalation, policy violations, or acts of sabotage.</p><p><strong>Alternate Terminology: </strong>Insider Risk Signals, Trusted User Abuse Indicators</p><h3>Indicators of Command and Control</h3><p>Indicators of Command and Control reveal that a compromised system is communicating with attacker-controlled infrastructure. Detecting C2 activity relies heavily on monitoring network traffic, DNS queries, and identifying suspicious communication patterns. Examples include unusual protocol usage, beaconing to known C2 domains, regular timed outbound connections, or malware callbacks.</p><p><strong>Alternate Terminology: </strong>C2, Beacon</p><h3>Indicators of Data Exfiltration</h3><p>Indicators of Data Exfiltration are signs that sensitive data is being stolen or transferred out of your network. Security teams should invest in robust Data Loss Prevention strategies to detect and stop exfiltration attempts. Examples include DLP alerts, unusually large outbound file transfers, excessive file downloads, or encrypted outbound channels designed to evade monitoring.</p><p><strong>Alternate Terminology: </strong>Data Loss Signals, Exfil</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether it&#8217;s <em>Detection Engineering, Incident Response, or Threat Huting</em> - Security Operations is built on data. And as a Security Engineer, you need to make that data work for you. <strong>Selecty is a database-agnostic, sidecar query assistant</strong> built to do just that. Generate queries based on your table schehmas, optimize them to your use case, iterate on them quickly, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h1>Why it&#8217;s Important to Think Beyond IOCs</h1><p>While Indicators of Compromise are undeniably valuable in detecting and responding to <em>known</em> threats, they&#8217;re inherently reactive and limited in scope.</p><p>Attackers know this, and they continuously evolve their tactics to bypass detection strategies that rely solely on static IOCs.</p><p>Expanding your perspective to the full spectrum of threat indicators allows you and your team to move beyond chasing known patterns. It pushes you to consider the broader context of suspicious activity, misconfigurations, exposure, and behavioral anomalies in your environment.</p><p>Regularly thinking about these different types of threat indicators helps you:</p><ul><li><p>Build a detection suite with broader and more complete coverage.</p></li><li><p>Threat hunt with greater purpose and direction.</p></li><li><p>Expand your forensic scope during incident response to capture the true impact.</p></li></ul><p>Embracing these threat indicators proactively doesn&#8217;t just strengthen your security posture, it helps you truly understand your attack surface and better anticipate the constantly shifting threat landscape.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cloud Security Fundamentals: IAM, RBAC, PoLP, and more…]]></title><description><![CDATA[Cybersec Caf&#233; #74 - 07/01/25]]></description><link>https://www.cyberseccafe.com/p/cloud-security-fundamentals-iam-rbac</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/cloud-security-fundamentals-iam-rbac</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 01 Jul 2025 13:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VT5l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VT5l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VT5l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!VT5l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!VT5l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!VT5l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VT5l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VT5l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!VT5l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!VT5l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!VT5l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43b158ff-320b-4e5e-b33a-c76b68af65ce_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;re no longer &#8220;moving toward&#8221; the cloud. We&#8217;re already here.</p><p>Modern infrastructure lives in the cloud, and with that shift, understanding cloud security fundamentals is no longer optional for security practitioners.</p><p>It&#8217;s essential.</p><p>At its core, cloud computing is an on-demand, self-service model. Users can provision compute, storage, and services with just a few clicks. It essentially eliminates the need for heavy upfront hardware investment, enables agility, and supports a pay-as-you-go model that aligns cost with usage.</p><p>Cloud services typically come in three main flavors:</p><ol><li><p><strong>Infrastructure as a Service (IaaS)</strong>: Provisioning and managing raw compute and storage resources.</p></li><li><p><strong>Platform as a Service (PaaS)</strong>: Deploying and scaling applications without managing the underlying infrastructure.</p></li><li><p><strong>Software as a Service (SaaS)</strong>: Consuming ready-to-use software over the internet.</p></li></ol><p>The cloud-native architecture changes the game. Unlike on-prem environments, security in the cloud is a shared responsibility: cloud providers secure the infrastructure, but it&#8217;s on you to secure your data and applications.</p><p>Let&#8217;s walk through the key principles you need to know to build a secure and scalable foundation in the cloud.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Cloud Security Basics</h1><h3>What is IAM?</h3><p>IAM, short for Identity and Access Management, refers to the framework of policies and technologies used to ensure that the right individuals and services have access to the right resources.</p><p>To grasp IAM, you need to first understand the differences between Authentication and Authorization:</p><ul><li><p><strong>Authentication</strong> is the process of verifying identity. It typically uses a username/password combo, MFA, or biometrics and looks to answer the question: <em>&#8220;Who are you?&#8221;</em></p></li><li><p><strong>Authorization</strong> determines what an identity can do. It dictates what resources they can access, what actions they&#8217;re allowed to perform, and looks to answer the question: <em>&#8220;What are you allowed to do?&#8221;</em></p></li></ul><p>IAM systems manage both of these functions and include several types of identities to help define a secure and scalable access model.</p><ul><li><p><strong>Users</strong>: Individual identities (human users) that can be assigned direct access.</p></li><li><p><strong>Groups</strong>: Collections of users that make permission management easier by applying policies as scale.</p></li><li><p><strong>Roles</strong>: Temporary identities that can be assumed by users or services, ideal for least-privilege, time-bound access.</p></li><li><p><strong>Service Accounts</strong>: Non-human identities used by applications or automated processes to access resources.</p></li><li><p><strong>Root Account</strong>: The god-mode entity. Avoid using this unless you&#8217;re in an emergency situation, and make sure you have proper alerting and monitoring. Leverage Service Accounts in its place.</p></li></ul><p>At the core of IAM are policies. Typically written in JSON, policies define what actions are allowed or denied on which resources. Policies are attached to identities and evaluated by the cloud provider every time a request is made to determine if access should be granted.</p><p>Without strong IAM practices, everything else starts to fall apart.</p><h3>What is RBAC?</h3><p>Role-Based Access Control (RBAC) is a security model that governs access to resources based on a user&#8217;s role within an organization.</p><p>Instead of assigning permissions directly to individual users, RBAC assigns them to roles like Admin, Developer, or Read-Only. Users then get assigned these roles, making access management simpler, cleaner, and more scalable.</p><p>This method also has several &#8220;built-in&#8221; advantages:</p><ul><li><p>Reduced risk of unauthorized access.</p></li><li><p>Streamlined permissions management.</p></li><li><p>Enhanced auditability for compliance.</p></li></ul><p>Skipping RBAC, especially early on in your cloud journey, creates unnecessary risk. You may struggle to limit access cleanly, experience the nightmares of managing one-off permissions, or experience overly-permissive or conflicting access creep in over time.</p><p>So don&#8217;t wait. Think about RBAC from day one and save yourself the future tech debt.</p><h3>What is PoLP?</h3><p>The Principle of Least Privilege (PoLP) is a foundational security concept and practice that says users, systems, applications, and processes should only have the minimum level of access necessary to perform their functions or tasks.</p><p>In layman&#8217;s terms: you only get the permissions you need.</p><p>PoLP is crucial in cloud environments because of how dynamic and distributed they are. The more access you hand out, the larger your attack surface becomes.</p><p>By instilling the PoLP across your environment, you reduce risk of:</p><ul><li><p><strong>Insider Threat</strong>: Only those who absolutely need access to sensitive data or systems have it, minimizing the damage a rogue or compromised insider can do.</p></li><li><p><strong>Lateral Movement</strong>: If an attacker compromises a single account, PoLP prevents them from pivoting freely across the environment.</p></li></ul><p>In practice, PoLP means applying fine-grained policies, scoped roles, and tight permissions to everything from standard users, to service accounts, to admin roles.</p><h3>What is IaC?</h3><p>Infrastructure as Code (IaC) is the practice of managing and provisioning infrastructure using code instead of manual processes.</p><p>Rather than clicking through a UI or running ad-hoc commands, you define your infrastructure in configuration files - bringing consistency, repeatability, and scalability to your cloud deployments.</p><p>IaC dramatically reduces the risk of misconfigurations by making infrastructure changes auditable, version-controlled, and testable.</p><p>Beyond reliability, it unlocks engineering benefits like CI/CD integration, change control, code reviews, and standardized templates.</p><p>Popular IaC tools include Terraform, OpenTofu, and ansible.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>Logging and Monitoring in the Cloud</h1><p>With the scale and complexity of modern cloud environments, building a comprehensive logging and monitoring strategy is crucial.</p><p>A well-structured approach will not only allow you to detect and respond to security incidents quickly, but also gives you visibility into baseline behaviors, user activity, and system configurations (see <a href="https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless">Tuning Detections isn&#8217;t Hard Unless You Make it Hard</a> for more).</p><p>Every major cloud provider offers its own flavor of audit logging services, but they all serve the same core purpose: capturing valuable operational data such as authentication events, access activity, resources changes, system and application logs, network traffic insights, and more.</p><p>They also have threat detection services meant to continuously monitor your accounts and identify potential threats, which produce logs of their own.</p><p>The good news? Nowadays, these logs are typically easy to integrate into your SIEM, even across multiple cloud accounts - exactly the architecture you&#8217;ll want for centralized monitoring and alerting.</p><p>But just keep in mind: cloud providers are great at scale, but log searchability, alerting, and real-time analysis usually isn&#8217;t their strong suit. But that&#8217;s where your SIEM thrives as that next, customizable layer.</p><p>So, before you start shipping your logs over at scale, make sure you&#8217;ve got some actionable detections in place so that your SIEM is ready to provide value.</p><h1>Incident Response (IR) and Disaster Recovery (DR)</h1><p>Incidents happen. And being prepared is what ensures rapid containment and smooth recovery.</p><p>But when you&#8217;re operating in the cloud, traditional incident response plans aren&#8217;t always enough. Cloud infrastructure introduces new variables (ephemeral resources, multi-region services, third-party dependencies) that standard IR playbooks may not account for. So, it&#8217;s critical to tailor your response plans to the specific complexities of your cloud environment.</p><p>The same goes for Disaster Recovery. Your DR strategy should focus on business continuity - restoring critical infrastructure, data, and applications quickly and efficiently after a disaster.</p><p>To do that well:</p><ul><li><p><strong>Build flexible and scalable recovery solutions.</strong> For mission critical systems, consider cross-region replication to protect against regional outages.</p></li><li><p><strong>Automate backup creation and storage. </strong>Set a schedule for regular snapshots and backups, but automate where possible to reduce manual overhead and increase consistency.</p></li><li><p><strong>Test your backups regularly.</strong> An untested backup is just a false sense of security. Validate that your backup and restore processes work as expected.</p></li><li><p><strong>Store encrypted backups in separate regions or accounts.</strong> This adds a layer of protection, helping prevent unauthorized access to both production and backup data.</p></li></ul><p>When done right, your cloud IR and DR strategies should scale with your environment, adapt to the technologies in play in your environment, and reduce your mean time to recover when things go sideways.</p><h1>Security Controls</h1><p>Security Controls are the backbone of enforcing policy in your cloud environment. They fall into three main categories, each serving a distinct purpose in your defensive strategy:</p><ol><li><p><strong>Preventative</strong>: These are measures designed to stop security incidents before they happen. Think IAM, RBAC, PoLP - all fundamental to Access Controls. But they also include network segmentation, firewalls, and intrusion prevention systems. Their job is to reduce risk at the gate.</p></li><li><p><strong>Detective: These kick in after an event has occurred. Their purpose is to identify, log, and report suspicious or malicious activity. Think logging, monitoring, and alerting - your second line of defense when something slips through the cracks.</strong></p></li><li><p><strong>Corrective: These focus on limiting damage and restoring systems to a secure state after an incident. Think incident response plans, disaster recovery, patch management, and forensics. When the worst happens, corrective controls help you bounce back.</strong></p></li></ol><p>See how it all starts to fit together?</p><p>Cloud security isn&#8217;t about any single control. It&#8217;s about layering them so they work together to protect, detect, and respond.</p><h1>Additional Best Practices</h1><h3>Encryption</h3><p>Most cloud providers enable encryption by default, but you should still understand the basics:</p><ul><li><p><strong>Encryption at Rest</strong>: Secures data stored on disks, databases, and object storage.</p></li><li><p><strong>Encryption in Transit</strong>: Protects data as it moves between systems, services, and users.</p></li></ul><p>Use a Key Management System (KMS) to securely manage, rotate, and audit your encryption keys, Don&#8217;t just set it and forget it - make sure your key lifecycle is tightly controlled.</p><h3>MFA</h3><p>Enable Multi-Factor Authentication everywhere. Across all user accounts, admin interfaces, and especially privileged roles.</p><p>When possible, avoid SMS and opt for passwordless systems (i.e. biometrics combined with SSO and OTPs) or FIDO hardware.</p><p>Explore enabling adaptive MFA too based on user context like device, location, and behavior.</p><h3>Tags and Labels</h3><p>Define a consistent tagging strategy for your cloud resources.</p><p>It helps to establish clear ownership, track costs easier, and increase operational efficiency.</p><p>Automate tags wherever possible through IaC templates or provisioning workflows to maintain consistency across environments.</p><h3>Secure Network Boundaries</h3><p>If you have the bandwidth, apply network segmentation to break your infrastructure into isolated zones. This limits lateral movement in the event of a breach.</p><p>Tighten things further with:</p><ul><li><p>Private subnets to reduce public exposure</p></li><li><p>Firewall rules to control ingress and egress traffic</p></li><li><p>Network ACLs and Security Groups that minimize open ports. (Avoid 0.0.0.0/0 at all costs, unless you&#8217;ve got a rock-solid business case!)</p></li></ul><p>Every entry point in your network should be deliberate.</p><h1>Just Scratching the Surface</h1><p>The cloud is extremely complex, and while these are certainly some of the most useful fundamentals, we&#8217;re really just scratching the surface.</p><p>At its core, many of the key cloud security principles boil down to IAM, RBAC, and PoLP.</p><p>By applying the Principle of Least Privilege and typing permissions to well-defined roles, you avoid operational chaos and build a more secure environment with the legs to scale.</p><p>Mastering the cloud isn&#8217;t optional anymore, it&#8217;s essential for today&#8217;s security practitioners. So give it the attention that it deserves.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p>Just a heads up, The Cybersec Cafe's got a pretty cool weekly cadence.</p><p>Every week, expect to dive into the hacker&#8217;s mindset in our Methodology Walkthroughs or explore Deep Dive articles on various cybersecurity topics.</p><p>. . .</p><p>Oh, and if you want even more content and updates, hop over to Ryan G. Cox on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Can't wait to keep sharing and learning together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How to Actually Leverage the MITRE ATT&CK Framework in Security Operations]]></title><description><![CDATA[Cybersec Caf&#233; #73 - 06/24/25]]></description><link>https://www.cyberseccafe.com/p/how-to-actually-leverage-the-mitre</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/how-to-actually-leverage-the-mitre</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 24 Jun 2025 13:03:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eeE4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eeE4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eeE4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!eeE4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!eeE4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!eeE4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eeE4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eeE4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!eeE4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!eeE4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!eeE4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f02885-8031-481c-a7fd-87a25c39c493_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The MITRE ATT&amp;CK Framework is one of the most recognized and most referenced knowledge bases in the blue team community. And for good reason.</p><p>At its core, ATT&amp;CK maps out the tactics and techniques real-world threat actors use across the full attack lifecycle.</p><p>For Security Operations teams, it can be a powerful tool: a way to align your defensive strategy towards specific adversarial behaviors, to identify gaps, and to mature your detection capabilities.</p><p>But too often I see MITRE ATT&amp;CK get ignored, misunderstood, or just barely scratched at the surface.</p><p>Why? Maybe it&#8217;s because there are too many cybersecurity frameworks floating around and it&#8217;s difficult to tell which ones are worth your time.</p><p>Or maybe&#8230;</p><p>It&#8217;s because everyone tells you about MITRE ATT&amp;CK, but no one&#8217;s shown you how to make the framework work for you in a way that&#8217;s integrated, contextual, and scalable.</p><p>So in this article, we&#8217;ll break down how to use the Framework to assess coverage, identify blind spots, and improve your Security Operations function in ways that actually move the needle.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>A Brief History</h1><p>The <a href="https://attack.mitre.org/">MITRE ATT&amp;CK Framework</a> was first developed in 2013 by MITRE, a non-profit created to support the US Government with technical expertise and threat intelligence..</p><p>ATT&amp;CK stands for <strong>Adversarial Tactics, Techniques, and Common Knowledge</strong> - and the goal was simple: document how real-world attackers behave based on publicly available intelligence.</p><p>It became publicly available in 2015, and since then, it&#8217;s grown into a community-driven framework that is constantly evolving as researchers and threat hunters discover new techniques.</p><p>Today, it's one of the most practical resources security teams have to simulate attacker behavior, strengthen their defenses, and build more threat-informed detection strategies.</p><h1>The Framework</h1><p>The MITRE ATT&amp;CK Framework is made up of two core components: <em>Tactics</em> and <em>Techniques</em>.</p><p>Tactics represent <em>what</em> an attacker is trying to achieve - their technical objective during a specific phase of an intrusion. Think of them as high-level categories or goals that shape an adversary&#8217;s behavior throughout the attack lifecycle.</p><p>As of now, there are 14 Tactics in the Enterprise ATT&amp;CK Matrix:</p><ol><li><p><strong>Reconnaissance</strong>: Gathering information about the target, either actively or passively.</p></li><li><p><strong>Resource</strong> <strong>Development</strong>: Acquiring infrastructure or resources (like domains or malware) for future use.</p></li><li><p><strong>Initial Access</strong>: Gaining a foothold within the target environment.</p></li><li><p><strong>Execution</strong>: Running malicious code on a victim system.</p></li><li><p><strong>Persistence</strong>: Establishing mechanisms to maintain access over time.</p></li><li><p><strong>Privilege Escalation</strong>: Gaining higher-level permissions within the environment.</p></li><li><p><strong>Defense Evasion</strong>: Avoiding detection while moving through the network.</p></li><li><p><strong>Credential Access</strong>: Attempting to steal account credentials.</p></li><li><p><strong>Discovery</strong>: Learning about the internal environment.</p></li><li><p><strong>Lateral Movement</strong>: Moving from one system to another.</p></li><li><p><strong>Collection</strong>: Gathering data of interest from internal systems.</p></li><li><p><strong>Command and Control (C2)</strong>: Communicating with compromised systems to maintain control.</p></li><li><p><strong>Exfiltration</strong>: Removing stolen data from the environment.</p></li><li><p><strong>Impact</strong>: Disrupting availability, integrity, or the business itself.</p></li></ol><p>Techniques explain <em>how</em> those Tactics are achieved. Each Technique is a specific method used by attackers - like phishing for Initial Access, or credential dumping for Credential Access. These techniques are more granular, and many of them even come with sub-techniques to break things down even further.</p><p>There are currently about 200 Techniques and 400 Sub-Techniques, so listing them all here isn&#8217;t really plausible. But, I encourage you to explore the full framework <a href="https://attack.mitre.org/">here</a>.</p><p>Remember:</p><ul><li><p>Tactics give you the big picture.</p></li><li><p>Techniques provide the details you can actually build around.</p></li></ul><p>Once you understand that structure, you can start to align your security strategy more directly against real-world threats.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>The Framework in Practice</h1><p>Yes, MITRE ATT&amp;CK can absolutely help your security posture, benchmark your maturity, identify blind spots, and even communicate more clearly with stakeholders.</p><p>But here&#8217;s the truth: None of that matters if you&#8217;re not actively measuring and applying it across your entire operation.</p><p>It&#8217;s easy to reference MITRE ATT&amp;CK in passing, but much harder to integrate it in a way that can drive your day-to-day efforts and prioritization.</p><p>So, here&#8217;s how you put it to work.</p><h3>Detection Engineering</h3><p>The most straightforward way to operationalize MITRE ATT&amp;CK is through your detection suite.</p><p>Start by thinking of the framework as your creative springboard. Break the mold of just thinking of writing detections against your tooling, and leverage it to build logic around real adversary techniques.</p><p>Start tagging your detections with their corresponding Tactic and Technique IDs. This unlocks a new level of visibility and measurement across your detection program, specifically in 2 areas.</p><ol><li><p><strong>Coverage</strong>: Tagging your detections gives you a birds-eye view of your detection footprint. You&#8217;ll be able to quickly spot redundancies based on over representation of techniques, and gaps based on underrepresented tactics. This becomes a feedback loop and can be used to prioritize new detections, rebalance existing coverage, and to better align your strategy across the board. Mature teams can do this proactively, but any team can benefit from laying a solid foundation early.</p></li><li><p><strong>Surface</strong>: Once alerts start flowing in, you can begin correlating alert volume by Tactic and Technique to the quality of your detections. Think about True/False positive ratios, high/low signal counts, and any reports of alert fatigue. Over time, this gives you a clearer picture of your active attack surface and allows you to tune your detection coverage to match your unique risk profile.</p></li></ol><p>If you want to mature your detection engineering function, tagging with MITRE isn&#8217;t just nice to have - it&#8217;s foundational and sets you up to make smarter decisions, decrease gaps, and give you more resilience over time.</p><h3>Threat Hunting</h3><p>MITRE ATT&amp;CK can be a powerful launchpad for structured threat hunts.</p><p>As a hunter, you can leverage the framework to focus your efforts on known gaps in your detection coverage. Whether it&#8217;s a technique you&#8217;re missing entirely or just one that has limited visibility, ATT&amp;CK helps you align your hunts with actual risk rather than just intuition and news.</p><p>Start by combining your MITRE mapping with internal knowledge about your environment. Then layer in OSINT or public threat intelligence to build out hypothesis-driven hunts that target specific behaviors, sub-techniques, or IOCs.</p><p>Even when engaging in unstructured hunts, your knowledge of your current MITRE coverage can still act as a compass. It gives your exploration focus while still giving you the creative freedom that comes with unstructured threat hunts.</p><p>But don&#8217;t just stop with the hunt itself.</p><p>Any findings (missed activity, detection gaps, new hypotheses) should feed right back into your detection lifecycle. This keeps your detection engineering function agile yet always grounded in the reality of your security posture.</p><h3>Incident Response</h3><p>Incidents are the most honest indicators of where your defenses fall short.</p><p>Each phase of an incident can be mapped back to specific MITRE ATT&amp;CK techniques or subtechniques, giving you insights into the tactics that slipped through the cracks. And since incidents are multi-layered, you&#8217;ll usually uncover several techniques from a single event.</p><p>The key is to track them.</p><p>Failing to tag incidents to ATT&amp;CK tactics and techniques, or worse - failing to review those analytics over time, is a major missed opportunity.</p><p>Why? Because that data shows not only where you were weak in the moment, but where you might be consistently vulnerable over time.</p><p>When tracked properly, incident data can feed:</p><ul><li><p>Your detection engineering priorities</p></li><li><p>Your threat hunting hypotheses</p></li><li><p>Your training and tabletop exercise planning</p></li></ul><p>If you want your incident response program to mature, start treating every incident as a feedback loop. MITRE ATT&amp;CK is that added layer to give you structure and a foundation to do it in a measurable, repeatable way.</p><h1>The SecOps ATT&amp;CK Ecosystem</h1><p>By now, it&#8217;s clear: MITRE ATT&amp;CK weaves through every layer of your Security Operations function.</p><p>When used intentionally, it becomes a unifying thread that connects each discipline, encourages collaboration, drives prioritization, and builds maturity.</p><ul><li><p><strong>Alerts</strong>: SOC Analysts can use ATT&amp;CK mappings to help prioritize triage, choose accurate classifications when closing alerts, and provide structured feedback to Detection Engineers.</p></li><li><p><strong>Detection Engineering</strong>: Detection Engineers can map their detection suite to ATT&amp;CK to assess coverage, reduce redundancy, and prioritize new detections based on gaps.</p></li><li><p><strong>Threat Hunting</strong>: Threat Hunters can form hypotheses grounded in uncovered gaps, launching hunts that directly target under-monitored behaviors or subtechniques.</p></li><li><p><strong>Incident Response</strong>: Responders can map incident activity to ATT&amp;CK to understand the full attack path, identify defensive breakdowns, and generate action items during post-mortem.</p></li><li><p><strong>Leaders</strong>: By building the framework into your processes, managers and executives can leverage metrics that give a clear picture of operational maturity.</p></li></ul><p>But still want to take it a step further?</p><p>Use it to drive your purple teaming exercises. Leverage the framework to simulate attacks that specifically target underrepresented techniques in your detection suite. This lets you validate existing detections, strengthen controls, and spot your gaps.</p><div><hr></div><p>&#128172; <strong>Are you using MITRE ATT&amp;CK as part of your security strategy? Or are you leveraging other frameworks? Let me know below!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/how-to-actually-leverage-the-mitre/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberseccafe.com/p/how-to-actually-leverage-the-mitre/comments"><span>Leave a comment</span></a></p><div><hr></div><h1>Another Iterative Piece to the Process</h1><p>If you&#8217;ve been reading the Cybersec Caf&#233; for a while, you&#8217;ve probably noticed a recurring theme: iteration is everything in Security Operations. And that&#8217;s by design.</p><p>Each key pillar of SecOps feeds into the others. And the MITRE ATT&amp;CK Framework isn&#8217;t just another checkbox, it&#8217;s a platform that helps you align those pillars to build with purpose and evolve with intention.</p><p>This framework becomes even more valuable as your team matures. The last thing you want is to find yourself:</p><ul><li><p>Wasting time building redundant detections</p></li><li><p>Accumulating tech debt from untagged rules</p></li><li><p>Hunting in well-covered areas while blind spots go unchecked</p></li><li><p>Skipping improvement items in incident reviews because you lack structure</p></li></ul><p>Put simply, if you&#8217;re not using MITRE ATT&amp;CK to guide your growth, you&#8217;re not measuring your security posture in its entirety.</p><p>MITRE ATT&amp;CK is a mindset that brings structure and strategy to your operations. Use it early. Use it often. And let it evolve with your team.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p>Just a heads up, The Cybersec Cafe's got a pretty cool weekly cadence.</p><p>Every week, expect to dive into the hacker&#8217;s mindset in our Methodology Walkthroughs or explore Deep Dive articles on various cybersecurity topics.</p><p>. . .</p><p>Oh, and if you want even more content and updates, hop over to Ryan G. Cox on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Can't wait to keep sharing and learning together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Playbook for Playbooks]]></title><description><![CDATA[Cybersec Caf&#233; #72 - 06/17/25]]></description><link>https://www.cyberseccafe.com/p/the-playbook-for-playbooks</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/the-playbook-for-playbooks</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 17 Jun 2025 13:02:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D_r5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D_r5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D_r5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!D_r5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!D_r5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!D_r5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D_r5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D_r5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!D_r5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!D_r5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!D_r5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3f5d03b-a39b-4fee-88ee-0ee0fd11801e_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>No, they&#8217;re not the flashiest part of Security Engineering. But if you want a scalable, world-class Security Operations function, they&#8217;re absolutely essential.</p><p>I&#8217;m talking about Playbooks - the step-by-step documentation your team relies on to triage alerts, mitigate threats, and respond to incidents consistently and effectively.</p><p>With the volume of alerts that modern SOCs handle, it&#8217;s inevitable that processes will get lost or forgotten - whether through turnover or just the chaos of daily operations.</p><p>Most teams store documentation somewhere like Confluence, GDrive, GitHub, or Notion. Inside you&#8217;ll find the play-by-play steps for identifying, triaging, responding to, and remediating various security events.</p><p>But Playbooks are not just limited to SIEM alerts.</p><p>You can have them for phishing, vulnerability management, incident response, threat hunting - even your daily workflows. If you're repeating a process more than once, it&#8217;s probably worth turning into a Playbook.</p><p>At the end of the day, the goal is simple: streamline operations, drive consistency, and keep your team efficient with as little guesswork as possible.</p><p>Let&#8217;s walk through how to build a great Playbook with a realistic scenario.</p><p><strong>Subscribers get access to the Playbooks Repository in Cybersec OS to follow along with this article!</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Scenario</h1><p>You&#8217;ve just started ingesting GSuite logs into your SIEM. While some out-of-the-box detections offer basic coverage, you&#8217;re not confident it&#8217;s enough.</p><p>So, you create a custom detection: GDrive Excessive Sharing to External Non-Business Emails.</p><p>The idea? Catch early signs of potential insider threats by flagging unusual volumes of sharing to non-business emails.</p><p>The detection logic is ready to go live - but before it does, it needs a solid Playbook to guide your team in the case it does fire off.</p><h1>Drafting Your Playbook</h1><h3>Start with Purpose</h3><p>There&#8217;s no one-size-fits-all approach to writing Playbooks, but one habit I&#8217;ve found especially helpful is starting with a purpose statement.</p><p>This sets the tone. It tells the reader exactly why this Playbook exists, without diving into too many technical weeds. It should be a one-line (or two) that answers: <em>What is this Playbook helping us do?</em></p><p>This not only gives context to the person executing the Playbook, but also helps future-proof the doc by anchoring it to a clear goal.<br><br><strong>Purpose</strong></p><p><em>This Playbook supports the &#8220;GDrive Excessive Sharing to External Non-Business Emails: detection. It&#8217;s designed to help identify potentially malicious insider behavior by investigating the user suspected of sharing large volumes of files to non-customer, public email providers within a 24-hour period. Use it to filter out legitimate business activity and focus on suspicious sharing patterns.</em></p><h3>Give a Description</h3><p>Next, add a brief description of the alert this Playbook is tied to. Think of this as the &#8220;what fired&#8221; explanation - not the why, just the what.</p><p>It&#8217;s less about the process and more about quickly giving your team a mental model of what the detection means and what triggered the response.</p><p>This should be short and simple, ideally no more than a sentence or two.</p><p><strong>Description</strong></p><p><em>A user has shared an unusually high number of files to external email addresses. It may indicate unauthorized data sharing or insider threat behavior.</em></p><h3>Investigation</h3><p>Now it&#8217;s time to walk the reader through exactly how to investigate this alert.</p><p>Your goal here isn&#8217;t to write an essay - it&#8217;s to build a checklist of actionable, repeatable steps that guide someone through the early stages of triage.</p><p>Use short, direct instructions and include quick links to essential tools like dashboards, IP lookups, saved queries, or relevant docs whenever possible.</p><p><strong>Investigation</strong></p><ol><li><p><em>Investigate the filenames and the external email addresses flagged in the alert using GDrive External Share Dashboard.</em></p><ol><li><p><em>Assess sensitivity of shared files. Check if file names suggest sensitive content, like financial, customer, design, sales, or architectural documents.</em></p></li><li><p><em>Identify potentially suspicious recipients. Look for personal or unrecognizable email addresses. Signs of a potential insider threat include: the user&#8217;s own personal email, a team member&#8217;s personal email, an unknown email, or a competitor.</em></p></li></ol></li><li><p><em>Use the Investigate User Dashboard and Investigate IP Dashboard to view recent behavior and access patterns tied to the user and associated IPs.</em></p><ol><li><p><em>Leverage IP Reputation Tools to validate legitimacy. (<a href="https://www.virustotal.com/gui/home/search">VirusTotal</a> | <a href="https://www.talosintelligence.com/">Talos Intelligence</a>)</em></p></li></ol></li><li><p><em>Use Recent Activity or Common Activity from the GSuite Saved Query Knowledge Document, or use the GDrive External Share Query shown below for a more tailored look.</em></p><ol><li><p><em>Leverage <a href="https://selecty.ai/">Selecty</a> to build or refine queries quickly. Iterate as needed to dig deeper into file access, sharing patterns, or privilege escalation.</em></p></li></ol></li><li><p><em>Start forming hypotheses based on the user&#8217;s activity and context. Begin forming a narrative.</em></p><ol><li><p><em>Was this accidental? Intentional? A pattern? You don&#8217;t need to prove it yet, but mentally sketch an outline.</em></p></li></ol></li></ol><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9Uuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe85cca-1fc6-4c7e-b6a1-006dfba0c7cc_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Selecty is a database-agnostic, sidecar query assistant</strong> - built to integrate seamlessly into your workflow without dulling your edge. Generate smart, contextual queries, optimize them to your use case, break them down into plain English, and debug faster than ever - all in one sleek interface. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://selecty.ai/&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://selecty.ai/"><span>Learn More</span></a></p><div><hr></div><h3>Triage</h3><p>Once your initial investigation is complete, it&#8217;s time to triage the alert - decide what action, if any, should be taken.</p><p>The goal here is to help analysts move from &#8220;What&#8217;s happening?&#8221; to &#8220;What should we do about it?&#8221; based on common outcomes. Provide clear guidance based on potential investigative findings.</p><p><strong>Triage</strong></p><ol><li><p><em>If files don&#8217;t appear sensitive &amp; no malicious activity is detected:</em></p><ol><li><p><em>Follow up with the user. Ask why they&#8217;re sharing files externally.</em></p></li><li><p><em>Educate over enforce. Many users share files with themselves for convenience or to move data between personal and work devices.</em></p></li><li><p><em>Remind them of the risks and reinforce that intermingling work and personal data is against policy - even if intentions are harmless.</em></p></li><li><p><em>If the user says they&#8217;re using personal software to improve their workflow, remind them that only approved tools are allowed for security reasons. Encourage them to submit a request if they believe a tool should be reviewed.</em></p></li></ol></li><li><p><em>If files appear sensitive or potentially malicious:</em></p><ol><li><p><em>Escalate to the Security and IT teams. This includes documents like customer lists, IP, legal agreements, etc.</em></p></li><li><p><em>Context matters. Some users may share personal accounts for malicious reasons, but others may be confused or misinformed.</em></p></li><li><p><em>Gauge the user&#8217;s intent and context before jumping to conclusions.</em></p></li><li><p><em>Assess for Insider Threat indicators. Reach out to the manager in a shared DM (with Security team) to keep communication private but visible. Look for red flags:</em></p><ol><li><p><em>Are they leaving the company?</em></p></li><li><p><em>Are they launching a competing business?</em></p></li><li><p><em>Have they expressed dissatisfaction or disengagement?</em></p></li></ol></li><li><p><em>If malicious intent is suspected:</em></p><ol><li><p><em>Don&#8217;t tip them off. Continue monitoring their activity quietly to collect more evidence.</em></p></li><li><p><em>Coordinate internally and prepare contingency plans.</em></p></li><li><p><em>If risky behavior continues, escalate further. Get security leadership approval and work with IT to disable access and secure data.</em></p></li></ol></li></ol></li></ol><h3>Queries and Links</h3><p>This section is meant to make both Investigation and Triage as seamless as possible.</p><p>While hyperlinks should be embedded throughout your Playbook, this is your central hub that brings everything together. It&#8217;s okay (and encouraged) to repeat hyperlinks that appear earlier in the document. That way, readers know they can simply scroll here when they&#8217;re in a hurry.</p><p>Include direct links to dashboards, saved queries, detections, and related documentation that your team relies on.</p><p><strong>Queries and Links</strong></p><p><em>Use the GSuite Saved Queries document to find your general saved queries to investigate the log source.</em></p><p><em>Dashboards:</em></p><ul><li><p><em>Investigate User Dashboard: Get a holistic view of the user&#8217;s recent activity across services.</em></p></li><li><p><em>GDrive External Share Dashboard: Focused view of all files shared externally from Google Drive.</em></p></li><li><p><em>IP Investigation Dashboard: Helps identify suspicious or rare IP activity associated with the user.</em></p></li></ul><p><em>GDrive External Share Query</em></p><ul><li><p><em>Use this query to identify which files the user shared externally, including the target email addresses. Replace insert_email_address with the address of the user under investigation.</em></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hM5y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hM5y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 424w, https://substackcdn.com/image/fetch/$s_!hM5y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 848w, https://substackcdn.com/image/fetch/$s_!hM5y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!hM5y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hM5y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png" width="666" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:666,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hM5y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 424w, https://substackcdn.com/image/fetch/$s_!hM5y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 848w, https://substackcdn.com/image/fetch/$s_!hM5y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!hM5y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7686bca-0222-4b9b-af63-a3c3f49e57b0_666x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Escalation and Response</h3><p>This section outlines the recommended actions based on possible outcomes from your Investigation and Triage steps.</p><p>Each case below is framed to guide the analyst in deciding whether to close out the alert, take educational action, or escalate further</p><p><strong>Escalation &amp; Response</strong></p><ol><li><p><em>False Positive</em></p><ol><li><p><em>Indicators</em></p><ol><li><p><em>No sensitive files shared.</em></p></li><li><p><em>Target email appears benign.</em></p></li></ol></li><li><p><em>Actions</em></p><ol><li><p><em>Reach out to the user with a reminder about the risks of transferring files between personal and work devices.</em></p></li><li><p><em>Use an educational tone - highlight security concerns rather than applying blame.</em></p></li></ol></li></ol></li><li><p><em>Confirmed Activity</em></p><ol><li><p><em>Indicators</em></p><ol><li><p><em>File shared with a customer who lacks a custom domain.</em></p></li><li><p><em>File content is not sensitive, or applies to the customer.</em></p></li></ol></li><li><p><em>Actions</em></p><ol><li><p><em>Confirm the customer relationship with the user and/or team.</em></p></li><li><p><em>Document the outcome and details in the ticketing system for future reference.</em></p></li></ol></li></ol></li><li><p><em>True Positive (Benign)</em></p><ol><li><p><em>Indicators</em></p><ol><li><p><em>Files shared with the user&#8217;s personal email.</em></p></li><li><p><em>Files are not sensitive, but this violates policy.</em></p></li></ol></li><li><p><em>Actions</em></p><ol><li><p><em>Educate the user about company policy and risks.</em></p></li><li><p><em>If a pattern emerges or the user is noncompliant, escalate to their manager for reinforcement.</em></p></li></ol></li></ol></li><li><p><em>True Positive (Malicious)</em></p><ol><li><p><em>Indicators</em></p><ol><li><p><em>Files contain sensitive company data.</em></p></li><li><p><em>Shared with a personal or suspicious external email.</em></p></li></ol></li><li><p><em>Action</em></p><ol><li><p><em>Escalate to the Security team immediately.</em></p></li><li><p><em>Consider insider threat potential; do not alert the user.</em></p></li><li><p><em>Involve the manager discreetly if additional context is needed.</em></p></li><li><p><em>Coordinate with IT for user access restrictions if malicious intent is confirmed.</em></p></li></ol></li></ol></li></ol><h3>Version Control and Tags</h3><p>Maintaining version history and tagging is essential for Playbook lifecycle management. Whether you&#8217;re using GitHub, Confluence, or another platform, make sure every update is recorded and traceable.</p><p><strong>Version and Tags</strong></p><p><em>v1.0</em></p><p><em>Created: 6/17/25</em></p><p><em>Updated: 6/17/25</em></p><p><em>Tags: GSuite, T1537, T1020, T1087.004, T1071.001</em></p><div><hr></div><p>&#128172; <strong>Tell me about a time when you were </strong><em><strong>really</strong></em><strong> glad your team had a playbook in place. What happened, and how did it help you in that moment?</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/the-playbook-for-playbooks/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberseccafe.com/p/the-playbook-for-playbooks/comments"><span>Leave a comment</span></a></p><div><hr></div><h1>How Playbooks Help Your Security Team</h1><p>There&#8217;s no way around it - Playbooks are essential to any high-functioning security team, and building them is a collective responsibility.</p><p>They don&#8217;t just document what to do - they preserve critical knowledge. Whether a team member leaves, a process is rarely used, or you&#8217;re deep in a fast-moving investigation, Playbooks ensure that nothing gets lost and no one is left guessing.</p><p>Playbooks can help you turn chaos into action.</p><p>They allow your team to:</p><ul><li><p>Respond to threats quickly and confidently without reinventing the wheel.</p></li><li><p>Empower junior analysts, new hires, and even non-security collaborators to contribute meaningfully.</p></li><li><p>Maintain consistency and quality as your team grows and scales.</p></li><li><p>Build automation on solid, vetted foundations - turning tribal knowledge into executable workflows.</p></li></ul><p>They&#8217;re more than just internal documentation, Playbooks are operational guardrails. They reduce risk, improve efficiency, and help your team operate without fear of making the wrong move.</p><p>So next time you find yourself doing something more than once - take the time to write the Playbook. Your future self (and your team) will thank you.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p>Just a heads up, The Cybersec Cafe's got a pretty cool weekly cadence.</p><p>Every week, expect to dive into the hacker&#8217;s mindset in our Methodology Walkthroughs or explore Deep Dive articles on various cybersecurity topics.</p><p>. . .</p><p>Oh, and if you want even more content and updates, hop over to Ryan G. Cox on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Can't wait to keep sharing and learning together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Tuning Detections isn’t Hard Unless You Make it Hard]]></title><description><![CDATA[Cybersec Caf&#233; #71 - 06/10/25]]></description><link>https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless</link><guid isPermaLink="false">https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless</guid><dc:creator><![CDATA[Ryan G. Cox]]></dc:creator><pubDate>Tue, 10 Jun 2025 13:02:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!joSr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!joSr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!joSr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!joSr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!joSr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!joSr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!joSr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!joSr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!joSr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!joSr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!joSr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001411be-cb37-4b5f-a39a-b95d5983dd6c_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Detection Engineering is an underappreciated role in cybersecurity.</p><p>Is it the flashiest? The most technical? The most revenue-generating role in tech? Definitely not.</p><p>But it is niche, highly valuable, and a revenue <em>saving</em> role when done well.</p><p>At its core, Detection Engineering is about writing and refining the rules meant to detect threats in your environment. It gives the security team complete and customizable visibility into the tooling deployed across your environment.</p><p>And depending on how many platforms and tools you plan on monitoring, this job can quickly go from manageable to overwhelming.</p><p>Just think about it: You purchase a new application. You onboard the new log source. Your SIEM has no out-of-the-box detections for it. You spend a couple weeks parsing docs while the logs start trickling in. You write some detections to start gaining coverage, just to have low confidence they&#8217;re valuable. And then&#8230;</p><p><strong>Boom</strong>. Your team gets flooded with alerts. All false positives. All adding noise to an already overwhelmed SOC. Now your team is frustrated and you&#8217;re starting to feel the pressure.</p><p>This is where tuning becomes critical.</p><p>It&#8217;s unrealistic to expect your first iteration of a detection to be perfect. Sometimes there&#8217;s just not enough context or data upfront to have high confidence from the start.</p><p>The goal is simple: We want detections that identify real, meaningful threats - not rules that drown your feed with noise.</p><p>Here&#8217;s how to tune your detection suite at scale with clarity and confidence.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5cSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5cSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!5cSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e8449cb-e037-44a8-b7b3-a122e373b179_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get a Filterable Database of All Cybersec Caf&#233; Content, Instant Access to All Resources Released in the Publication, and more&#8230; for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Detection Tuning</h1><p>In order to build a process that scales, you first need to understand the most common ways to improve your detections.</p><p>These aren&#8217;t one-and-done tasks. Tuning is iterative. You&#8217;ll often need to apply multiple techniques in combination to tailor a detection to the unique characteristics of your own environment.</p><h3>Logic Adjustments</h3><p>Logic adjustments are the bread and butter of detection tuning. They come into play when your detection isn&#8217;t quite aligned with the real-world behavior it&#8217;s meant to catch.</p><p>Sometimes, the logic may not include all the relevant events, misinterpret key:value relationships, or rely on a flawed understanding of the raw data.</p><p>Whatever the case, don&#8217;t sweat it - this is completely normal.</p><p>Detections aren&#8217;t always going to be straightforward, and they&#8217;re rarely perfect on the first try. That can generally be attributed to one of three things:</p><ul><li><p>You&#8217;re still figuring out the threat behavior, so you widen the scope to better understand what the signal actually looks like.</p></li><li><p>You&#8217;re playing it safe, so you expand the logic to reduce the chance of false negatives - even if it means more noise at first.</p></li><li><p>You&#8217;re waiting on data since the logs haven&#8217;t rolled in quite yet, so you&#8217;re guessing at the structure of the log.</p></li></ul><p>While each of these cases are different, they share one similarity: uncertainty.</p><p>But as a detection engineer, you can&#8217;t let perfection delay progress. Start broad, get something in place, and refine as you learn more. That&#8217;s how a top-tier detection suite is built.</p><h3>Exceptions</h3><p>Exceptions let you preserve your detection logic while suppressing known and expected behavior from surfacing as alerts.</p><p>Once an exception is in place, any alert that matches it won&#8217;t trigger - saving your team from digging through noise you&#8217;ve already deemed as benign.</p><p>They&#8217;re especially useful for:</p><ul><li><p>Known service account activity</p></li><li><p>Trusted IP addresses</p></li><li><p>Confirmed user travel</p></li><li><p>Regular and verified actions by internal teams</p></li></ul><p>Extra points if you combine multiple fields (e.g. IP + user + process) into a single exception to increase fidelity.</p><p>But a word of caution: don&#8217;t implement exceptions until you&#8217;ve confirmed the activity is <em>always </em>a false positive both with relevant stakeholders and historical data.</p><p>It only takes one measly edge case to turn a well-meaning exception into a dangerous blind spot.</p><h3>Threshold &amp; Rolling Windows</h3><p>Thresholds and Rolling Windows wor hand-in-hand to fine-tune the &#8220;when&#8221; behind a detection.</p><ul><li><p>A threshold is the number of times an event needs to happen.</p></li><li><p>A rolling window defines how quickly it needs to happen to be considered suspicious.</p></li></ul><p>Let&#8217;s break that down with an example.</p><p>Say you&#8217;re building a brute-force detection. You wouldn't want to alert if someone fails a log in 10 times over a week. But 10 failed attempts in 10 minutes? That&#8217;s probably worth flagging.</p><p>So, you set a threshold of 10 over a rolling window of 10 minutes.</p><p>But what if a system already locks accounts after 5 failed attempts in a 10-minute span?</p><p>Well, in that case, your detection wouldn&#8217;t fire unless you lower your threshold or extend the rolling window (and at this point, you may even go back to the drawing board with the design of this detection as a whole).</p><p>In many cases, your threshold might just be 1 if the activity is rare or highly privileged enough to be suspicious on its own. But for other detections, you may need to experiment, monitor performance, and adjust over time as you learn what &#8220;normal&#8221; looks like.</p><p>However, you may not truly know what is needed until a detection has been in production for some time.</p><h3>Correlations</h3><p>Sometimes a detection seems logically sound, but then it hits production and you realize it&#8217;s not producing the value you expected.</p><p>That&#8217;s when it might be time to start thinking about correlations.</p><p>Correlation detections help you connect multiple lower-fidelity signals into a higher-fidelity alert. You can link different detections within a rolling window to pick up signals that would generally go unnoticed unless being performed in succession.</p><p>At first, use cases for correlation detections might not jump out at you. But over time, especially once detections are live, patterns will start to emerge.</p><p>And one of the strongest use cases? Insider threat detection.</p><p>Let&#8217;s say you have a rule watching for large columns of files shared externally. A savvy insider might stay just under the threshold to avoid triggering an alert. But what if that same user also modified admin configurations or deleted artifacts around the same time?</p><p>Each activity in isolation may seem benign, but together? It may just be suspicious.</p><p>These detections are much more complex than traditional rules, but they&#8217;re a powerful tuning strategy when a single log line just isn&#8217;t enough to tell the full story.</p><h3>Alert Context</h3><p>If a detection fires and no one knows what to do with it, was it even valuable?</p><p>As a Detection Engineer, one of your top priorities is to make alerts actionable. Analysts should be able to understand what happened and why it matters within seconds, and be able to investigate further with just a few clicks.</p><p>While how alerts are delivered will vary from SIEM to SIEM, the essence remains the same. Here&#8217;s how to elevate your alert contexts:</p><ul><li><p><strong>Write Clear, Verbose Titles</strong>: The title should be tailored specifically to the alert that just fired and what artifacts are involved;</p><ul><li><p><em>Bad Title</em>: A user CRUD action occurred in the platform</p></li><li><p><em>Good Title</em>: User <a href="mailto:first.last@website.com">first.last@website.com</a> deleted an API Key in Sensitive Application via CLI</p></li></ul></li><li><p><strong>Include Key Artifacts</strong>: Deliver the most important details right in the alert body, ideally as readable JSON or a structured output. Include fields like:</p><ul><li><p>IP Addresses</p></li><li><p>Network/Location Data</p></li><li><p>Actor identity</p></li><li><p>Target resources or users</p></li><li><p>Behavioral indicators</p></li></ul></li><li><p><strong>Provide Tailored Playbooks</strong>: Every alert should have relevant, up-to-date playbooks including response steps specific to the detection, escalation paths, and links to relevant documentation or dashboards.</p></li></ul><p>Your ultimate goal is this: analysts should be able to triage and act on a detection with minimal guesswork and uncertainty. If alerts are consistently taking 5+ minutes to triage, they can likely be improved.</p><h3>Severity Adjustments</h3><p>Tuning isn&#8217;t just about logic or exceptions, it&#8217;s also about making sure your severity reflects reality.</p><p>Adjusting detection severity up or down is a normal part of the process. It&#8217;s also just as common to add dynamic severity logic based on key:value pairs as you start to gain more environmental context.</p><p>Maybe a detection didn&#8217;t end up being the strong Indicator of Compromise you thought it would be, or maybe you&#8217;ve added exceptions or correlations that raise your confidence. Either way, regular severity audits are a must.</p><p>And here&#8217;s the golden rule: Reserve critical severity for alerts with high confidence and high potential for malicious activity. If everything is critical, then nothing is.</p><p>Get in the habit of tuning severity as part of your detection maturation process. It&#8217;s not just about catching threats, it&#8217;s about helping your team easily prioritize the right ones.</p><div><hr></div><h3><em><strong>- Today&#8217;s Sponsor -</strong></em></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rbfK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png" width="1000" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rbfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 424w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 848w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1272w, https://substackcdn.com/image/fetch/$s_!rbfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c4a699-bdad-4af5-938e-41dd8da7d6e4_1000x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Prepare for a career in Cybersecurity, </strong><em><strong>one sip</strong></em><strong> at a time with The Security Sip.</strong> With rapidly evolving threats and technologies, many struggle to gain the right skills and experience to break into the cybersecurity industry. This course is designed to transform beginners into industry-ready professionals over 12 sections, 85 modules, and 155 exercises. <strong>Check it out!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securitysip.cyberseccafe.com/&quot;,&quot;text&quot;:&quot;Learn more&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securitysip.cyberseccafe.com/"><span>Learn more</span></a></p><div><hr></div><h1>An Iterative Detection Lifecycle</h1><p>I&#8217;ve said it before and I&#8217;ll say it again: Detection Engineering is an iterative process and your team needs to treat it that way.</p><p>You&#8217;re not going to get detections perfect the first time, every time. Maybe not even the second or third. But that&#8217;s okay.</p><p>Just like software development has its lifecycle, so should your detection engineering process. You need to build this into your team&#8217;s operating procedures - regularly reviewing what&#8217;s working, what&#8217;s not, and where improvements are needed.</p><p>A scalable detection lifecycle should include three types of reviews:</p><ol><li><p><strong>Regular Reviews</strong>: Set a cadence, monthly or quarterly, to review your detection suite as a team. These reviews are your chance to flag underperforming, noisy, or outdated detections that may have gone unnoticed.</p></li><li><p><strong>Ad-Hoc Reviews</strong>: Tuning can&#8217;t always wait. You need a fast lane for real-time feedback, whether it&#8217;s from your SOC analysts drowning in false positives or engineers spotting a logic mistake. Build a simple process for submitting requests, implementing changes, and peer reviewing.</p></li><li><p><strong>New Detection Reviews</strong>: Every new detection should have a follow-up baked into the process. A week or two after the push to production, circle back and look at the alerts it&#8217;s generating, assess its performance, and adjust as needed. Don&#8217;t set it and forget it.</p></li></ol><p>Take the time to formalize your detection lifecycle. Align on timelines, responsibilities, and escalation paths. Most importantly, get buy-in across the team.</p><p>If you want a detection suite that scales, you need a process that supports it.</p><h1>Prioritization</h1><p>Now, I know what you&#8217;re thinking: &#8220;But Ryan, how do I know which detections actually need tuning?&#8221;</p><p>Here&#8217;s how I approach it:</p><ol><li><p><strong>Look for High-Volume Detections</strong>: If a detection is firing at a higher frequency than the rest of your suite, it&#8217;s a prime candidate for tuning. High-volume alerts are often the low-hanging fruit, especially early after rolling out your SIEM. In most cases, they&#8217;re triggered by common, legitimate user behavior that just hasn&#8217;t been refined for your environment yet. Over time, these should become less obvious if you&#8217;re tuning effectively.</p></li><li><p><strong>High False Positive Rate</strong>: If you&#8217;re constantly marking a detection as false positive, something&#8217;s off. Check your logic, maybe it&#8217;s too loose. Or maybe it&#8217;s time to add an exception for a known, safe activity. High false positive counts waste time and erode the quality of your detection suite.</p></li><li><p><strong>Low True Positive Rate</strong>: This is the next level of detection maturity. Let&#8217;s say you&#8217;ve got two detections: one has 1 true positive for every 10 false positives, and the other has 1 true positive for every 2 false positives. We&#8217;d want to turn our attention to the first detection even if the latter is higher volume overall, and rethink what constitutes a true vs. false positive for this specific use case.</p></li><li><p><strong>High Time to Remediation</strong>: If a specific alert is consistently taking longer to triage, that&#8217;s a red flag. It may be a sign the detection isn&#8217;t actionable, lacks context, or the playbook is weak. While an underdeveloped SOAR might be part of the issue, slow Mean-time-to-remediation often points to alerts that aren&#8217;t clear or concise enough. Revisit your alert contexts and supporting artifacts.</p></li><li><p><strong>Ad-Hoc Tuning Requests</strong>: As mentioned earlier, you need a fast feedback loop from your team triaging alerts on the front lines. While their input might be anecdotal, it can often be the most practical signal for tuning. Build a channel to intake requests, require evidence to be submitted in the form, and watch your detection fidelity slowly form itself to your environment.</p></li></ol><p>Prioritization will always depend on your team&#8217;s maturity, but if you&#8217;re unsure where to start - this is your playbook.</p><div><hr></div><p>&#128172; <strong>How do you ensure your team adheres to an iterative detection lifecyle? I&#8217;d love to here your leadership and operational tips below!</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless/comments"><span>Leave a comment</span></a></p><div><hr></div><h1>Don&#8217;t Overthink It, Just Do It</h1><p>At the end of the day, tuning your detection suite comes down to understanding your environment and building processes that scale.</p><p>Without frameworks in place to support iteration, it&#8217;s easy for the day-to-day grind to overshadow the long-term fidelity of your detections. But if you want a detection program that actually works, one that analysts trust and that surfaces real threats, you need to make tuning part of the culture.</p><p>Take pride in your detections. The rules you write aren&#8217;t set-and-forget, they&#8217;re living pieces of your defensive strategy. And like anything you care about, they deserve routine attention.</p><p>You wouldn&#8217;t go too long without a car tune-up, so don&#8217;t let your detection engine go untouched either.</p><div><hr></div><p>Securely Yours,</p><p>Ryan G. Cox</p><div><hr></div><p><em>P.S. The Cybersec Cafe follows a weekly cadence.</em></p><p>Each week, I deliver a Deep Dive on a cybersecurity topic designed to sharpen your perspective, strengthen your technical edge, and support your growth as a professional - straight to your inbox.</p><p>. . .</p><p>For more insights and updates between issues, you can always find me on <a href="https://twitter.com/ryangcox_">Twitter/X</a> or my <a href="https://www.ryangcox.com/">Website</a>. Let&#8217;s keep learning, sharing, and leveling up together.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberseccafe.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Receive posts directly to your inbox by becoming a free subscriber, or support the publication by choosing one of our paid subscriptions.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>