Recommended cyber security and technology related resources
Books
- Building secure & reliable systems at google. A great book at security architecture at scale.
- The phoenix project. If you work in technology, this is a must read. It’s actually a fun novel, which follows a fictitious organisation as they identify and solve many challenges which you may relate to.
- The unicorn project. This is the sequel to the phoenix project. It’s a novel that walks through the technology and organisational issues of a dysfunctional company and how to solve them. Reading this book made me a little bit agitated, i recognised nearly all the problems from working with customers.
- Google site reliability engineering. This book describes how google approaches the task of managing there IT infrastructure. Lots of good lessons.
- A bug hunters Diary. About a security researcher, and how he finds security vulnerabilities.
- The art of exploitation. A book that talks you through deep level exploitation of computer software. A little out of date now, but the techniques still stand true.
Articles
- Cyber Security
- Going deep on a remote exploit in an iOS Wireless driver
- Linux backdoor attempt.
- Write up of Windows DNS Server vulnerability, CVE-2020-1350
- A guide to threat modelling
- Risks of NPM
- Zoom, Security & what not to do
- China’s great cannon
- Truth about serverless security
- The untold story of NotPetya
- Everything you should know about certificates and PKI but are too afraid to ask
- Reverse Engineering AWS Lambda
- What i learned from 3 years of enterprise WiFi at home
- OSQuery accros the Enterprise
- Active directory administration tier model
- Hacking Imgur
- I hacked facebook and found a backdoor
- Zero day market case study
- A git horror story
- System Architecture
- Fake ‘COTS’ (Commercial off the shelf software)
- System design for advanced beginners
- Design Docs at google
- What is SRE?
- Drawing good architecture diagrams
- What is technical debt
- Microservice Ecosystem
- Protecting system administration using PAM
- Organize your monolith
- Service mesh architecture pattern
- Introduction to Json web tokens
- Supplementary
Podcasts
- Security now
- Darknet Diaries. I recommend starting with the 2 part ‘xbox underground’ episodes.
- Risky Business