Proper backups, with examples
After two years of running my own infrastructure, my backup discipline has gone through three iterations. The third one, I think, is finally adequate. A walk through what changed at each stage, and why.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged discipline — 2 results.
After two years of running my own infrastructure, my backup discipline has gone through three iterations. The third one, I think, is finally adequate. A walk through what changed at each stage, and why.
An off-cadence post. After six months of confident writing about defensive computing, a reflection on the limits of my own current understanding and the things I have written about that I am no longer sure I had right.