<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>blue team Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/blue-team/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/blue-team</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 14 Nov 2025 18:34:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>blue team Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/blue-team</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</title>
		<link>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles</link>
					<comments>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 18:34:47 +0000</pubDate>
				<category><![CDATA[Geek]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1760</guid>

					<description><![CDATA[<p>— And why your SOC might actually need a Bard 🐉⚔️ Cybersecurity teams are often compared to armies, fire brigades, or special forces. Personally? I think they&#8217;re much closer to a party of heroes in a classic fantasy role-playing game. No matter how many frameworks, SIEMs, or AI tools we summon, defending a digital kingdom [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles">What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; How to Detect and Respond to Business Email (M365) Compromise</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 24 Feb 2022 19:18:55 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[fraud]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=866</guid>

					<description><![CDATA[<p>My key takeaways BEC external-to-internal passes all technical security measures like SPF, DKIM and DMARC BEC internal-to-internal bypasses anti-spam solutions Get comfy with PowerShell to interact with M365 since Jan 2019 MS enabled mailbox auditing for Exchange Online CrowdStrike Reporting Tool also reviews excessive permissions in Azure AD If you are suspiscous to have a [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365">Webinar takeaway &#8211; How to Detect and Respond to Business Email (M365) Compromise</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 07 Jul 2021 19:22:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[zeek]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=524</guid>

					<description><![CDATA[<p>My key takeaways Zeek does not capture whole packets but saves summaries of all conversations it sees to log files saves time and space &#34;You wouldn&#8217;t normally use Zeek for packet capture, instead you use it for analysis.&#34; &#8211; Bill Stearn Sending a lot more data then recieving might indicate malicious traffic use NetworkMiner to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security">Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-hacking-packet-captures-the-foundations-of-network-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 19:35:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solarburst]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=481</guid>

					<description><![CDATA[<p>My key takeaways First trojan probably was implemented 1983 by Ken Thompson, who invented Unix, C,.. He also warned back then: &#34;You can&#8217;t trust code that you did not totally create yourself&#34; Brand new hardware from the factory can be infected by malicious code as well Also open source software is constantly compromised example of [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network">Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: The Quest for the Kill Chain Killer Continues</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-the-quest-for-the-kill-chain-killer-continues</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-the-quest-for-the-kill-chain-killer-continues#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 13 May 2021 18:10:36 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[llmnr]]></category>
		<category><![CDATA[smb]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=457</guid>

					<description><![CDATA[<p>My key takeaways baseline defence must grow centralized logging required anyway VPNs need MFA too, esp with working from home early installations of Zoom-client on Windows got you a webserver running with open RDP JUGLAR = J-User-Global-Universal-DomainLocal-Resource More than 50% of enterprises that BHIS tests, still have support for LLMNR and NBNS enabled How to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-the-quest-for-the-kill-chain-killer-continues">Webinar Takeaway: The Quest for the Kill Chain Killer Continues</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-the-quest-for-the-kill-chain-killer-continues/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: EMERGENCY WEBCAST: OK, let´s talk about ransomware&#8230;</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 11 May 2021 17:52:08 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[deception]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=445</guid>

					<description><![CDATA[<p>My key takeaways 3 types of ransomware encrypt hard drive steal files and data and threat to release them both 1 &#38; 2 Ransomware gangs usually have great customer support it has become a serious business It doesn&#8217;t matter if you consider your organsiation a valuable target, if at least some money could be extorted [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware">Webinar Takeaway: EMERGENCY WEBCAST: OK, let´s talk about ransomware&#8230;</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: No SPAN Port? No Tap? No Problem!</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-no-span-port-no-tap-no-problem</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-no-span-port-no-tap-no-problem#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 18:07:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[home network]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=419</guid>

					<description><![CDATA[<p>My key takeaways setting up security in home network is no easy job no tap port? Think ARP cache poisoning don&#8217;t run it on a production network! Put RITA and Bettercap on a Raspberry Pi Bettercap is able to do full duplex ARP cache poisoning have to enable it in the config you can whitelist [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-no-span-port-no-tap-no-problem">Webinar Takeaway: No SPAN Port? No Tap? No Problem!</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-no-span-port-no-tap-no-problem/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: How to Analyze Encrypted Traffic on Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 22:00:15 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=372</guid>

					<description><![CDATA[<p>My key takeaways Encrypted traffic on the wire: can see headers, can&#8217;t see payload More and more traffic gets encrpyted like HTTPS and even DNS Most Threat Hunt techniques still work: beacons/strobes, long connections and connections to Threat Intel hosts Env Provided by Active Countermeasures Presenter: Alex Kirk from Corelight additional links https://corelight.blog/2020/11/19/corelight-at-home/ https://zeek.org/ Blog: [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network">Webinar takeaway: How to Analyze Encrypted Traffic on Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Atomic Red Team Hands-on Getting Started Guide</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 28 Jan 2021 23:00:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[simulation]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=368</guid>

					<description><![CDATA[<p>My key takeaways The Atomic Red Team Project (ART) is a open source library of scripted attacks ART uses the MITRE ATT&#38;CK Matrix as structure ART emulates what an Attacker might do after compromise; msf tries to make use of vulns in software Emulating attacks helps to improve detection of attacks and comparing security products [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide">Webinar takeaway: Atomic Red Team Hands-on Getting Started Guide</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
