Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Navigating Career Pivots and Grit with Milo’s Avni Patel Thompson 26:18
Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew
Manage episode 431200214 series 3578563
In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when deploying Velciraptor- an advanced open-source endpoint monitoring, digital forensic and cyber response platform).
We delve into his journey from the military to his current role in deploying and managing advanced cloud infrastructure using docker containers and kubernetes orchestration platforms.
Quotes from Myles:
- "My time in the Army taught me the value of precision and strategy, which I now apply to cybersecurity."
- "Cloud environments offer flexibility, but they also demand a new level of vigilance and control."
- "With containerization, we’re not just deploying applications; we're creating a more secure and manageable environment."
Key takeaways:
Strategic Integration: Integrating automation and cloud technologies can significantly enhance both the efficiency and effectiveness of cybersecurity practices.
- Proactive Security Measures: Shifting from reactive to proactive security strategies is essential for staying ahead of emerging threats.
- Cloud Security Fundamentals: Understanding the fundamentals of containerization and orchestration is crucial for maintaining a secure cloud environment.
- Efficiency Through Automation: Automation not only speeds up response times but also reduces the likelihood of human error in security processes.
- Vigilance in Cloud Environments: While cloud technologies offer numerous benefits, they also introduce new security challenges that require continuous vigilance and adaptation.
- Role of Military Experience: Insights gained from military experience can offer valuable perspectives on discipline, strategy, and precision in cybersecurity practices.
- Future Trends: Keeping up with trends in automation and cloud security will be key to adapting to future cybersecurity challenges.
Links and resources:
Contact Myles
Website: MylesAgnew.com
Github: https://github.com/mylesagnew
ASD threat intel:
https://www.asd.gov.au/about/what-we-do/cyber-security
Tools:
Cuckoo Sandbox- https://github.com/cuckoosandbox
Wordfence - Available in Wordpress plugins
WPS Scan (on Kali Linux) for scanning your own Wordpress site for vulnerabilities
Yara Signator: https://github.com/fxb-cocacoding/yara-signator
19 episodes
Manage episode 431200214 series 3578563
In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when deploying Velciraptor- an advanced open-source endpoint monitoring, digital forensic and cyber response platform).
We delve into his journey from the military to his current role in deploying and managing advanced cloud infrastructure using docker containers and kubernetes orchestration platforms.
Quotes from Myles:
- "My time in the Army taught me the value of precision and strategy, which I now apply to cybersecurity."
- "Cloud environments offer flexibility, but they also demand a new level of vigilance and control."
- "With containerization, we’re not just deploying applications; we're creating a more secure and manageable environment."
Key takeaways:
Strategic Integration: Integrating automation and cloud technologies can significantly enhance both the efficiency and effectiveness of cybersecurity practices.
- Proactive Security Measures: Shifting from reactive to proactive security strategies is essential for staying ahead of emerging threats.
- Cloud Security Fundamentals: Understanding the fundamentals of containerization and orchestration is crucial for maintaining a secure cloud environment.
- Efficiency Through Automation: Automation not only speeds up response times but also reduces the likelihood of human error in security processes.
- Vigilance in Cloud Environments: While cloud technologies offer numerous benefits, they also introduce new security challenges that require continuous vigilance and adaptation.
- Role of Military Experience: Insights gained from military experience can offer valuable perspectives on discipline, strategy, and precision in cybersecurity practices.
- Future Trends: Keeping up with trends in automation and cloud security will be key to adapting to future cybersecurity challenges.
Links and resources:
Contact Myles
Website: MylesAgnew.com
Github: https://github.com/mylesagnew
ASD threat intel:
https://www.asd.gov.au/about/what-we-do/cyber-security
Tools:
Cuckoo Sandbox- https://github.com/cuckoosandbox
Wordfence - Available in Wordpress plugins
WPS Scan (on Kali Linux) for scanning your own Wordpress site for vulnerabilities
Yara Signator: https://github.com/fxb-cocacoding/yara-signator
19 episodes
All episodes
×
1 Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps 43:16


1 Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations 30:43

1 Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool 23:20

1 Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson 1:08:33

1 Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson 54:55

1 Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist? 17:47

1 Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew 52:46

1 Episode 10 - Detecting and Preventing Phishing Attacks 19:04

1 Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies 21:48

1 Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and… 19:57

1 Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures 17:07

1 Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo 26:11

1 Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity) 33:06

1 Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery) 22:10
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.