TucknerUtilizing Tines’ Automation Capability MatrixAutomation is often seen as the natural progression for a security operations center. However, deciding where and when to implement it can…Jan 17, 2023Jan 17, 2023
TucknerUsing Client Credential OAuth in n8nTried n8n recently. It can do a lot of very powerful things, but you might have to work around some quirks like supported OAuth methods.Feb 10, 2022Feb 10, 2022
TucknerinLevel Up CodingMoving from No-code to CodeNo-code tools are booming, enabling anyone with an idea to create a product quickly. Before long, you’ll need to graduate from MVP.Apr 16, 2021Apr 16, 2021
TucknerPrepare to ATT&CK (Part Three)Part One: https://johntuckner.me/posts/prepare-attackDec 12, 2020Dec 12, 2020
TucknerPrepare to ATT&CK (Part Two)Part One: https://johntuckner.me/posts/prepare-attackNov 25, 2020Nov 25, 2020
TucknerinThe KickStarterPrepare to ATT&CKMITRE ATT&CK is perhaps a cyber security industry buzzword at this point, becoming just another feature included in RFPs as a prerequisite…Nov 20, 20201Nov 20, 20201
TucknerinThe StartupSentinelOne Deep Visibility ExportThe EDR market has proven itself to be incredibly valuable over the past 5–6 years. I think many security practitioners would agree there…Jul 12, 20201Jul 12, 20201