<?xml version="1.0" encoding="UTF-8" ?> <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel> <title>Phil Massyn</title><description>Personal site of Phil Massyn</description><link>https://www.massyn.net/</link><atom:link href="https://www.massyn.net/feed_rss_created.xml" rel="self" type="application/rss+xml" /> <language>en</language> <pubDate>Tue, 24 Mar 2026 09:00:23 -0000</pubDate> <lastBuildDate>Tue, 24 Mar 2026 09:00:23 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.9</generator> <image> <url>None</url> <title>Phil Massyn</title> <link>https://www.massyn.net/</link> </image> <item> <title>AI Risk Metholodogy</title> <author>Phil Massyn</author> <category>ai</category> <category>claude</category> <category>grc</category> <description>&lt;h1&gt;Dealing with AI Risk&lt;/h1&gt; &lt;p&gt;Every few years, something new comes along and the infosec community collectively loses its mind. AI is no different. Businesses are moving fast, GRC teams are scrambling to catch up, and everyone is asking the same question - how do we manage this risk?&lt;/p&gt; &lt;p&gt;I&#39;ve been in this space long enough to know that the answer is usually simpler than it looks.&lt;/p&gt;</description> <link>https://www.massyn.net/2026/03/24/ai-risk-metholodogy.html</link> <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2026/03/24/ai-risk-metholodogy.html</guid> </item> <item> <title>My Experience with CFMoto</title> <author>Phil Massyn</author> <category>motorcycle</category> <category>review</category> <description>&lt;h1&gt;When &#34;Complimentary&#34; Becomes a Subscription: My Experience With CFMoto&lt;/h1&gt; &lt;p&gt;I am writing this for future riders, not to vent, and not because I think CFMoto is going to suddenly change course because of one unhappy customer.&lt;/p&gt; &lt;p&gt;They will not.&lt;/p&gt; &lt;p&gt;But if you are researching CFMoto bikes, especially the 800MT, you deserve to understand what changed &lt;em&gt;after&lt;/em&gt; purchase, and why that change matters.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/12/30/my-experience-with-cfmoto.html</link> <pubDate>Tue, 30 Dec 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/12/30/my-experience-with-cfmoto.html</guid> </item> <item> <title>Social Media Ban</title> <author>Phil Massyn</author> <category>opinion</category> <category>politics</category> <category>social media</category> <description>&lt;h1&gt;Social Media Ban&lt;/h1&gt; &lt;p&gt;Welcome to December 10, 2025, the &lt;a href=&#34;https://peo.gov.au/understand-our-parliament/history-of-parliament/history-milestones/australian-parliament-history-timeline/events/online-safety-amendment-social-media-minimum-age-act-2024&#34;&gt;day of reckoning for Social Media Platforms and under 16 year olds&lt;/a&gt; across Australia, where they are booted off social media networks. Is this the right call?&lt;/p&gt;</description> <link>https://www.massyn.net/2025/12/10/social-media-ban.html</link> <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/12/10/social-media-ban.html</guid> </item> <item> <title>claude-code-review</title> <author>Phil Massyn</author> <category>agentic</category> <category>ai</category> <category>claude</category> <description>&lt;h1&gt;Agentic coding - a review of Claude Code&lt;/h1&gt; &lt;p&gt;I wrote previously about some thoughts on &lt;a href=&#34;coding-with-ai.md&#34;&gt;ai coding&lt;/a&gt;, and today I&#39;d like to expand on my recent experience. Earlier this month, I took the plunge and bought the Pro subscription to &lt;a href=&#34;https://claude.ai&#34;&gt;Claude.ai&lt;/a&gt;.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/07/30/claude-code-review.html</link> <pubDate>Wed, 30 Jul 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/07/30/claude-code-review.html</guid> </item> <item> <title>Australian ASX Domain Security Report</title> <author>Phil Massyn</author> <category>aws</category> <category>security</category> <category>sso</category> <description>&lt;h1&gt;Australian ASX Domain Security Report&lt;/h1&gt; &lt;p&gt;I do a lot of work with Australian ASX companies, so naturally I&#39;ve been inspired by &lt;a href=&#34;https://crawler.ninja/&#34;&gt;Scott Helme&#39;s Crawler Ninja&lt;/a&gt; project to get a sense of where the security posture of all these companies sits. There&#39;s a ton of information that every website reveals about itself, so by simply looking at what they publicly tell the world, let&#39;s do a bit of a deep dive for the month of July.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/07/26/australian-asx-domain-security-report.html</link> <pubDate>Sat, 26 Jul 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/07/26/australian-asx-domain-security-report.html</guid> </item> <item> <title>Zero Trust for Applications</title> <author>Phil Massyn</author> <category>development</category> <category>security</category> <category>zero trust</category> <description>&lt;h1&gt;Zero Trust for Applications&lt;/h1&gt; &lt;p&gt;The Zero Trust methodology has been around for a while, and many organisations have been implementing Zero Trust principles. When considering applications deployed in an enterprise, organisations typically implement zero trust at the infrastructure layer, protecting access to and from applications and securing network communications.&lt;/p&gt; &lt;p&gt;Infrastructure-level protection is essential, but there&#39;s another threat vector: the application itself. While SDLC processes and security tools help secure code, there&#39;s an opportunity to implement Zero Trust principles directly within applications.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/07/08/zero-trust-for-applications.html</link> <pubDate>Tue, 08 Jul 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/07/08/zero-trust-for-applications.html</guid> </item> <item> <title>Reporting Tools</title> <author>Phil Massyn</author> <category>grafana</category> <category>lookerstudio</category> <category>metabase</category> <category>observablehq</category> <category>powerbi</category> <category>reporting</category> <description>&lt;h1&gt;Reporting Tools Overview&lt;/h1&gt; &lt;p&gt;As a Cyber specialist, I have had to develop quite a few security dashboards over the years. This has lead me down a path of data engineering, combining my expertise in Cyber engineering with data. While working with different reporting tools, I have come to know some of them quite well, and in this blog post, I will share some of my thoughts on the different tools, and give you a bit of insight to which one to choose for your next project.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/06/14/reporting-tools.html</link> <pubDate>Sat, 14 Jun 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/06/14/reporting-tools.html</guid> </item> <item> <title>Host your own reporting platform</title> <author>Phil Massyn</author> <category>aws</category> <category>dashboard</category> <category>fargate</category> <category>grafana</category> <category>metabase</category> <category>reporting</category> <description>&lt;h1&gt;HOWTO: Host your own reporting platform on AWS&lt;/h1&gt; &lt;p&gt;&lt;a href=&#34;https://metabase.com&#34;&gt;Metabase&lt;/a&gt; and &lt;a href=&#34;https://grafana.com&#34;&gt;Grafana&lt;/a&gt; are both quite capable reporting platforms. Both vendors offer you the ability to run the software for free on your own infrastructure, so it&#39;s quite an attractive option for companies who would like to have some business intelligence capability without breaking the bank. In this guide, I will show you how can use the Cloudformation template to deploy these reporting tools on your aws environment.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/04/13/host-your-own-reporting-platform.html</link> <pubDate>Sun, 13 Apr 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/04/13/host-your-own-reporting-platform.html</guid> </item> <item> <title>The Metric Library: Practical Security Metrics for Real Dashboards</title> <author>Phil Massyn</author> <category>automated security reporting</category> <category>continuous assurance</category> <category>cyber dashboard</category> <category>dashboard</category> <category>security</category> <description>&lt;h1&gt;The Metric Library: Practical Security Metrics for Real Dashboards&lt;/h1&gt; &lt;p&gt;&#34;Build my cyber security dashboard, and put metrics on the board&#34; - A statement I have heard all too often, and when you go into the design phase to choose the metrics, there are blank stares all around the room. We want to measure &lt;em&gt;something&lt;/em&gt;, but we don&#39;t know what.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/04/12/the-metric-library-practical-security-metrics-for-real-dashboards.html</link> <pubDate>Sat, 12 Apr 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/04/12/the-metric-library-practical-security-metrics-for-real-dashboards.html</guid> </item> <item> <title>Security is not Compliance</title> <author>Phil Massyn</author> <category>compliance</category> <category>compliance</category> <category>security</category> <category>security</category> <description>&lt;h1&gt;Security is not Compliance&lt;/h1&gt; &lt;p&gt;Some companies like to combine their Security and Compliance teams into one entity. I&#39;ve worked in environments like that before, and I can tell you from experience that it is usually a bad idea to mix the two. Let&#39;s dig into it.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/04/06/security-is-not-compliance.html</link> <pubDate>Sun, 06 Apr 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/04/06/security-is-not-compliance.html</guid> </item> <item> <title>Who&#39;s using my certificates?</title> <author>Phil Massyn</author> <category>aws</category> <category>certificate</category> <category>security</category> <description>&lt;h1&gt;Who&#39;s using my certificates?&lt;/h1&gt; &lt;p&gt;A few weeks ago, &lt;a href=&#34;https://aws.amazon.com&#34;&gt;aws&lt;/a&gt; informed me that it was unable to renew some of my &lt;a href=&#34;https://aws.amazon.com/certificate-manager/&#34;&gt;ACM&lt;/a&gt;, naturaly because I moved it all over to &lt;a href=&#34;https://www.cloudflare.com&#34;&gt;Cloudflare&lt;/a&gt; a few months ago. Things got interesting when I tried to clean it up..&lt;/p&gt;</description> <link>https://www.massyn.net/2025/03/23/whos-using-my-certificates.html</link> <pubDate>Sun, 23 Mar 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/03/23/whos-using-my-certificates.html</guid> </item> <item> <title>Coding with AI</title> <author>Phil Massyn</author> <category>ai</category> <category>ai</category> <category>chatgpt</category> <category>claude</category> <category>coding</category> <category>coding</category> <description>&lt;h1&gt;Coding with AI&lt;/h1&gt; &lt;p&gt;Tools like &lt;a href=&#34;https://chatgpt.com&#34;&gt;ChatGPT&lt;/a&gt; have been a game changer in a lot of industries. There is a fear floating that AI will replace programmers, displacing more jobs. Over the past year I have been using these tools in my own coding journey, and I learned a few things along the way.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/03/09/coding-with-ai.html</link> <pubDate>Sun, 09 Mar 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/03/09/coding-with-ai.html</guid> </item> <item> <title>The Art of Troubleshooting</title> <author>Phil Massyn</author> <category>troubleshooting</category> <category>troubleshooting</category> <description>&lt;h1&gt;The Art of Troubleshooting&lt;/h1&gt; &lt;p&gt;As technicians, we often have to solve some difficult problems. I&#39;ve had my fair share of whoppers, were I thought the world is coming crashing down. After a while, I started learning a process for dealing with technical problems.&lt;/p&gt;</description> <link>https://www.massyn.net/2025/02/15/the-art-of-troubleshooting.html</link> <pubDate>Sat, 15 Feb 2025 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2025/02/15/the-art-of-troubleshooting.html</guid> </item> <item> <title>Jinja 2 templates with Python</title> <author>Phil Massyn</author> <category>howto</category> <category>jinja2</category> <category>python</category> <description>&lt;h1&gt;Generate documents with Jinja2 in Python&lt;/h1&gt; &lt;p&gt;There are cases where you record data in a number of data sources, and then need to generate documentation from that data. One case I get involved in from time-to-time is to generate documentation from data collected in various data sources. Rather than copying-and-pasting, we can use code to dynmically generate documentation. In this post, I will show you some examples in how we can use &lt;a href=&#34;https://jinja.palletsprojects.com/en/stable/&#34;&gt;jinja2&lt;/a&gt; to generate &lt;a href=&#34;https://www.markdownguide.org/&#34;&gt;markdown&lt;/a&gt; in Python.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/11/17/jinja-2-templates-with-python.html</link> <pubDate>Sun, 17 Nov 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/11/17/jinja-2-templates-with-python.html</guid> </item> <item> <title>Update Route 53 dynamically</title> <author>Phil Massyn</author> <category>aws</category> <category>route53</category> <description>&lt;h1&gt;Update Route 53 dynamically&lt;/h1&gt; &lt;p&gt;&lt;a href=&#34;https://aws.amazon.com/route53/&#34;&gt;Route 53&lt;/a&gt; is the DNS service on Amazon Web Services. It does everything from domain registration to the hosting and management of domain names.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/11/16/update-route-53-dynamically.html</link> <pubDate>Sat, 16 Nov 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/11/16/update-route-53-dynamically.html</guid> </item> <item> <title>Security for Engineers</title> <author>Phil Massyn</author> <category>development</category> <category>security</category> <description>&lt;h1&gt;Security for Engineers&lt;/h1&gt; &lt;p&gt;Many of us have the need to develop code, code that may have access to very sensitive data, or code that has the ability to wreck havoc on an environment. Whatever the development requirement is, there is a need to be vigilant with the code you develop, and ensuring that you do not inadvertently introduce security issues that could otherwise have been avoided.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/10/11/security-for-engineers.html</link> <pubDate>Fri, 11 Oct 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/10/11/security-for-engineers.html</guid> </item> <item> <title>Involuntary Data Breaches</title> <author>Phil Massyn</author> <category>breach</category> <category>security</category> <description>&lt;h1&gt;Involuntary Data Breaches&lt;/h1&gt; &lt;p&gt;An involuntary data breach is a data breach where you information got compromised without your direct involvement. This is typically where your information is stored in a data location that you&#39;re unaware of, or have no control over. In a recent security incident, my own contact details have been exposed, through a friend&#39;s compromised phone. This is the story of that event.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/09/24/involuntary-data-breaches.html</link> <pubDate>Tue, 24 Sep 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/09/24/involuntary-data-breaches.html</guid> </item> <item> <title>Single Sign On</title> <author>Phil Massyn</author> <category>identity</category> <category>list</category> <category>sso</category> <description>&lt;h1&gt;Single Sign On&lt;/h1&gt; &lt;p&gt;Single Sign-On (SSO) is an authentication process that allows users to access multiple applications or services with one set of login credentials—typically a username and password. Instead of having to log in separately to each application, users authenticate once through a central identity provider, which then grants access to connected systems. This approach simplifies the user experience by reducing password fatigue and improving productivity, as users no longer need to manage multiple accounts or remember numerous passwords. SSO also enhances security by centralizing authentication and allowing for more robust controls, such as multi-factor authentication and centralized monitoring, thereby reducing the attack surface for potential breaches.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/09/02/single-sign-on.html</link> <pubDate>Mon, 02 Sep 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/09/02/single-sign-on.html</guid> </item> <item> <title>Security Breach Transparency</title> <author>Phil Massyn</author> <category>breach</category> <category>opinion</category> <category>security</category> <category>ticketek</category> <description>&lt;h1&gt;Security Breach Transparency&lt;/h1&gt; &lt;p&gt;Another security breach has &lt;a href=&#34;https://www.abc.net.au/news/2024-05-31/ticketek-australia-cyber-security-data-breach-names-emails-leak/103921986&#34;&gt;made the news&lt;/a&gt;. This time the folks at &lt;a href=&#34;https://www.teg.com.au/statement-regarding-ticketek-cyber-incident/&#34;&gt;Ticketek&lt;/a&gt; are having a hard time explaining why ...&lt;em&gt;customers&#39; names, emails and dates of birth may have been accessed in cyber security breach&lt;/em&gt;.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/06/14/security-breach-transparency.html</link> <pubDate>Fri, 14 Jun 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/06/14/security-breach-transparency.html</guid> </item> <item> <title>Intro to Google Cloud</title> <author>Phil Massyn</author> <category>gcp</category> <category>gcp</category> <description>&lt;h1&gt;Introduction to Google Cloud&lt;/h1&gt; &lt;p&gt;I will always have a soft spot for &lt;a href=&#34;https://aws.amazon.com&#34;&gt;AWS&lt;/a&gt; as my preferred cloud provider. A few weeks ago I was asked to develop a solution on &lt;a href=&#34;https://cloud.google.com&#34;&gt;Google Cloud&lt;/a&gt;, and while at first I had my reservations, it didn&#39;t take long for me to start liking it.&lt;/p&gt;</description> <link>https://www.massyn.net/2024/06/08/intro-to-google-cloud.html</link> <pubDate>Sat, 08 Jun 2024 00:00:00 +0000</pubDate> <source url="https://www.massyn.net/feed_rss_created.xml">Phil Massyn</source><guid isPermaLink="true">https://www.massyn.net/2024/06/08/intro-to-google-cloud.html</guid> </item> </channel> </rss>