Things you should never say or do on an incident bridge
Daily series [9/10]
“We’ve definitely contained it” (when you’re not 100% sure)
False certainty can backfire badly.
Instead: "Containment is in progress and no further spread observed yet."
Things you should never say or do on an incident bridge
Daily series [9/10]
“We’ve definitely contained it” (when you’re not 100% sure)
False certainty can backfire badly.
Instead: "Containment is in progress and no further spread observed yet."
System Administration: Week 12: System Security II: From the Attack Life Cycle to Zero Trust
In this video, we continue approaching System Security from an attacker's point of view by understanding their common processes, following the Attack Life Cycle and then identifying how our defenses, supported by the Zero Trust model, can interrupt each stage.
Older related post: https://www.netmeister.org/blog/attack-life-cycle.html
🚨LIVE NOW!🚨 DevOps/SRE Instructor Livestream
On this lovely Monday, let's chat about #Linux #SystemAdministration, #SelfHosting, or any other topic in the #DevOps and #SRE space you're interested in!
Owncast: https://live.monospacementor.com/

Helping DevOps people grow
GitHub's uptime back to two 9s... technically.
24 hours until the CfP for "SREday Munich 2026 Q2" closes: https://papercall.io/cfps/6521/submissions/new
System Administration: Week 12: System Security II: Defining a Threat Model
In this video, we look at the concept of a Threat Model and how the attack economics may shift based on your adversaries capabilities and motives. We introduce the STRIDE and DREAD models and draw a few circles, of course.
Obligatory James Mickens "This World of Ours" citation here:
https://www.usenix.org/system/files/1401_08-12_mickens.pdf
Things you should never say or do on an incident bridge
Daily series [8/10]
Everyone talk at once (or allowing chaos)
Unstructured calls waste critical time.
Stop it: "One speaker at a time, please. Steve, give your update."
Things you should never say or do on an incident bridge
Daily series [7/10]
8. “It’s fixed” (without validation)
Premature closure is a classic failure.
Better: “Fix deployed. Monitoring for stability before eclaring resolution."
System Administration: Week 12: System Security I: Risk Assessment
In this video, we begin our dedicated discussion of System Security with a look back at how we've talked about security relevant aspects in previous videos and then moving forward to defining how we can begin to assess risk rather than attempt to "secure" a system.
