<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sammy Farida</title><link>https://me.itsecurity.network/</link><description>Recent content on Sammy Farida</description><generator>Hugo -- 0.147.3</generator><language>en</language><lastBuildDate>Fri, 13 Mar 2026 00:00:00 -0500</lastBuildDate><atom:link href="https://me.itsecurity.network/index.xml" rel="self" type="application/rss+xml"/><item><title>Docker Sandboxes: Why Your AI Coding Agents Should Never Run on Bare Metal</title><link>https://me.itsecurity.network/blog/docker-sandboxes-enterprise-security-for-ai-coding-agents/</link><pubDate>Fri, 13 Mar 2026 00:00:00 -0500</pubDate><guid>https://me.itsecurity.network/blog/docker-sandboxes-enterprise-security-for-ai-coding-agents/</guid><description>Running AI coding agents directly on enterprise endpoints expands the attack surface. Docker Sandboxes isolate agents in microVMs with private Docker daemons and network controls, materially reducing the risk.</description></item><item><title>Agent Skills: The New Supply Chain Attack Vector</title><link>https://me.itsecurity.network/blog/agent-skills-the-new-supply-chain-attack-vector/</link><pubDate>Sun, 01 Mar 2026 00:00:00 -0500</pubDate><guid>https://me.itsecurity.network/blog/agent-skills-the-new-supply-chain-attack-vector/</guid><description>AI agent skills marketplaces like ClawHub and OpenClaw promise productivity magic but hide malware risks. These ecosystems bypass traditional supply chain defenses, enabling prompt injection, credential theft, and silent data exfiltration.</description></item><item><title>DOaaS — DevOps-as-a-Service</title><link>https://me.itsecurity.network/projects/doaas/</link><pubDate>Tue, 17 Feb 2026 00:00:00 -0500</pubDate><guid>https://me.itsecurity.network/projects/doaas/</guid><description>&lt;h2 id="doaas--devops-as-a-service">DOaaS — DevOps-as-a-Service&lt;/h2>
&lt;p>&lt;strong>Emotional support for your CI/CD pipeline.&lt;/strong> A public API at &lt;a href="https://doaas.dev">doaas.dev&lt;/a> that serves witty, on-brand one-liners for blame, motivation, incidents, standups, and more—designed for terminal greetings, Slack bots, GitHub Actions, and badges.&lt;/p>
&lt;p>One API, zero seriousness, infinite DevOps one-liners. Because production is pain, and pain deserves an API.&lt;/p>
&lt;h3 id="what-problem-does-this-solve">What Problem Does This Solve?&lt;/h3>
&lt;ul>
&lt;li>&lt;strong>Production is hard.&lt;/strong> On-call, red pipelines, and &amp;ldquo;did you try rebooting?&amp;rdquo; get old. DOaaS is a single API for levity—no meetings, no standup bingo, just one &lt;code>curl&lt;/code>.&lt;/li>
&lt;li>&lt;strong>Teams need release valves.&lt;/strong> Standup icebreakers, blame deflection, status pages, Slack bots—instant mood shift, same endpoint.&lt;/li>
&lt;li>&lt;strong>DevOps doesn&amp;rsquo;t have to be grim.&lt;/strong> Less corporate jargon, more wit. Less &amp;ldquo;oh no,&amp;rdquo; more &amp;ldquo;okay, we got this.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h3 id="features">Features&lt;/h3>
&lt;ul>
&lt;li>&lt;strong>RESTful API&lt;/strong> — &lt;code>/help&lt;/code>, &lt;code>/random&lt;/code>, and 20+ endpoints (&lt;code>/blame&lt;/code>, &lt;code>/motivate&lt;/code>, &lt;code>/incident&lt;/code>, &lt;code>/excuse&lt;/code>, &lt;code>/deploy&lt;/code>, &lt;code>/rollback&lt;/code>, &lt;code>/lgtm&lt;/code>, &lt;code>/standup&lt;/code>, &lt;code>/meeting&lt;/code>, &lt;code>/policy&lt;/code>, &lt;code>/audit&lt;/code>, &lt;code>/compliance&lt;/code>, &lt;code>/risk&lt;/code>, and more).&lt;/li>
&lt;li>&lt;strong>Query parameters&lt;/strong> — &lt;code>format=json|text|shields&lt;/code> and &lt;code>mode=normal|chaos|corporate|security|wholesome|toxic|sarcastic|devops&lt;/code> (per-endpoint).&lt;/li>
&lt;li>&lt;strong>Shields.io endpoint badge&lt;/strong> — Dynamic README badges via &lt;code>format=shields&lt;/code> and optional &lt;code>style&lt;/code>, &lt;code>label&lt;/code>, &lt;code>color&lt;/code>, &lt;code>labelColor&lt;/code>.&lt;/li>
&lt;li>&lt;strong>Secure-by-default&lt;/strong> — Cache-Control: no-store, CORS scoped to GET/OPTIONS, dependency audits and CodeQL in CI, documented &lt;a href="https://github.com/samerfarida/doaas/blob/main/SECURITY.md">SECURITY.md&lt;/a> and private disclosure.&lt;/li>
&lt;li>&lt;strong>Observability&lt;/strong> — Cloudflare Workers logs and invocation sampling enabled for production debugging.&lt;/li>
&lt;/ul>
&lt;h3 id="quick-start">Quick Start&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>&lt;span style="color:#75715e"># Random (chaos mode)&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>curl -s &lt;span style="color:#e6db74">&amp;#34;https://doaas.dev/random?mode=chaos&amp;amp;format=text&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#75715e"># Blame, motivate, and more&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>curl -s &lt;span style="color:#e6db74">&amp;#34;https://doaas.dev/blame?format=text&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>curl -s &lt;span style="color:#e6db74">&amp;#34;https://doaas.dev/motivate?format=text&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>curl -s &lt;span style="color:#e6db74">&amp;#34;https://doaas.dev/help&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Live demo:&lt;/strong> &lt;a href="https://doaas.dev/help">doaas.dev/help&lt;/a> · &lt;strong>Try random:&lt;/strong> &lt;a href="https://doaas.dev/random?format=text">doaas.dev/random?format=text&lt;/a>&lt;/p></description></item><item><title>Building Workforce Security Guardrails Without Slowing Engineers</title><link>https://me.itsecurity.network/blog/building_workforce_security_guardrails/</link><pubDate>Sun, 01 Feb 2026 00:00:00 -0500</pubDate><guid>https://me.itsecurity.network/blog/building_workforce_security_guardrails/</guid><description>A practical, architecture-focused deep dive into designing workforce security guardrails that reduce blast radius and systemic risk without slowing engineering teams at scale.</description></item><item><title>MCP SSH Orchestrator</title><link>https://me.itsecurity.network/projects/mcp-ssh-orchestrator/</link><pubDate>Mon, 24 Nov 2025 00:00:00 -0500</pubDate><guid>https://me.itsecurity.network/projects/mcp-ssh-orchestrator/</guid><description>&lt;h2 id="mcp-ssh-orchestrator">MCP SSH Orchestrator&lt;/h2>
&lt;p>Zero-Trust SSH Orchestration for AI Assistants. Enforce declarative policy-as-code and audited access for Claude Desktop, Cursor, and any MCP-aware client.&lt;/p>
&lt;p>Launch in minutes with Docker + MCP tooling, deny-by-default controls, and hardened SSH key management.&lt;/p>
&lt;h3 id="what-problem-does-this-solve">What Problem Does This Solve?&lt;/h3>
&lt;p>&lt;strong>Imagine this:&lt;/strong> Your AI assistant (Claude, ChatGPT, etc.) can access your servers, but you&amp;rsquo;re terrified of what it might do. &lt;code>rm -rf /&lt;/code>? Delete your databases? Change firewall rules?&lt;/p></description></item><item><title>Secure Bash for macOS</title><link>https://me.itsecurity.network/projects/secure-bash-macos-ebook/</link><pubDate>Fri, 10 Oct 2025 00:00:00 -0500</pubDate><guid>https://me.itsecurity.network/projects/secure-bash-macos-ebook/</guid><description>&lt;h2 id="secure-bash-for-macos">Secure Bash for macOS&lt;/h2>
&lt;p>A practical, hands-on scripting guide for administrators and security engineers who want to master Bash on macOS.&lt;/p>
&lt;p>&lt;strong>Master Bash scripting on macOS—from fundamentals to enterprise automation.&lt;/strong>&lt;/p>
&lt;p>This comprehensive ebook teaches you how to write secure, efficient Bash scripts specifically tailored for macOS. Whether you&amp;rsquo;re an IT administrator managing thousands of devices, a security engineer hardening endpoints, or a power user automating your workflow, this book provides practical, real-world examples you can use immediately.&lt;/p></description></item><item><title>The Fatal .env Files Breach</title><link>https://me.itsecurity.network/blog/the-fatal-env-files-breachv1/</link><pubDate>Sun, 28 Sep 2025 20:14:39 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-fatal-env-files-breachv1/</guid><description>An in-depth analysis of the 2024 AWS .env files breach that compromised over 230 million cloud environments, examining the critical security architecture flaws and providing actionable defensive strategies.</description></item><item><title>Sigma Rules Decoded: Building Effective Threat Detection at Scale</title><link>https://me.itsecurity.network/blog/sigma-rules-decoded/</link><pubDate>Sun, 21 Sep 2025 07:01:23 -0400</pubDate><guid>https://me.itsecurity.network/blog/sigma-rules-decoded/</guid><description>A practical guide to implementing Sigma rules for vendor-agnostic threat detection that actually works, with strategies to overcome common challenges and build a mature detection engineering practice.</description></item><item><title>From Blind Spots to Insights: The CDM Revolution</title><link>https://me.itsecurity.network/blog/from-blind-spots-to-insights-the-cdm-revolution/</link><pubDate>Fri, 19 Sep 2025 07:00:46 -0400</pubDate><guid>https://me.itsecurity.network/blog/from-blind-spots-to-insights-the-cdm-revolution/</guid><description>How Continuous Diagnostics and Mitigation (CDM) is transforming security assessment by replacing inadequate point-in-time testing with real-time visibility, reducing breach detection times by 76% and eliminating critical security blind spots.</description></item><item><title>The Secret Weapon of Security Code Reviews</title><link>https://me.itsecurity.network/blog/the-secret-weapon-of-security-code-reviews/</link><pubDate>Wed, 03 Sep 2025 07:00:33 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-secret-weapon-of-security-code-reviews/</guid><description>Discover how security code reviews can prevent major breaches that automated scanners miss, with a practical 4-step framework for implementation.</description></item><item><title>SolarWinds: Supply Chain Trust Betrayal</title><link>https://me.itsecurity.network/blog/solarwinds-supply-chain-trust-betrayal/</link><pubDate>Tue, 26 Aug 2025 07:00:41 -0400</pubDate><guid>https://me.itsecurity.network/blog/solarwinds-supply-chain-trust-betrayal/</guid><description>A technical deep dive into the SolarWinds attack, examining how attackers compromised the software supply chain and providing actionable security architecture principles to prevent similar attacks.</description></item><item><title>From Engineer to Business Security Partner: Bridging the Technical to Business Gap</title><link>https://me.itsecurity.network/blog/from-engineer-to-business-security-partner/</link><pubDate>Mon, 25 Aug 2025 07:00:32 -0400</pubDate><guid>https://me.itsecurity.network/blog/from-engineer-to-business-security-partner/</guid><description>How security professionals evolve beyond technical excellence to become strategic business partners by speaking the language of outcomes, quantifying risk, and aligning to revenue and growth.</description></item><item><title>The Hidden Cost of Bad Data Classification</title><link>https://me.itsecurity.network/blog/the-hidden-cost-of-bad-data-classification/</link><pubDate>Sun, 24 Aug 2025 11:31:50 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-hidden-cost-of-bad-data-classification/</guid><description>How poor data classification undermines security investments, creates costly false positives, and leaves critical information vulnerable. Learn a practical framework for implementing effective data classification.</description></item><item><title>The 15-Minute Incident Response Playbook (Based on NIST)</title><link>https://me.itsecurity.network/blog/the-15-minute-incident-response-playbook/</link><pubDate>Wed, 20 Aug 2025 07:01:12 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-15-minute-incident-response-playbook/</guid><description>A concise, action-oriented incident response playbook based on the NIST framework. Learn how security teams can respond confidently to ransomware, data breaches, and insider threats in just 15 minutes.</description></item><item><title>The PAW Architecture Blueprint</title><link>https://me.itsecurity.network/blog/the-paw-architecture-blueprint/</link><pubDate>Tue, 19 Aug 2025 21:29:27 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-paw-architecture-blueprint/</guid><description>A deep dive into the Privileged Access Workstation (PAW) architecture, a critical security model for protecting high-value administrator accounts from credential theft and lateral movement.</description></item><item><title>The Duolingo API Security Blunder</title><link>https://me.itsecurity.network/blog/the-duolingo-api-security-blunder/</link><pubDate>Fri, 15 Aug 2025 08:37:37 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-duolingo-api-security-blunder/</guid><description>A deep dive into the 2024 Duolingo API breach, breaking down the architectural flaws that exposed 2.6 million users and providing actionable API security principles to prevent similar incidents.</description></item><item><title>Change Healthcare Ransomware Breakdown</title><link>https://me.itsecurity.network/blog/change-healthcare-ransomware-breakdown/</link><pubDate>Wed, 13 Aug 2025 22:14:31 -0400</pubDate><guid>https://me.itsecurity.network/blog/change-healthcare-ransomware-breakdown/</guid><description>The 2024 Change Healthcare ransomware attack exposed how a single missing control MFA on remote access systems led to the largest healthcare data breach in history. This post analyzes the architectural failures that allowed attackers to compromise 190 million patient records.</description></item><item><title>Microsoft's Zero Trust Transformation: A Case Study</title><link>https://me.itsecurity.network/blog/microsoft-zero-trust-transformation/</link><pubDate>Mon, 11 Aug 2025 00:56:53 -0400</pubDate><guid>https://me.itsecurity.network/blog/microsoft-zero-trust-transformation/</guid><description>A deep dive into Microsoft&amp;#39;s Zero Trust security model, breaking down their implementation into actionable phases for any organization looking to modernize its security architecture.</description></item><item><title>MITRE D3FEND: Bridging Attack &amp; Defense</title><link>https://me.itsecurity.network/blog/mitre-d3fend-bridging-attack-and-defense/</link><pubDate>Mon, 11 Aug 2025 00:24:24 -0400</pubDate><guid>https://me.itsecurity.network/blog/mitre-d3fend-bridging-attack-and-defense/</guid><description>MITRE D3FEND is the defensive complement to the popular ATT&amp;amp;CK framework. Learn how blue teams can map countermeasures directly to adversary techniques for a more effective defense.</description></item><item><title>The Silent Crypto Crisis</title><link>https://me.itsecurity.network/blog/the-silent-crypto-crisis/</link><pubDate>Sat, 09 Aug 2025 00:00:53 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-silent-crypto-crisis/</guid><description>A deep dive into why cryptographic key management is a critical but often overlooked security control, examining major breaches and providing a practical framework for robust key lifecycle management.</description></item><item><title>The Microsegmentation Imperative</title><link>https://me.itsecurity.network/blog/the-microsegmentation-imperative/</link><pubDate>Thu, 07 Aug 2025 00:00:53 -0400</pubDate><guid>https://me.itsecurity.network/blog/the-microsegmentation-imperative/</guid><description>A deep dive into why microsegmentation is a critical security control for modern Zero Trust architectures, how it differs from traditional segmentation, and practical steps for implementation.</description></item><item><title>AI Security Snake Oil: Seeing Through the Hype</title><link>https://me.itsecurity.network/blog/ai-security-snake-oil/</link><pubDate>Wed, 06 Aug 2025 00:28:54 -0400</pubDate><guid>https://me.itsecurity.network/blog/ai-security-snake-oil/</guid><description>A critical look at how vendors are overhyping AI in security, and how to distinguish genuine solutions from mere marketing buzz.</description></item><item><title>NIST CSF 2.0: An Architectural Revolution</title><link>https://me.itsecurity.network/blog/nist-csf-2-0-architectural-revolution/</link><pubDate>Wed, 06 Aug 2025 00:24:24 -0400</pubDate><guid>https://me.itsecurity.network/blog/nist-csf-2-0-architectural-revolution/</guid><description>NIST CSF 2.0 introduces the &amp;#39;Govern&amp;#39; function, fundamentally shifting security from just technical controls to a comprehensive, governance-led approach. This post explores the architectural implications for security programs.</description></item><item><title>macOS Security Hardening for Enterprise</title><link>https://me.itsecurity.network/blog/macos-security-hardening-for-enterprise/</link><pubDate>Fri, 01 Aug 2025 00:56:53 -0400</pubDate><guid>https://me.itsecurity.network/blog/macos-security-hardening-for-enterprise/</guid><description>Learn how to use the macOS Security Compliance Project (mSCP) to automate security baselines, achieve compliance with standards like CIS and NIST, and systematically harden Apple devices at scale.</description></item><item><title>Passwordless Auth: Worth the Effort?</title><link>https://me.itsecurity.network/blog/passwordless-auth-worth-the-effort/</link><pubDate>Mon, 28 Jul 2025 13:02:35 -0400</pubDate><guid>https://me.itsecurity.network/blog/passwordless-auth-worth-the-effort/</guid><description>Passwordless authentication with passkeys is rapidly evolving. This post examines the security benefits against implementation challenges and provides practical guidance for security architects evaluating this technology.</description></item><item><title>How I Built My Site</title><link>https://me.itsecurity.network/blog/how-i-built-my-site/</link><pubDate>Thu, 15 May 2025 23:19:24 -0400</pubDate><guid>https://me.itsecurity.network/blog/how-i-built-my-site/</guid><description>A complete walkthrough of building a fast, static personal website using Hugo, versioned with GitHub, and deployed on Cloudflare Pages.</description></item><item><title>Synthetic Data Hub</title><link>https://me.itsecurity.network/projects/synthetic-data-hub/</link><pubDate>Fri, 14 Mar 2025 23:30:20 -0400</pubDate><guid>https://me.itsecurity.network/projects/synthetic-data-hub/</guid><description>&lt;h2 id="-synthetic-data-hub">🛠️ Synthetic Data Hub&lt;/h2>
&lt;p>What is a &lt;strong>Synthetic data&lt;/strong>: Artificially generated data rather than produced by real-world events. Typically created using algorithms, synthetic data can be deployed to validate mathematical models and to train machine learning models.&lt;/p>
&lt;p>Data generated by a computer simulation can be seen as synthetic data. This encompasses most applications of physical modeling, such as music synthesizers or flight simulators. The output of such systems approximates the real thing, but is fully algorithmically generated.&lt;/p></description></item><item><title>Kid Friendly Bash Games</title><link>https://me.itsecurity.network/projects/kid-friendly-bash-games/</link><pubDate>Fri, 14 Mar 2025 23:01:47 -0400</pubDate><guid>https://me.itsecurity.network/projects/kid-friendly-bash-games/</guid><description>&lt;h2 id="kid-friendly-bash-games-">Kid-Friendly Bash Games 🎮&lt;/h2>
&lt;p>&lt;a href="https://github.com/marketplace/actions/super-linter">&lt;img alt="Super-Linter" loading="lazy" src="https://github.com/samerfarida/kid-friendly-bash-games/actions/workflows/super-linter.yml/badge.svg">&lt;/a>&lt;/p>
&lt;p>Welcome to the Kid-Friendly Bash Games repository! This collection contains simple, fun, and educational Bash games designed to teach kids the basics of coding. Each game focuses on fundamental programming concepts, making learning to code an enjoyable experience.&lt;/p>
&lt;h2 id="games-list-">Games List 🕹️&lt;/h2>
&lt;ol>
&lt;li>
&lt;h3 id="guess-the-number-">&lt;a href="https://github.com/samerfarida/kid-friendly-bash-games/blob/main/guess_the_number/README.md">Guess the Number&lt;/a> 🔢&lt;/h3>
&lt;p>A game where players guess a randomly selected number between 1 and 100.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Objective&lt;/strong>: Guess the number selected by the computer.&lt;/li>
&lt;li>&lt;strong>Key Concepts&lt;/strong>: Variables, loops, conditionals, input/output.&lt;/li>
&lt;li>&lt;a href="https://github.com/samerfarida/kid-friendly-bash-games/blob/main/guess_the_number/README.md">Learn More&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;h3 id="rock-paper-scissors-">&lt;a href="https://github.com/samerfarida/kid-friendly-bash-games/blob/main/rock_paper_scissors/README.md">Rock, Paper, Scissors&lt;/a> ✊✋✌️&lt;/h3>
&lt;p>A classic game where players choose rock, paper, or scissors and play against the computer.&lt;/p></description></item></channel></rss>