Ju Flexibility
In cybersecurity, rigidity breaks. Like water, we adapt to threats, flowing around attacks to neutralize adversaries.
$ adapt --to-threat && overcome
In cybersecurity, rigidity breaks. Like water, we adapt to threats, flowing around attacks to neutralize adversaries.
$ adapt --to-threat && overcome
Security is not a destination but a continuous journey of vigilance, learning, and improvement.
$ while true; do learn && defend; done
The master uses the opponent's force against them. We deploy honeypots and misdirection to frustrate adversaries.
$ deploy honeypot | trap attacker
Maximum efficiency, minimum effort. Automate the mundane. Build interlocking controls that amplify each other.
Mutual welfare and benefit. Share knowledge through open-source tools. Strengthen the ecosystem together.
Open-source security tools for real-world challenges
Stateless TCP honeypot. Co-invented with Tom Liston. Catch attackers without maintaining state.
C / libpcapFast directory comparison for incident response. 5 stars - Linux Pro Magazine.
GitHub CLog Templater with artificial ignorance. Millions of lines per minute. Rapid7 Magnificent 7 nominee.
GitHub CLow-interaction SSH honeypot. See what credentials attackers try.
GitHubLog Pseudo Indexer. Fast indexes for IPs and MACs in text data.
GitHubPacket sniffer generating firewall rules and netflow logs.
GitHubExtract malicious payloads from weaponized PDFs.
GitHubPassive proxy daemon. Sniff web traffic, generate Squid logs.
GitHubPlot threats on Hilbert curves for pattern analysis.
GitHubRegex-less parser. 2.6M lines/minute to pseudo-XML.
GitHubConsolidate IP lists into CIDR blocks.
GitHubBloom filter deduplication for massive datasets.
GitHubLead attackers into controlled environments where every move is logged.
Analyze malicious traffic patterns. Turn their recon into your advantage.
Deploy canaries. Let them think they've won while you watch.
Pin down threats with interlocking controls. No lateral movement.
Apply pressure at every authentication point. Never trust, always verify.
Gradually restrict resources until threats tap out.
Principal Cyber Security Architect | IANS Faculty | CISSP
"The mad ramblings of a cyber security curmudgeon (in training)"
Two decades building and leading information security practices. Focused on innovation, deception, and frustrating adversaries through interlocking controls.
Beyond the 10 domains - the art of building your security program. Creating a "neighborhood watch" environment and involving data owners in security decisions.
View on Amazon
Exploring the intersection of AI and cybersecurity. How artificial intelligence is transforming defense strategies and what security practitioners need to know.
View on Amazon$ ./connect.sh
[*] Establishing secure channel...
[OK] Ready
Via LinkedIn or iamnor.com
Conferences and podcasts
Open source on GitHub