Blue Pill Security

Posts


Hiring

 Posted on May 1, 2025  |  Kevin Conley

Finding the right skills for the team [Read More]
strategy 

Deception in practice

 Posted on April 1, 2025  |  Kevin Conley

Deception in a simulated attack scenario [Read More]
april fools day special  technical 

Decoy credentials

 Posted on March 1, 2025  |  Kevin Conley

Building a basic decoy file [Read More]
technical 

Decoy files

 Posted on February 1, 2025  |  Kevin Conley

Building a basic decoy file [Read More]
technical 

Decoy machines

 Posted on January 1, 2025  |  Kevin Conley

Building a basic decoy machine [Read More]
technical 

Breaking ground

 Posted on December 1, 2024  |  Kevin Conley

How to integrate deception into a security discipline [Read More]
strategy 

Is deception the right fit?

 Posted on November 1, 2024  |  Kevin Conley

Things to consider before committing to building a deception program [Read More]
strategy 

Deception terminology

 Posted on October 1, 2024  |  Kevin Conley

Definitions of important terms in deception-for-security [Read More]
knowledge-base 

What is this blog about?

 Posted on September 30, 2024  |  Kevin Conley

Hello, (fake) world! [Read More]
Disclaimer: The opinions and descriptions expressed in this blog reflect my experience(s) and may not represent those of my employer

Kevin Conley  • © 2025  •  Blue Pill Security