Probably once a week, I see posts like this in the r/Ubiquiti subreddit. Ubiquiti makes network gear that includes an "IDS/IPS" feature. I own some older Ubiquiti gear so I am familiar with the p...
https://taosecurity.blogspot.com/2024/10/what-are-normal-users-supposed-to-do.html
On this day in 2004, Addison-Wesley/Pearson published my first book, The Tao of Network Security Monitoring: Beyond Intrusion Detection . This post from 2017 explains the differences betwee...
https://taosecurity.blogspot.com/2024/07/my-first-book-is-20-years-old-today.html
When I was a sophomore in high school, from 1987 to 1988, my friend Paul and I had Commodore C64 computers. There was a new graphical user interface called GEOS that had transformed the way w...
https://taosecurity.blogspot.com/2024/05/retrieving-deleted-files-on-commodore.html
In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book TCP/IP Illustrated, Volume 1: The Protocols by W. Richard Stevens. About a year later I exchanged email...
https://taosecurity.blogspot.com/2023/06/my-last-email-with-w-richard-stevens.html
This is unusual. I found this "skills and interest radar" diagram I created in July 2005. It looks like my attempt to capture and prioritize technical interests. At the time I was about to st...
https://taosecurity.blogspot.com/2023/06/bejtlich-skills-and-interest-radar-from.html
I wrote this on 7 December 2018 but never published it until today. The following are the "key network questions" which "would answer many key questions about network, without having to ...
https://taosecurity.blogspot.com/2023/06/key-network-questions.html
Cybersecurity is a social and policy problem, not a scientific or technical problem. Cybersecurity is also a wicked problem. In a landmark 1973 article, Dilemmas in a General Theory of Planni...
https://taosecurity.blogspot.com/2023/06/cybersecurity-is-social-policy-and.html
I want to make a note of the numbers of words and pages in my core security writings. The Tao of Network Security Monitoring / 236k words / 833 pages Extrusion Detection / 113k words / 417...
https://taosecurity.blogspot.com/2023/06/core-writing-word-and-page-counts.html
Happy 20th birthday TaoSecurity Blog , born on 8 January 2003 . THANK YOU BLOGGER Blogger (now part of Google) has continuously hosted this blog for 20 years, for free. I'd like to than...
https://taosecurity.blogspot.com/2023/01/happy-20th-birthday-taosecurity-blog.html
I'm running a #BlackFriday #CyberMonday sale on my four newest #Kindle format books. Volumes 1-4 of The Best of TaoSecurity Blog will be half off starting 9 pm PT Tuesday 22 Nov and endin...
https://taosecurity.blogspot.com/2022/11/best-of-taosecurity-blog-kindle-edition.html
I am now using Mastodon as a replacement for the blue bird. This is my attempt to verify myself via my blog. I am no longer posting to my old bird account. Copyright 2003-2020 Richard Bejt...
https://taosecurity.blogspot.com/2022/11/taosecurity-on-mastodon.html
Over the weekend I organized some old computing equipment. I found this beauty in one of my boxes. It's a Netgear EN104TP hub . I've mentioned this device before, in this blog and my books...
https://taosecurity.blogspot.com/2022/08/the-humble-hub.html
This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project . Each video addresses a topic that I think might be o...
https://taosecurity.blogspot.com/2021/07/zeek-in-action-videos.html
I've completed the TaoSecurity Blog book series . The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship . It's available...
https://taosecurity.blogspot.com/2021/04/new-book-best-of-taosecurity-blog.html
What are the origins of the names TaoSecurity and the unit formerly known as TAO? INTRODUCTION I've been reading Nicole Perlroth's new book This Is How They Tell Me the World Ends . ...
https://taosecurity.blogspot.com/2021/04/the-origins-of-names-taosecurity-and.html
PROPOSITION Digital offense capabilities are currently net negative for the security ecosystem. The costs of improved digital offense currently outweigh the benefits. The legitimate benefi...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html
INTRODUCTION I published a new book! The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog ser...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html
There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the SECURITY 1% or #securityonepercent on Twitter. This is ...
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html
Just what are "tactics"? INTRODUCTION MITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I ...
https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html
I was so pleased to read this Tweet yesterday from Greg Rattray: "BACK IN 2007, I COINED THE TERM “ADVANCED PERSISTENT THREAT” TO CHARACTERIZE EMERGING ADVERSARIES THAT WE NEEDED T...
https://taosecurity.blogspot.com/2020/10/greg-rattray-invented-term-advanced.html
The FBI intrusion notification program is one of the most important developments in cyber security during the last 15 years. This program achieved mainstream recognition on 24 March 2014 when...
https://taosecurity.blogspot.com/2020/09/the-fbi-intrusion-notification-program.html
I published a new book! The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent Threat It's in the Kindle...
https://taosecurity.blogspot.com/2020/09/new-book-best-of-taosecurity-blog.html
Are you a network security monitoring dinosaur like me? Do you prefer to inspect your Zeek logs using the command line instead of a Web-based SIEM? If yes, try this ONE WEIRD TRICK! I store my...
https://taosecurity.blogspot.com/2020/08/one-weird-trick-for-reviewing-zeek-logs.html
Fake Book Someone published a "book" on Amazon and claimed that I wrote it! I had NOTHING to do with this. I am working with Amazon now to remove it, or at least remove my name. Stay away ...
https://taosecurity.blogspot.com/2020/07/i-did-not-write-this-book.html
I'm very pleased to announce that I've published a new book! It's The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice . It's available now in the...
https://taosecurity.blogspot.com/2020/05/new-book-best-of-taosecurity-blog.html