Tech Solvency / Blue Team


Architecture/ecosystem

Ransomware

Networking / WAN

Risk

Monitoring, detection, and hunting

OSINT and general INT

Vulnerability management - reporting, detection, and modeling

Audit

Device inventory and classification

Zero-trust/BeyondCorp

PKI and certificates

Hardening and config management - general

Hardening and config management - mobile

Hardening and config management - web

Hardening and config management - browser

Hardening and config management - Windows

Hardening and config management - Apple

Password and secret management

Media/document cleaning and management

IR / malware analysis / reverse engineering

AAA

Encryption

Platform-specific

Regulatory compliance

Cloud

IoT

Training

Social engineering / phishing

Management/teams

Personal/individual

National/international/political

Toolkits

Bug reporting and bounties

General enterprise (lists)

Measurement and metrics

Meta - threads, summaries, and indexes