Security

Phone Proxy

This will be a story about what I and a dear friend of mine are doing to keep our phone usage a little more private. I must admit he is faster at this, but I will try to weigh all the options before I go all in.

Suckless project management

It is with great sadness that I announce that I am back. This time, I would like to take a moment to talk about a topic I only recently realized is not talked about enough: Project management in penetration testing and the approach some companies take.

Back to pentest fumblings!

I’m back, baby! I fell back into the old lines. It took a few months, but I went from “Okay, I’ll go into the blue team for some more calm and a stable work environment” to “Well, since the pentests are already there, mind if I snatch one up?” This is my comfort zone. This is my happy place. After all that happened in the last 3 months, it’s good.

Two certs in one week? Doable!

In this post, I will try to review, compare, and contrast two cybersecurity certificates I had the pleasure of passing in the same week: Certified Ethical Hacker v12 and BTL1 from Security Blue Team, which one I would pick if it hadn’t been paid for by my employer, and general tips on how to succeed.

SOC Jitsu - Preparing for day one

Well, T-$(several days) until I start my new job. I am having some doubts about my skillset, and in this post I will try to describe my doubts, the way I intend to tackle them, and maybe a way to boost anyone’s self confidence who is trying to jump from red to blue or vice versa.

Bez práce nejsou koláče (ale kurzy ano!)

NOTE: Sorry for all you English-speakers, this one is mostly meant for the Czech audience. I will be posting a more general post on the same topic soon. In the meantime, Google translate is usable, but there will be terminology that will not fit your situation or legislature. Be advised.