CatsCrdl

CatsCrdl

Daniel's thoughts on infosec

Container Escape Telemetry: Series Overview

I ran 15 container escape scenarios against Tetragon, Falco, and Tracee to answer a question most detection engineers can't: what kernel-level telemetry does each tool actually produce when a container escape happens? This is the series overview and key findings.

Daniel Wyleczuk-Stern

8-Minute Read

As a detection engineer, container escapes have always fascinated me. Detections focused on control bypasses can be both extremely difficult to make and extremely valuable when they fire. The challenge is that most discussions about container runtime security focus on whether a tool detected an escape – a binary yes/no that doesn’t tell you much about the underlying telemetry that makes detection possible in the first place.

The Pillars of Security Monitoring: A Comprehensive Guide

Why do the distinctions between threat detection and abuse detection matter? Is vulnerability management related to posture monitoring? We'll cover how these, and other security capabilities, are all related yet distinct under the umbrella term of 'Security Monitoring' and how that relates to the SOC vs SOCLess architecture.

Daniel Wyleczuk-Stern

19-Minute Read

Security Monitoring Pilalrs

As you may know by now if you’ve read a few of my blog articles, I’m a big fan of decomposing ideas in threat detection into various frameworks. This latest blog post will touch on another area that I feel strongly about - specifically, that detection engineers need to take a step back and realize that they’re part of a larger “security monitoring” capability which consists of related but distinct pillars. We’ll explore these interrelated pillars of security…

Detection as Code: A Maturity Framework

Detection as Code (DaC) is transforming how we handle threat detection by merging software engineering practices with security operations. Breaking down DaC into functional areas can enhance your organization's detection capabilities and maturity.

Daniel Wyleczuk-Stern

11-Minute Read

Detection as Code Maturity Improvement

In the ever-evolving landscape of cybersecurity, the methodologies and tools we rely on are continually advancing. One of the latest trends is Detection as Code (DaC), which promises to revolutionize threat detection by integrating software engineering practices into security operations. Having worked in an organization that practices DaC for several years, I’ve come to realize that it’s not simply a matter of whether or not to adopt DaC.

Recent Posts

Categories

About

A random collection of thoughts on cybersecurity.