Resources
This page has:
- Recommended reading
- My presentations
- My guest blog posts
- My published books
Scroll down to view each section.
Recommended Reading
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far by Ted Demopoulos
Read good recommendations on how to progress your information security and cybersecurity career.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter
Learn the many facets about Stuxnet: known technical implementation, political landscape, and the discovery. The book is almost written like a mystery novel, and has many footnote references.
Dark Territory: The Secret History of Cyber War by Fred Kaplan
A really good overview on how the need for cybersecurity discovered and how it has progressed throughout the decades. This book is a good supplement to "Countdown to Zero Day" as it gives more insight into why Stuxnet was launched.
My Presentations
Using Cookies to Store Your Postman Secrets
Storing your secrets in Postman environments might not meet your security requirements. See how you can leverage Postman cookies instead.
Lightning Talk at Postman Galaxy 2021 · Representing VeriToll · February 4, 2021
Whoops! I Committed It Again: Configuring Git to Prevent Accidental Commits
It’s so easy to accidentally commit a secret key or sensitive data in our git repository. This SnykCon lightning talk by Miguel A. Calles and Greg Thompson will explain how you can leverage git hooks to catch things before they get committed or pushed up to the git origin.
Lightning Talk at SnykCon 2020 · Representing VeriToll · October 21, 2020
Be Cyber Smart
Managing security threats is an ongoing battle. In this presentation, information security challenges related to COVID-19 will be discussed. Do your part.
Presentation at California State University, Fullerton TechDay 2020 · Representing VeriToll · October 23, 2020
Careers in Cybersecurity
Looking for a career in cybersecurity? Learn more about the trends in cybersecurity programs and the industry job market.
Presentation at California State University, Fullerton TechDay 2020 · Representing VeriToll · October 23, 2020
The Internet of Things and How it Relates to Your Privacy
Presentation at California State University, Fullerton Cybersecurity Awareness Month 2019 · Representing VeriToll · October 11, 2019
Internet of Things (IoT) Vulnerabilities
Presentation at California State University, Fullerton Cyber Security Day 2017 · Representing Raytheon · November 28, 2017
My Guest Blog Posts
Learning Cybersecurity Through Teaching, Presenting, and Writing on Apress
My Published Books
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel.
Black Hat Chronicles: Preparing the Python Attack: A Hacker Short Novel
From a certified cybersecurity engineer: Get into the mind of a hacker with ill intent, also known as a Black Hat. This black hat hacker's goal is to instill fear by launching a sophisticated cyber attack at the right time. Get inside the mind of this black hat in this short story as the hacker describes how the attack was prepared...
Goo Goo Gaga: A Guide to Communicate with Your Baby (includes a Workbook)
From a parent of twins: This book is written with seven concise guidelines for communicating with your baby and establishing a strong relationship. As a bonus, this book contains a workbook to start applying these seven guidelines.
Your baby was born after having listened to you for nine months while still in the womb. She knows your voice and has already established a relationship with you. She has to learn to communicate with you, and she must learn this brand new environment--which can be cold, dark, and scary at times. Your responsibility as the parent is to leverage the trust she has from your words and to mentor her in her new career as a person.
As a parent of twin toddlers, at the time of this writing, I understand how little me-time is available. I know leisurely reading may be difficult to start, let alone reading for educational purposes. I empathize with your current parenting situation or the one you will soon start. This book is intentionally written to be short and to the point so you may start “doing” rather than just “reading.”
Get your copy at Amazon.com.