michael levan

Creating Change: Why I’m Focusing On Consulting & Training Instead Of Vendor Content (2025)

Almost five years ago (which is wild to think about) I set out on a journey. That journey has resulted in amazing times, times of tragedy, incredibly depression, and months where there didn’t appear to be any way to come up for air (or any reason to want to). During this time, I grew a […]

Creating Change: Why I’m Focusing On Consulting & Training Instead Of Vendor Content (2025) Read More »

3 Security Teams To Think About Implementing For Your Organization

In this short article, you’ll learn a few key team definitions for any organizations trying to implement a proper security practice. Blue Team When you implement a Blue Team within your organization, it’s all about defense. This is the typical team that organizations will start out with. If you see a SOC within an environment

3 Security Teams To Think About Implementing For Your Organization Read More »

PURPOSELY Exploiting A Kubernetes Cluster

There’s only one way to secure a Kubernetes cluster from an application stack (Deployments, Pods, ConfigMaps, Secrets, etc etc.) perspective, and that’s to see and understand an exploit. Otherwise, it’s all just theoretical, which is why it’s so important for everyone in security (including blue team) to understand how attacks work, pentesting, and vulnerabilities. In

PURPOSELY Exploiting A Kubernetes Cluster Read More »

AppSec: The Security Specialty That Rules Them All

In this blog post, you’ll learn about what AppSec (Application Security) is, what you need to break into AppSec, various AppSec tools, AppSpec terminology, and why it’s exciting. What’s AppSec? AppSec (Application Security) is the process of finding, fixing, and preventing security issues at the code or API (or both) level. The goal with AppSec

AppSec: The Security Specialty That Rules Them All Read More »

Attacking A Kubernetes Cluster (Enter Red Team Mode)

There have been several reports over the years from organizations like Red Hat and various security research firms and independent engineers that give us a few statistics. Two that are crucial to understand are: 93% of organizations suffer from a Kubernetes-related security risk. 55% of the security risks are due to misconfigurations. A misconfiguration could

Attacking A Kubernetes Cluster (Enter Red Team Mode) Read More »

A large pile of burning pallets

Impacts Of Not Setting Requests, Limits, and Quotas

Despite the innovation in the tech space from mainframes to servers to virtualization to cloud to Kubernetes, one thing holds true – resources are resources. Memory is memory. CPU is CPU. Storage is storage. These are resources that engineers still have to think and care about because, regardless of where you’re running workloads, these resources

Impacts Of Not Setting Requests, Limits, and Quotas Read More »