app security
From web app, desktop and mobile, application security is a mix of manual iterative process, as well as automated vulnerability scans. A cohesive approach, well documented (Pen Test) captures the application vulnerability landscape.
-

The information presented is for learning and investigative purposes using OSINT (Open Source Intelligence). This post discusses a way to gain information on a GitHub user through their commit id. Tools required: A web browser. I was playing one of Kase Scenario games. If you haven’t heard if them, give it a look. Kase scenarios are online…
OSINT: Getting Git secrets with .patch
The information presented is for learning and investigative purposes using…
-

To get a company ISO certified requires a lot of planning and effort from a variety of parties. ISO 27001 will touch upon hiring policies, safety equipment, physical security and of course operations / application security. My effort, at my job, helped get our company ISO 27001 certified. My effort in a strong SDLC, proper…
ISO 27001
To get a company ISO certified requires a lot of…
-

As I get more into white box testing of code bases, I started looking for tools that run static code analysis. A lot of teams I work with believe that GitHub is doing that for them, as they get alerts on their codebases. What is often triggered, however, is not scans of their primary code…
Writing a Static Code Analyzer for Security
As I get more into white box testing of code…
-
![Setting Up an EDR with Email Alerts [Wazuh]](https://brianwarner.org/wp-content/uploads/2025/11/0_RvipDaDdWeDmT77g.webp)
EDR (Endpoint Detection and Response) is part of a security toolset to ensure protection of computers (endpoints) in a network. EDR is complimented with AV, IDS/IPS and SIEMs. What makes EDR great, is the reported insight of every known endpoint on the network. From application crashes, registry modifications, to threat actions, EDR gives insight on…
Setting Up an EDR with Email Alerts [Wazuh]
EDR (Endpoint Detection and Response) is part of a security…



Security Blog



