Wednesday, July 1, 2015

Setting Up Your Playground

This post is not strictly information security related, but it will help set the foundation for exploration going forward.  In addition to being passionate about information security, I am also passionate about systems architecture and figuring out how to put the pieces together to come up with a solution.

The question I needed an answer to was:

How should I set up my home lab?


New Blog, First Post

Hey everyone!  The purpose of this blog is to share experience and opinion about various topics in Information Security.  In my opinion, information security spans a number of different of topics and reaches from the depths of the datacenter to the keyboard in front of the user and beyond.  I believe that it is important that everyone with a stake in the security of information systems be aware of the threats facing systems and what mitigations are available.

Why Attack Zero?

Attack Zero is a play on the idea of "patient zero," or the first case of a condition, illness, or syndrome.  In incident response (one of the many aspects of information security), one of the goals of an investigation is to find the origin of an attack.  We will explore attacks on systems, the tools used to perpetrate those attack, as well as the philosophy of the attack.

I hope that this blog will be a vehicle for healthy discussion.  I do not pretend to have all of the answers, but I have a passion for learning and sharing knowledge. If you have any feedback, feel free to comment on a post.