-
Configuring a hierarchy of IoT Edge Devices at Home Part 1 – Configuring the IT Proxy
To provide support for the hierarchical Azure IoT Edge scenarios we started working on a connected registry implementation that will allow extension of the Azure container registry functionality to on-premises. For those of you who are not familiar with what a hierarchical IoT Edge scenario is, take a look at the Purdue network model used […]
-
Embed the Origin Dockerfiles into Your Docker Container Images Using Labels
With the recent Solorigate incident, a lot of emphasis is put on determining the origin of the software running in an enterprise. For Docker container images, this will mean to embed in the image the Dockerfile the image was built from. However, tracking down the software origin is not so trivial to do. For closed-source […]
-
Learn More About Your Home Network with Elastic SIEM – Part 2: Collect Firewall Logs
In my previous post, Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM, I explained how you could set up Elastic SIEM on a Raspberry Pi[ad]. The next thing you would want to do is to collect the logs from your firewall and analyze them. Before I jump […]
-
Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM
Last night I had some free time to play with my network, and I ran tcpdump out of curiosity. For a while, I’ve been interested to analyze what traffic is going through my home network, and the result of my test pushed me to get to work. I have a bunch of Raspberry Pi devices […]
-
Implementing Cybersecurity Research Sandbox Environment in the Cloud
For a while, I’ve been planning to build a cybersecurity research environment in the cloud that I can use to experiment with and research malicious cyber activities. Well, yesterday I received the following message on my cell phone: Hello mate, your FEDEX package with tracking code GB-6412-GH83 is waiting for you to set delivery preferences: […]