<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>coffeewithayman</title>
    <link>https://coffeewithayman.writeas.com/</link>
    <description>Random thoughts ranging from human behavior (neuroscience &amp; psychology) to information security to coffee, gardening, and life reflections.</description>
    <pubDate>Mon, 11 May 2026 11:10:14 +0000</pubDate>
    <item>
      <title>Neuroscience &amp; Security: The Default Mode Network and Threat Hunting</title>
      <link>https://coffeewithayman.writeas.com/neuroscience-and-security-the-default-mode-network-and-threat-hunting?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Neuroscience &amp; Security: The Default Mode Network and Threat Hunting&#xA;&#xA;The brain is compromised of several neural networks. These networks, just as internet networks, traverse different regions of the brain. One network in particular that is important is the Default Mode Network (DMN). What&#39;s interesting about this network is that it is always active and processing, when your brain is not actively &#34;doing&#34; anything.&#xA;&#xA;So when you&#39;re taking a walk, observing nature, or just people watching, this network is always running. The DMN, and many other neural networks, work on making predications based on information you have experienced in the past. That&#39;s what author, __ presents in her book, __. She asserts that the much of how we process our experiences is simply a set of instantaneous predictions. Sounds similar to machine learning huh?&#xA;&#xA;In security when you run across a threat, you automatically make some predictions on this threat. But what will help differentiate you vs someone else are all the assumptions you make about that threat without all the information available.&#xA;&#xA;Take for example an incident that says a piece of code in your CI/CD pipeline has been altered.]]&gt;</description>
      <content:encoded><![CDATA[<p>Neuroscience &amp; Security: The Default Mode Network and Threat Hunting</p>

<p>The brain is compromised of several neural networks. These networks, just as internet networks, traverse different regions of the brain. One network in particular that is important is the Default Mode Network (DMN). What&#39;s interesting about this network is that it is always active and processing, when your brain is not actively “doing” anything.</p>

<p>So when you&#39;re taking a walk, observing nature, or just people watching, this network is always running. The DMN, and many other neural networks, work on making predications based on information you have experienced in the past. That&#39;s what author, _____ presents in her book, _____. She asserts that the much of how we process our experiences is simply a set of instantaneous predictions. Sounds similar to machine learning huh?</p>

<p>In security when you run across a threat, you automatically make some predictions on this threat. But what will help differentiate you vs someone else are all the assumptions you make about that threat without all the information available.</p>

<p>Take for example an incident that says a piece of code in your CI/CD pipeline has been altered.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/neuroscience-and-security-the-default-mode-network-and-threat-hunting</guid>
      <pubDate>Fri, 16 Apr 2021 13:18:29 +0000</pubDate>
    </item>
    <item>
      <title>Contract Websites</title>
      <link>https://coffeewithayman.writeas.com/contract-websites?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[https://www.lawinsider.com/clauses&#xA;https://www.cooleygo.com/documents/index-document-generators/]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://www.lawinsider.com/clauses" rel="nofollow">https://www.lawinsider.com/clauses</a></li>
<li><a href="https://www.cooleygo.com/documents/index-document-generators/" rel="nofollow">https://www.cooleygo.com/documents/index-document-generators/</a></li></ul>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/contract-websites</guid>
      <pubDate>Tue, 09 Mar 2021 23:14:14 +0000</pubDate>
    </item>
    <item>
      <title>Project Management Software compared</title>
      <link>https://coffeewithayman.writeas.com/project-management-software-compared?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[The way you want to manage your tasks is up to you, it can be a Google Keep note, a spreadsheet, and daily journal like Panda (recommend!), or a personal Trello board.&#xA;&#xA;But when you start working with others, things can get hairy and you have to &#34;grow up&#34; and get some real software. Here is a list of PM software I found:&#xA;&#xA;Trello&#xA;Asana&#xA;Monday.com&#xA;Wrike&#xA;ClickUp&#xA;Todoist&#xA;Basecamp]]&gt;</description>
      <content:encoded><![CDATA[<p>The way you want to manage your tasks is up to you, it can be a Google Keep note, a spreadsheet, and daily journal like Panda (recommend!), or a personal Trello board.</p>

<p>But when you start working with others, things can get hairy and you have to “grow up” and get some real software. Here is a list of PM software I found:</p>
<ul><li>Trello</li>
<li>Asana</li>
<li>Monday.com</li>
<li>Wrike</li>
<li>ClickUp</li>
<li>Todoist</li>
<li>Basecamp</li></ul>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/project-management-software-compared</guid>
      <pubDate>Fri, 05 Mar 2021 19:59:16 +0000</pubDate>
    </item>
    <item>
      <title>Domain Hijacking</title>
      <link>https://coffeewithayman.writeas.com/domain-hijacking?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[One of the most important things to do is to shore up your domain name registration security.&#xA;&#xA;Here&#39;s how to protect yourself:&#xA;https://docs.cloudsecuritylabs.io/glossary#ff-domain-hijacking-protection-and-prevention]]&gt;</description>
      <content:encoded><![CDATA[<p>One of the most important things to do is to shore up your domain name registration security.</p>

<p>Here&#39;s how to protect yourself:
<a href="https://docs.cloudsecuritylabs.io/glossary#ff-domain-hijacking-protection-and-prevention" rel="nofollow">https://docs.cloudsecuritylabs.io/glossary#ff-domain-hijacking-protection-and-prevention</a></p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/domain-hijacking</guid>
      <pubDate>Tue, 02 Mar 2021 04:45:09 +0000</pubDate>
    </item>
    <item>
      <title>Auth0 Alternatives</title>
      <link>https://coffeewithayman.writeas.com/auth0-alternatives?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[So there are plenty of alternatives to Auth0, it really depends on what you’re looking for. Here are some ideas and a brief comment on each:&#xA;&#xA;Okta&#xA;&#xA;On par for the most part with Auth0&#xA;&#xA;Very expensive&#xA;&#xA;AWS Cognito&#xA;&#xA;Many features&#xA;&#xA;Much bigger learning curve&#xA;&#xA;Might be cheaper&#xA;&#xA;WorkOS&#xA;&#xA;Does not price per user, only per connection&#xA;&#xA;New company / contender&#xA;&#xA;OSSO&#xA;&#xA;Ruby based only&#xA;&#xA;Business Source License (Not OSS)&#xA;&#xA;YMMV&#xA;&#xA;Of course you can always build a solution in-house using available libraries. Same with the admin panel. However, I’ve seen a lot of mistakes made using this method. Using a reputable 3rd party to manage your users/admin panel will ensure you are always delivering the best security and experience to them.&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>So there are plenty of alternatives to Auth0, it really depends on what you’re looking for. Here are some ideas and a brief comment on each:</p>

<h2 id="okta" id="okta">Okta</h2>
<ul><li><p>On par for the most part with Auth0</p></li>

<li><p>Very expensive</p></li></ul>

<h2 id="aws-cognito" id="aws-cognito">AWS Cognito</h2>
<ul><li><p>Many features</p></li>

<li><p>Much bigger learning curve</p></li>

<li><p>Might be cheaper</p></li></ul>

<h2 id="workos" id="workos">WorkOS</h2>
<ul><li><p>Does not price per user, only per connection</p></li>

<li><p>New company / contender</p></li></ul>

<h2 id="osso" id="osso">OSSO</h2>
<ul><li><p>Ruby based only</p></li>

<li><p>Business Source License (Not OSS)</p></li>

<li><p>YMMV</p></li></ul>

<p>Of course you can always build a solution in-house using available libraries. Same with the admin panel. However, I’ve seen a lot of mistakes made using this method. Using a reputable 3rd party to manage your users/admin panel will ensure you are always delivering the best security and experience to them.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/auth0-alternatives</guid>
      <pubDate>Wed, 24 Feb 2021 17:04:30 +0000</pubDate>
    </item>
    <item>
      <title>Honey... Can I Use Your Work Computer?</title>
      <link>https://coffeewithayman.writeas.com/honey?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Also in S1E3 of &#34;The Flight Attendant&#34;, there is a sub-plot about one of the attendants copying proprietary and confidential files from her husbands work computer. She working on behalf of a corporate competitor selling secrets. (27:00)&#xA;&#xA;Her excuse for using the computer was to search on Ebay for a jenga piece.&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>Also in S1E3 of “The Flight Attendant”, there is a sub-plot about one of the attendants copying proprietary and confidential files from her husbands work computer. She working on behalf of a corporate competitor selling secrets. (27:00)</p>

<p>Her excuse for using the computer was to search on Ebay for a jenga piece.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/honey</guid>
      <pubDate>Tue, 23 Feb 2021 08:22:12 +0000</pubDate>
    </item>
    <item>
      <title>Because Rich People Find Computers Difficult</title>
      <link>https://coffeewithayman.writeas.com/because-rich-people-find-computers-difficult?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[The S1E3 of the HBO Show &#34;The Flight Attendant&#34; a characters is introduced as the boyfriend of the lawyer who knows his way around a computer. He says:&#xA;&#xA;&#34;I&#39;m good with technology,&#xA;&#xA;and rich people are kind of...&#xA;&#xA;not.&#xA;&#xA;Generally extortion.&#34;&#xA;&#xA;Hilarious. Later in the show the lawyer asks him some &#34;hypotheticals&#34; on digging for information that she&#39;s struggling to uncover. (22:51) She asks him how long it would take to get something, he says 20 minutes.&#xA;&#xA;This is all just knowing how to search online for things. Often times referred to as OSINT.&#xA;&#xA;The interesting thing here is that a) this is all legal and b) lawyers should probably know how to do this.&#xA;&#xA;Reminds me of my episode with @Infosecsherpa.]]&gt;</description>
      <content:encoded><![CDATA[<p>The S1E3 of the HBO Show “The Flight Attendant” a characters is introduced as the boyfriend of the lawyer who knows his way around a computer. He says:</p>

<p>“I&#39;m good with technology,</p>

<p>and rich people are kind of...</p>

<p>not.</p>

<p>Generally extortion.”</p>

<p>Hilarious. Later in the show the lawyer asks him some “hypotheticals” on digging for information that she&#39;s struggling to uncover. (22:51) She asks him how long it would take to get something, he says 20 minutes.</p>

<p>This is all just knowing how to search online for things. Often times referred to as OSINT.</p>

<p>The interesting thing here is that a) this is all legal and b) lawyers should probably know how to do this.</p>

<p>Reminds me of my episode with @Infosecsherpa.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/because-rich-people-find-computers-difficult</guid>
      <pubDate>Tue, 23 Feb 2021 08:09:22 +0000</pubDate>
    </item>
    <item>
      <title>Animaniacs And The NSA</title>
      <link>https://coffeewithayman.writeas.com/animaniacs-and-the-nsa?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[If you grew up in the 80&#39;s and 90&#39;s, then Animanics was probably part of your life.&#xA;&#xA;Spoiler Alert!&#xA;&#xA;Well, in Episode 5 (S1), in the Pinky and Brain segment, they need to recover a phone call due to amnesia. So Brain came up with the idea of going to the NSA since they had a recording of all phone calls!&#xA;&#xA;The episode was hilarious being in the field for awhile. They even featured Edward Snowden. It was a really enjoyable clip, highly recommend.&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>If you grew up in the 80&#39;s and 90&#39;s, then Animanics was probably part of your life.</p>

<p><em>Spoiler Alert!</em></p>

<p>Well, in Episode 5 (S1), in the Pinky and Brain segment, they need to recover a phone call due to amnesia. So Brain came up with the idea of going to the NSA since they had a recording of all phone calls!</p>

<p>The episode was hilarious being in the field for awhile. They even featured Edward Snowden. It was a really enjoyable clip, highly recommend.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/animaniacs-and-the-nsa</guid>
      <pubDate>Sun, 21 Feb 2021 07:21:59 +0000</pubDate>
    </item>
    <item>
      <title>Consciousness</title>
      <link>https://coffeewithayman.writeas.com/consciousness?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[In her book, How Emotions Are Made, the author explains how the world we perceive is in fact a construction based on our perception and simulation/predictions of past experiences.&#xA;&#xA;It&#39;s quite interesting in fact. Similar to the movies Inception, The Matrix, and recently a movie called Bliss.&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>In her book, How Emotions Are Made, the author explains how the world we perceive is in fact a construction based on our perception and simulation/predictions of past experiences.</p>

<p>It&#39;s quite interesting in fact. Similar to the movies Inception, The Matrix, and recently a movie called Bliss.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/consciousness</guid>
      <pubDate>Mon, 15 Feb 2021 15:48:23 +0000</pubDate>
    </item>
    <item>
      <title>Affective Realism</title>
      <link>https://coffeewithayman.writeas.com/affective-realism?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[There was a study done once of judges, which found that there was a higher tendency of convictions in cases right before lunch then after.&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>There was a study done once of judges, which found that there was a higher tendency of convictions in cases right before lunch then after.</p>
]]></content:encoded>
      <guid>https://coffeewithayman.writeas.com/affective-realism</guid>
      <pubDate>Wed, 10 Feb 2021 13:09:30 +0000</pubDate>
    </item>
  </channel>
</rss>