12 BUILDING BESPOKE TOOLS

The majority of folks who work in information security will tell you they’re never short of things to keep them busy. There are always improvements and enhancements to be made, changes to respond to, incidents to investigate and, of course, a never-ending tidal wave of newly discovered software vulnerabilities and malware. To overcome this, a commonly cited mantra is ‘work smarter, not harder’, and one of the ways we can work smarter is by building bespoke tools to automate or expedite a specific repeatable process or function that is core to our work.

Although any information security function can benefit from the use of custom tools, in the world of the red team, the need for automation and bespoke tooling is ...

Get Security Operations in Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.