Mindblown: a blog about philosophy.

  • InfoSec Playbook

    As Aesop says, “Good things come in small packages” and this week’s post we’ll label as a small package. The book I finished this week is called “Crafting the InfoSec Playbook”, which is written for those looking to improve their SOC or incident response (IR) teams. This book does a good job laying out all…

  • Structuring Chaos – Applied NSM

    In the world of cybersecurity, the process of monitoring a network is daunting and when you’re new to this field it can get overwhelming quickly. The reason for this immediate overwhelm is due to all the different tools and terminology thrown around by more experienced cybergeeks. A way to speed up the learning process and…

  • Bread Crumbs (IOCs)

    In the realm of cyber, there are two main ways of detecting an evildoer, which is either through a signature or an anomaly. These two ways of detecting are topics we’ll dive deeper into in the future, but for now, all you need to know is that both detection methods use a thing called “Indicators…

  • Passive Security (NSM)

    The process of defending a network can be overwhelmingly complicated for any newcomer into the realm of cybersecurity. This process can include many tools, data types, and specific steps. There are two main approaches to tackling a complex topic…  Both approaches have their place, but this time we’re going to aim before we fire (e.g.…

  • Sniffing the Internet

    All of our digital activity like messaging friends via FB, watching Netflix, sending emails, or uploading our precious cat photos to Instagram is just the tip of what’s happening. Beneath these surface-level interactions is an entire world of activity where machines are talking constantly, ensuring we humans can easily do what humans do… watch Netflix… …

  • 30 Day Writing Challenge

    30-Day Writing Challenge Day 1 – Changing Opinions Day 2 – Paper Therapy Day 3 – Pessimistic Futures Day 4 – Doing more with less Day 5 – A Joker’s Life Day 6 – Interconnected Day 7 – Listening Day 8 – Writing Day 9 – Reading Day 10 – Ideas Day 11 – Wisdom…

  • 30-Day Cyber Snack Series

    30-Day Cyber Snack Series Day 1 – Cyber Snacks Day 2 – Cyber Snacks Day 3 – Cyber Snacks Day 4 – Cyber Snacks Day 5 – Cyber Snacks Day 6 – Cyber Snacks Day 7 – Cyber Snacks Day 8 – Cyber Snacks Day 9 – Cyber Snacks Day 10 – Cyber Snacks Day…

  • Zero to Zero – Linux Basics

    Nope, the title isn’t a typo. Too many people are afraid of omitting ignorance in a topic, especially when it’s in an area, we’re interested in making a career out of it, but that’s your ego talking. Once you give your ego complete control you’re bound to a life of intellectual, emotional, physical, and spiritual…

  • Accelerated Learning

    I’m a bit delayed, I know… It’s been a week since I’ve published a TRLT post, but I have a good reason.  About 2 weeks ago I decided to dive into the world of cybersecurity, but I wanted to go deeper than usual wandering for this TRLT journey. Instead of just researching the industry I…

  • Temporary – D30

    Temporary – Day 30 30-Day Writing Challenge Alright, my people, this is day 30 and we’re wrapping this writing series up with a bang!  Everything you’ve ever known and ever will know will disappear, no one will remember you or what you’ve done. Everything we create such as companies, technology, ideas, stories, etc. is all…

Got any book recommendations?