C. J. May

C. J. May

Information security professional and passionate programmer with broad interests encompassing many areas of IT.

4 posts
Website
Detection Engineering: A Case Study

Detection Engineering: A Case Study

In this blog post, we will explore the intricate world of detection engineering. We’ll start by examining the inputs and outputs of detection engineering, and then we’ll illustrate the detection engineering lifecycle.

How to Handle Secrets in Configuration Management Tools

How to Handle Secrets in Configuration Management Tools

Configuration management tools like Ansible, Chef, and Puppet offer various methods for handling secrets, each with inherent trade-offs. The article explores these approaches alongside modern OIDC-based solutions that enable short-lived authentication tokens for automated processes.

Securing Containers with Seccomp

Securing Containers with Seccomp

In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF.

arrow-down