CatsCrdl

CatsCrdl

Daniel's thoughts on infosec

Container Escape Telemetry: Series Overview

I ran 15 container escape scenarios against Tetragon, Falco, and Tracee to answer a question most detection engineers can't: what kernel-level telemetry does each tool actually produce when a container escape happens? This is the series overview and key findings.

Daniel Wyleczuk-Stern

8-Minute Read

As a detection engineer, container escapes have always fascinated me. Detections focused on control bypasses can be both extremely difficult to make and extremely valuable when they fire. The challenge is that most discussions about container runtime security focus on whether a tool detected an escape – a binary yes/no that doesn’t tell you much about the underlying telemetry that makes detection possible in the first place.

Detection as Code: A Maturity Framework

Detection as Code (DaC) is transforming how we handle threat detection by merging software engineering practices with security operations. Breaking down DaC into functional areas can enhance your organization's detection capabilities and maturity.

Daniel Wyleczuk-Stern

11-Minute Read

Detection as Code Maturity Improvement

In the ever-evolving landscape of cybersecurity, the methodologies and tools we rely on are continually advancing. One of the latest trends is Detection as Code (DaC), which promises to revolutionize threat detection by integrating software engineering practices into security operations. Having worked in an organization that practices DaC for several years, I’ve come to realize that it’s not simply a matter of whether or not to adopt DaC.

There are Only Two Rules

One mental model I've maintained for a long time is that there are only two types of detection rules. We'll cover what those rules are and why this distinction matters.

Daniel Wyleczuk-Stern

12-Minute Read

A cyber security professional offering a choice between a red pill and a blue pill in a style reminiscent of the Matrix. The scene captures a futuristic and mysterious atmosphere.

In the field of detection engineering, understanding and applying the right frameworks is crucial for effectively identifying and responding to threats. Mental models provide a structured way of categorizing and approaching the myriad of security alerts and anomalies we face daily. These models help us dissect and understand the behavior of potential threats, allowing for a more targeted and effective defense strategy. In this blog post, I’ll explain how I use one mental model to clearly…

Recent Posts

Categories

About

A random collection of thoughts on cybersecurity.