Understanding Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is the post-security answer to traditional antivirus and response tools. EDR is the evolution and successor to traditional antivirus, anti-malware, anti-ransomware and similar solutions. It helps make the move from worrying about the origin or type of threat and worrying about what it can do to you economically. Hacking isn’t motivated by damage or exploration as much, it’s motivated by capitalistic gains.… Read the rest

How to Learn About Front-End Development

The front-end web development stack is made up of a number of tools that help you build the front-end of your application. This is what your end users see and interact with, and what they’ll (more often than not) judge you the harshest on. We’ll look at what (some of) these tools are, how they work together, and what you can expect to need as a front-end developer.… Read the rest

The Easiest Guide to Installing and Managing the Windows Subsystem for Linux (WSL)

The Windows Subsystem for Linux (WSL) is a powerful addition to Windows 10 and Windows 11. It allows you to run a full Linux distribution without the hassle of a traditional VM setup. For a lot of development tasks, it’s (almost) as good as running on bare metal.

There are two versions of WSL, there’s WSL 1 which is the classic mode most people are used to, and WSL 2 which offers a host of advancements but is more in line with traditional virtualization without the same shortcomings (it leverages Hyper-V and a full Linux kernel).… Read the rest

Next Generation SIEM for Security

SIEM stands for Security Information and Event Management and is a platform which collects and collates data in a central repository from multiple sources, devices, etc. A SIEM platform is going to collect some combination of system logs (e.g. Windows event logs, Linux logs, etc.), application or service logs (e.g. SQL, ERP solutions, etc.), networking equipment (firewalls, smart switches, etc.), security solution logs (e.g.… Read the rest

What Is Post-Security and How Does It Impact You?

Post-security is an abstract concept which refers to the move from traditional preventative security to meta-security and security as a strategy. The move takes you from focusing on just preventing an attack to the attack, the fallout, the purpose of an attack, and everything in between. You focus on the game rather than the individual moves in the game. How the opponent plays, or even might play, affects how you perform as well.… Read the rest

The Simple Guide to Porting C# Code for RestSharp Next v107 and Beyond

RestSharp made huge changes with the release of v107. It’s a major upgrade, which contains some breaking changes. For instance, most of the interfaces are now gone. For me, it meant all of our legacy API connection code broke without substantial rework if anyone updated NuGet packages in a project.

Personally, I feel there’s a bit of a versioning issue here which is solving and creating technical debt all at the same time.… Read the rest