<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.3">Jekyll</generator><link href="https://kwm.me/feed.xml" rel="self" type="application/atom+xml" /><link href="https://kwm.me/" rel="alternate" type="text/html" /><updated>2026-04-21T14:05:04+00:00</updated><id>https://kwm.me/feed.xml</id><title type="html">KWM</title><subtitle>Cybersecurity, technology, very likely other surprise topics along the way.</subtitle><author><name>by Keith McCammon</name></author><entry><title type="html">Introducing Atomic Scorecard: A test tracking tool for ATT&amp;amp;CK + Atomic Red Team</title><link href="https://kwm.me/posts/atomic-scorecard/" rel="alternate" type="text/html" title="Introducing Atomic Scorecard: A test tracking tool for ATT&amp;amp;CK + Atomic Red Team" /><published>2026-04-18T00:00:00+00:00</published><updated>2026-04-18T00:00:00+00:00</updated><id>https://kwm.me/posts/atomic-scorecard</id><content type="html" xml:base="https://kwm.me/posts/atomic-scorecard/"><![CDATA[<p><img src="https://kwm.me/assets/images/atomic-scorecard/atomic-scorecard.png" alt="alt" /></p>

<p>If you haven’t tested it, it doesn’t work. This is a foundational thesis that led to the creation of the <a href="https://atomicredteam.io">Atomic Red Team</a> project, and the concept of “atomic testing” for cybersecurity teams. As the project has been integrated into myriad tools and processes, one thing we’ve learned is that testing should be approached more like exercise than an exam. Even a small amount of regular testing pays far larger dividends than annual or “big bang” red team engagements.</p>

<p>One way to encourage ongoing testing is a framework for tracking, scoring, and measuring tests and test outcomes. For some time, I’ve maintained a <a href="https://kwm.me/posts/mitre-attack-atomic-testing-tool">crude spreadsheet</a> that can be used to record and score atomic tests. In the spirit of making this a bit accessible, I took a crack at converting this venerable spreadsheet into a web-based tool.</p>

<p><strong>What is it?</strong></p>

<p>At its core, Atomic Scorecard is a simple system of record for atomic tests. Like Atomic Red Team, it uses MITRE ATT&amp;CK as the foundation, but it overlays industry threat intelligence, and naturally makes it easy to find atomic tests relevant to each technique.</p>

<p>No account is needed. There’s no database or other backend. None of your test data is stored.</p>

<p><strong>Intelligence-driven prioritization</strong></p>

<p>The single most common hangup related to ATT&amp;CK is that it’s expansive, and it’s not easy to figure out where to start. Relatively few organizations produce enough first-party threat intelligence to know which techniques are most important to defend against, and even then, this isn’t necessarily representative of the techniques that present the most risk. What we do know is that not all techniques are created equal—some are far more prevalent than others. From <a href="https://redcanary.com/threat-detection-report/">Red Canary’s 2026 Threat Detection Report</a>:</p>

<blockquote>
  <p>[A] relatively small number of techniques play a role in a disproportionately large number of detections . . . [O]ver the last five years, we’ve detected at least one of the 10 most prevalent techniques in 46 percent of all detections. Over the same time period, we detected at least one of the top 20 techniques in 63 percent of detections.</p>
</blockquote>

<p>By default, technique rankings are based on Red Canary’s annual Threat Detection Report, representing the most prevalent techniques observed across thousands of companies of every size and industry. Also included are Mandiant’s top techniques and subtechniques, as well as the complete M-Trends appendix, which provides the top techniques observed for each ATT&amp;CK Tactic.</p>

<ul>
  <li><a href="https://atomicscorecard.com/?rank=red_canary_2026">Red Canary 2026 Threat Detection Report (default)</a></li>
  <li><a href="https://atomicscorecard.com/?rank=mandiant_2026_techniques">Mandiant M-Trends 2026 Top Techniques</a></li>
  <li><a href="https://atomicscorecard.com/?rank=mandiant_2026_subs">Mandiant M-Trends 2026 Top Sub-Techniques</a></li>
  <li><a href="https://atomicscorecard.com/?rank=mandiant_2026_complete">Mandiant M-Trends 2026 Complete ATT&amp;CK appendix (top techniques and sub-techniques for every ATT&amp;CK tactic)</a></li>
</ul>

<p>That said, there are lots of useful sources of threat intelligence, and every company, environment, and set of priorities is unique. So, you can easily upload your own custom rankings to reflect the specific threats your organization faces.</p>

<p><strong>Integration of ATT&amp;CK + Atomic Red Team</strong></p>

<p>The tool is built to move you from documentation to execution in seconds:</p>

<ul>
  <li>Every technique is linked directly to the official MITRE ATT&amp;CK documentation</li>
  <li>For any technique where an Atomic Red Team test exists, a clickable logo appears that takes you directly to tests that correspond to that technique</li>
</ul>

<p>I recommend using the <a href="https://www.atomicredteam.io/docs/invoke-atomicredteam">Invoke-AtomicRedTeam framework</a>, which makes test selection, execution, and optionally things like prerequisites and cleanup fast and easy.</p>

<p><strong>Tracking and reporting</strong></p>

<p>Testing is less impactful if you don’t record and measure the results. For every technique that you test, you can categorize test outcomes into one of four states:</p>

<ul>
  <li>Missed: The attack went completely unnoticed.</li>
  <li>Observed: You saw the telemetry, but no alert was triggered.</li>
  <li>Detected: You were alerted to the activity.</li>
  <li>Mitigated: The attack was blocked or interdicted by existing controls.</li>
</ul>

<p><img src="https://kwm.me/assets/images/atomic-scorecard/atomic-scorecard-test-outcomes.png" alt="alt" /></p>

<p>You can also add notes related to a given technique, since a simple status may not capture important context, or mark a technique as not applicable to your environment.</p>

<p>A simple dashboard at the top makes it easy to see your test coverage and outcomes.</p>

<p><img src="https://kwm.me/assets/images/atomic-scorecard/atomic-scorecard-scoring.png" alt="alt" /></p>

<p><strong>Flexibility and customization</strong></p>

<p><img src="https://kwm.me/assets/images/atomic-scorecard/atomic-scorecard-maintainer.png" alt="alt" class="align-right width-40pct" /></p>

<p>To ensure this tool stays relevant as ATT&amp;CK, Atomic Red Team, and your priorities evolve, the Maintainer tools allow you to update or customize:</p>

<ul>
  <li>ATT&amp;CK version</li>
  <li>Atomic Red Team coverage</li>
  <li>Technique ranking</li>
</ul>

<p>There’s also a simple JSON-based backup and restore capability. Export your entire project as a JSON structure at any time. When you’re ready to resume, just import the file and pick up exactly where you left off.</p>

<p><strong>Share your feedback</strong></p>

<p>If there’s something you’d like to see that isn’t included, something isn’t working, or if  you’d just like to send some feedback, you can reach me via email: kwm @ this domain.</p>

<p><strong>Ready to start testing? Give it a go at <a href="https://atomicscorecard.com">https://atomicscorecard.com</a></strong></p>]]></content><author><name>by Keith McCammon</name></author><category term="Posts" /><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">Customer discovery questions (or, better alternatives to “What keeps you up at night?”)</title><link href="https://kwm.me/posts/better-customer-questions/" rel="alternate" type="text/html" title="Customer discovery questions (or, better alternatives to “What keeps you up at night?”)" /><published>2026-04-09T00:00:00+00:00</published><updated>2026-04-09T00:00:00+00:00</updated><id>https://kwm.me/posts/better-customer-questions</id><content type="html" xml:base="https://kwm.me/posts/better-customer-questions/"><![CDATA[<p>Whether you’re a founder, in sales, an account manager, or in almost any other customer-facing role, the most valuable thing you can do is ask your customers questions, and learn what their goals, incentives, and measures look like.</p>

<p>This is a short list of questions I’ve found lead to substantive discussion (these are geared toward cybersecurity teams, but most are broadly applicable):</p>

<p><strong>Q: How is your team measured?</strong></p>

<p>What I’m listening for:</p>

<ul>
  <li>Objectives, ideally those that roll up and support the broader organization</li>
  <li>Cybersecurity maturity models or frameworks (NIST CSF, CMMC, C2M2, etc.)</li>
  <li>Compliance audits or certifications (SOC 2, ISO 27001, FedRAMP, etc.)</li>
  <li>Risk measures, commonly specific to realized risks (exposure or vulnerability management, third-party risk, etc.)</li>
  <li><a href="https://kwm.me/posts/incidents-measuring-cybersecurity-progress">Incident measures</a> related to detection, investigation, containment, and response</li>
  <li>Other basic operational measures, like tickets or cases</li>
</ul>

<p><strong>Q: Where do your incidents come from?</strong></p>

<p>This is a simple question, but sometimes it lands. If it’s helpful to follow with some elaboration, consider:</p>

<ul>
  <li><strong>Q: What controls are most useful in helping you identify higher severity incidents?</strong></li>
  <li><strong>Q: What data or tools do you find most useful for investigation? Response?</strong></li>
</ul>

<p>These can lead to useful insights related to control effectiveness, operational maturity, and incident management. A good organization can tell you how many incidents they have; a great team can speak to trends related to root cause, severity, cost, mean time to detect/respond, and more. Teams that are exceptional at incident management will use incidents as a <a href="https://kwm.me/posts/incidents-an-organizational-swiss-army-knife">key lever for driving continuous improvement and change</a>.</p>

<p><strong>Q: What does your roadmap look like for the coming months or year?</strong></p>

<p>Here I’m listening for initiatives that:</p>

<ul>
  <li>Align with what we do today, where we can satisfy the requirement or meaningfully accelerate progress</li>
  <li>Are on our roadmap, as this helps with prioritization, and reinforces that we have some shared vision</li>
  <li>Include tooling consolidation or platform migrations, which can indicate a natural entry point, or a risk if the consolidation cuts you out</li>
  <li>Aren’t on our radar at all, particularly those that factor into competitive losses</li>
</ul>

<p><strong>Q: If you could add a single skillset to your team today, what would it be? If you could add an entire team, what would you have them do?</strong></p>

<p><em>What do they know they want</em>? Usually, they’ll frame it around a specific, acute problem they can’t solve or solution they can’t build in-house.</p>

<p><strong>Note:</strong> There’s a subtle but important difference between this type of question and “What causes you to lose sleep?” When asked about fears, a mature team will probably name a specific threat or risk. You can then explain how your product addresses it and hope they connect the dots — but unless that fear is your primary point of value, you’ve gone down a rabbit hole and likely missed the broader product story.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Posts" /><summary type="html"><![CDATA[Whether you’re a founder, in sales, an account manager, or in almost any other customer-facing role, the most valuable thing you can do is ask your customers questions, and learn what their goals, incentives, and measures look like.]]></summary></entry><entry><title type="html">Assorted links 2026-03-15</title><link href="https://kwm.me/notes/assorted-links-2026-03-15/" rel="alternate" type="text/html" title="Assorted links 2026-03-15" /><published>2026-03-15T00:00:00+00:00</published><updated>2026-03-15T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2026-03-15</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2026-03-15/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<ol>
  <li>
    <p><a href="https://antithesis.com/blog/2026/carcinization/">A fighting retreat</a> - An email from Will Wilson (CEO and co-founder of Antithesis) to his company, on delaying the inevitable change that occurs when a startup experiences significant growth.</p>
  </li>
  <li>
    <p><a href="https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/">AI as tradecraft: How threat actors operationalize AI</a> - A solid roundup of adversaries’ various uses for AI throughout the intrusion lifecycle.</p>
  </li>
  <li>
    <p><a href="https://direct.mit.edu/isec/article/50/3/86/135683/Deception-and-Detection-Why-Artificial">Deception and Detection: Why Artificial Intelligence Empowers Cyber Defense over Offense</a> - “Rather than heralding a revolution, AI automation is likely to further tame cyber conflict. Highly skilled human operators, not AI, will be necessary to avoid being detected by AI-empowered defenders.”</p>
  </li>
</ol>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2026-03-11</title><link href="https://kwm.me/notes/assorted-links-2026-03-11/" rel="alternate" type="text/html" title="Assorted links 2026-03-11" /><published>2026-03-11T00:00:00+00:00</published><updated>2026-03-11T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2026-03-11</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2026-03-11/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<ol>
  <li>
    <p>$ <a href="https://www.derekthompson.org/p/why-ai-is-not-particularly-good-at">Why AI Is ‘Not Particularly Good’ at Curing Disease (Plus: The Next GLP-1 Boom and Why America Hates Big Pharma): A wide-ranging interview with Dave Ricks, the CEO of Eli Lilly</a> - Pound for pound, Derek Thompson may be my most valuable Substack or newsletter subsription. I learned so much from this.</p>
  </li>
  <li>
    <p><a href="https://paulgraham.com/brandage.html">The Brand Age</a> - “One obvious lesson is to stay away from brand. Indeed it’s probably a good idea not just to avoid buying brand, but to avoid selling it too. Sure, you might be able to make money this way — though I bet it’s harder than it looks — but pushing people’s brand buttons is just not a good problem to work on, and it’s hard to do good work without a good problem.”</p>
  </li>
  <li>
    <p><a href="https://signal.returnonsecurity.com/">The Signal: The cybersecurity economy, charted.</a> - “Real-time venture funding, M&amp;A, and market intelligence across thousands of companies and investors in the global cybersecurity industry. The market intelligence platform behind the Return on Security briefing.”</p>
  </li>
  <li>
    <p><a href="https://marginalrevolution.com/marginalrevolution/2026/03/the-hidden-cost-of-hard-to-fire-labor-laws-why-european-firms-dont-take-risks.html">The Hidden Cost of Hard-to-Fire Labor Laws: Why European Firms Don’t Take Risks</a> - Related to items I shared <a href="https://kwm.me/notes/assorted-links-2026-02-23/">back in February</a>.</p>
  </li>
</ol>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2026-02-24</title><link href="https://kwm.me/notes/assorted-links-2026-02-24/" rel="alternate" type="text/html" title="Assorted links 2026-02-24" /><published>2026-02-24T00:00:00+00:00</published><updated>2026-02-24T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2026-02-24</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2026-02-24/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<ol>
  <li>
    <p><a href="https://www.ben-evans.com/benedictevans/2026/2/19/how-will-openai-compete-nkg2x">How will OpenAI compete?</a> - “OpenAI has some big questions. It doesn’t have unique tech. It has a big user base, but with limited engagement and stickiness and no network effect. The incumbents have matched the tech and are leveraging their product and distribution. And a lot of the value and leverage will come from new experiences that haven’t been invented yet, and it can’t invent all of those itself. What’s the plan?”</p>
  </li>
  <li>
    <p><a href="https://larahogan.me/blog/be-a-thermostat-not-a-thermometer/">Be a thermostat, not a thermometer</a> - Solid life advice, disguised as employment (and management) advice.</p>
  </li>
  <li>
    <p><a href="https://steveblank.com/2026/02/24/time-to-move-on-the-reason-relationships-end/">Time to Move On – The Reason Relationships End</a></p>
  </li>
</ol>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2026-02-23</title><link href="https://kwm.me/notes/assorted-links-2026-02-23/" rel="alternate" type="text/html" title="Assorted links 2026-02-23" /><published>2026-02-23T00:00:00+00:00</published><updated>2026-02-23T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2026-02-23</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2026-02-23/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<ol>
  <li>
    <p><a href="https://dropleaf.app/d/AlXez8scbd">AI Taxonomy: An Operational Framework for Precision in AI Discourse</a> - “AI” has become an umbrella term similar to “cloud”, and some precision is useful.</p>
  </li>
  <li>
    <p><a href="https://worksinprogress.co/issue/why-europe-doesnt-have-a-tesla/">Why Europe doesn’t have a Tesla: Europe’s cutting edge firms are falling far behind the American frontier because of restrictive labor laws</a>, and a coincidental case study <a href="https://www.coinerella.com/made-in-eu-it-was-harder-than-i-thought/">“Made in EU” - it was harder than I thought</a></p>
  </li>
  <li>
    <p><a href="https://softcurrency.substack.com/p/the-dangerous-economics-of-walk-away">The Dangerous Economics of Walk-Away Wealth in the AI Talent War: How firms are accidentally paying their best employees to become their biggest competitors</a></p>
  </li>
  <li>
    <p><a href="https://ramimac.me/floors-and-ceilings">Research ROI: Floors &amp; Ceilings</a> - As someone who believes in the importance of research, but loathes what often end up being company-sponsored science projects, this resonates.</p>
  </li>
</ol>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Menu of cybersecurity risk management options</title><link href="https://kwm.me/posts/cyber-risk-management-menu/" rel="alternate" type="text/html" title="Menu of cybersecurity risk management options" /><published>2025-04-19T00:00:00+00:00</published><updated>2025-04-19T00:00:00+00:00</updated><id>https://kwm.me/posts/cyber-risk-management-menu</id><content type="html" xml:base="https://kwm.me/posts/cyber-risk-management-menu/"><![CDATA[<p><img src="https://kwm.me/assets/images/risk-management-menu.png" alt="Risk management menu" /></p>

<p>A simple visualization of risk management options, explained in the context of cybersecurity but broadly applicable.</p>

<h2 id="avoidance">Avoidance</h2>

<p>Eliminate at-risk components entirely—ideal when practical, though it rarely is.</p>

<p>A common example is credit card processing. Many organizations choose not to store or process credit card data, instead using third-party gateways. This avoids the risks, costs, and compliance burdens (e.g., PCI DSS) of handling sensitive card information internally.</p>

<h2 id="mitigation">Mitigation</h2>

<p>Manage risk exposure or impact using preventive, detective, or response controls—the most common cybersecurity approach.</p>

<p>Most cybersecurity products and services focus on mitigation. Endpoint detection and response (EDR), identity security solutions (IdPs), cloud security, security event management platforms (data lakes, SIEM), and managed security services (MSSP, MDR) all help mitigate present and emerging risks.</p>

<h2 id="transference">Transference</h2>

<p>Find someone else to actively manage the risk. You still have a risk, and transference is rarely wholesale, so a good understanding of your remaining risk is critical.</p>

<p>“Risk transference” used to be largely synonymous with “insurance.” Today, using cloud-based applications or infrastructure is one of the most common forms of cybersecurity risk transference. Availability, integrity, product security and more are shared with the vendor, allowing the customer to build upon a strong foundation. That said, widespread adoption of these technologies has also created a tremendous concentration of trust, which can have a disastrous impact if and when adversaries compromise cloud vendors.</p>

<h2 id="acceptance">Acceptance</h2>

<p>Evaluate the potential cost of a realized risk. If prevention or mitigation costs aren’t justified, explicitly accept the risk and plan accordingly. Often the least desirable option for security practitioners—though business leaders may be more willing.</p>

<p>A typical scenario involves legacy or niche applications running despite known vulnerabilities, risk of failure, or other scenarios. When mitigating or replacing such systems is too costly, risks are accepted, often supplemented by basic mitigations like isolation or enhanced disaster recovery planning.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Posts" /><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">Assorted links 2025-03-19</title><link href="https://kwm.me/notes/assorted-links-2025-03-19/" rel="alternate" type="text/html" title="Assorted links 2025-03-19" /><published>2025-03-19T00:00:00+00:00</published><updated>2025-03-19T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2025-03-19</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2025-03-19/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<p>1. <a href="https://labs.sqrx.com/polymorphic-extensions-dd2310006e04">Shapeshifting Chrome extensions</a></p>

<p>2. <a href="https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/">Comprehensive (&gt;6500 word) business and technical teardown of spyware peddler Paragon</a></p>

<p>3. <a href="https://bluemigrate.com/">Migrate your Tweets to Bluesky, preserving the original date</a> - Novel use of the <a href="https://docs.bsky.app/docs/advanced-guides/timestamps">AT Protocol’s timestamp functionality</a>, which allows backdating of posts. To avoid the appearance of shenanigans, the date and time of the Bluesky post will reflect when it was migrated, and the original date is preserved as a badge. <em>NOTE: I am never doing this</em>.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2025-03-17</title><link href="https://kwm.me/notes/assorted-links-2025-03-17/" rel="alternate" type="text/html" title="Assorted links 2025-03-17" /><published>2025-03-17T00:00:00+00:00</published><updated>2025-03-17T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2025-03-17</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2025-03-17/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<p>1. <a href="https://bindinghook.com/articles-hooked-on-trends/cyber-insurance-is-no-silver-bullet-for-cybersecurity/">Cyber insurance is no silver bullet for cybersecurity</a> - “Regulators and businesses hope cyber insurance will drive stronger security practices. In reality, a narrow focus on mitigating financial loss makes it an unreliable solution.” Risk management is grounded in losses, and cybersecurity losses in the context of insurance are explicitly financial. Also, insurance is not intended to be a silver bullet, but one of several tools used to manage risk.</p>

<p>2. <a href="https://x.com/jeremiahg/status/1888612479540044069">A simple framework for predicting where the InfoSec market is heading using cyber-insurance</a> (<a href="https://threadreaderapp.com/thread/1888612479540044069.html">Thread Reader version</a>)</p>

<p>3. <a href="https://www.reddit.com/r/cybersecurity/comments/1jaxamp/to_whom_does_your_ciso_report/">Reddit thread on CISO reporting</a></p>

<p>4. <a href="https://www.svpg.com/outcomes-are-hard/">Outcomes are hard</a></p>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2025-03-09</title><link href="https://kwm.me/notes/assorted-links-2025-03-09/" rel="alternate" type="text/html" title="Assorted links 2025-03-09" /><published>2025-03-09T00:00:00+00:00</published><updated>2025-03-09T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2025-03-09</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2025-03-09/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<p>1. <a href="https://www.proofpoint.com/us/blog/threat-insight/call-it-what-you-want-threat-actor-delivers-highly-targeted-multistage-polyglot">Crafty Camel, a threat targeting the UAE</a></p>

<p>2. <a href="ttps://nisos.com/research/dprk-github-employment-fraud/">Another piece of the DPRK tech worker puzzle</a></p>

<p>3. <a href="https://homeland.house.gov/2025/03/06/the-defining-challenge-of-the-21st-century-hearing-evaluates-growing-ccp-threats-to-homeland-security/">“The Defining Challenge of the 21st Century”</a>, a hearing of the House Committee on Homeland Security. Not explicitly focused on cybersecurity, but cybersecurity featured prominently throughout. [<a href="https://youtu.be/oS_aZXE6W0k?t=481">Full hearing video</a>]</p>

<p>4. <a href="https://selectcommitteeontheccp.house.gov/committee-activity/hearings/media-advisory-select-committee-chinese-communist-party-holds-hearing">“End the Typhoons: How to Deter Beijing’s Cyber Actions and Enhance America’s Lackluster Cyber Defenses”</a>, a hearing of the House Select Committee on the Chinese Communist Party. Links to opening statements below. [<a href="https://youtu.be/wUZX1qLmriU?t=1844">Full hearing video</a>]</p>

<ul>
  <li>
    <p><a href="https://drive.google.com/file/d/14Msnfgmt5MdUiaX0o29t_C5JLtsP-cHn/view">Rob Joyce (former Cybersecurity Director, NSA)</a></p>
  </li>
  <li>
    <p><a href="https://drive.google.com/file/d/17uXNBlnNZWiPwnHfklX9UJUEq0zrMqcu/view">Laura Galante (former director of the Cyber Threat Intelligence Integration Center, Office of the Director of National Intelligence)</a></p>
  </li>
  <li>
    <p><a href="https://drive.google.com/file/d/14KtxoIxvztxSEAbhERXMU7qHz2FWCUwz/view">Dr. Emma Steward (Chief Power Grid Scientist, Idaho National Laboratory)</a></p>
  </li>
</ul>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry></feed>