Home

PEBCAK Consulting LLC
Cybersecurity content, research, and insights from Ryan Nolette.
Areas of Expertise
- Cloud Security - AWS security architecture and best practices
- Threat Hunting - Advanced persistent threat detection and analysis
- Incident Response - Digital forensics and breach investigation
- Security Research - Vulnerability research and disclosure
- Education - Speaking engagements and knowledge sharing
Recent Highlights
- Co-authored Huntpedia - A Threat Hunter’s Guide
- Featured on “Screaming in the Cloud” podcast discussing vulnerability disclosure
- Speaker at FWD:Cloudsec EU 2024, Blackhat 2025, and Defcon 2025
- Regular contributor to security conferences and publications
-
Subscribe to our YouTube channel for security insights and presentations
Posts
-
Building Ulysses Mcp From Frustration To A Smarter Writing Workflow
-
Welcome to PEBCAK Consulting LLC
-
Building AWS Detective: Lessons from the Field
-
Threat Hunting: From Endpoint to Cloud
-
Beyond the Perimeter Podcast - Turning a Hobby Into a Career
-
5 Objectives for Establishing an API-First Security Strategy
-
Top 3 Takeaways From DerbyCon
-
Threat Hunter Profile - Ryan Nolette
-
Endpoint and Network Hunting: A Q&A with Ryan Nolette
-
Situational-Awareness Driven Threat Hunting
-
Threat Hunting with Bro
-
Threat Hunting with Carbon Black
-
Finding Evil When Hunting for Lateral Movement - Part 3
-
How Attackers Lay the Groundwork for Lateral Movement - Part 2
-
Understanding Lateral Movement - Part 1
-
Leveraging the OODA Loop for Better Endpoint Security
-
How I Quit Freaking Out Over Strange Network Traffic
-
Huntpedia - A Threat Hunter's Guide
-
What I'm Thankful for as a Security Practitioner
-
How to Investigate a Bitcoin Mining Malware Infection
-
Defuse Booby-Trapped Malware by Catching it, Stopping it and Killing it with Fire
-
Carbon Black's Ryan Nolette Discusses Ransomware on Forensic Lunch
-
Say No to Ransomware
-
Point-of-Sale Still Not Getting the Point of Security
-
After Taking a Bite Out of SSL 3
-
Point-of-Sale Malware Just Won't 'Backoff'
-
Investigating Bitcoin Malware Infections Using Carbon Black
-
Hitting the 'CryptoWall'
-
An April Fool's Treasurehunt
-
Bitcoin-Mining Malware 101
-
New 'Crypto' Ransomware Lurks in the Shadows
-
ACSC - 5 Things To Do After A Breach
-
5 Things an Enterprise Must Do if There's A Security Breach
-
In 2016 Resolve to Slim Down POS Malware
-
Zero-Day Mitigation: How Bit9 Blocks the Latest Microsoft Word Vulnerability
-
WireLurker - How to Flag It, Tag It and Bag It
subscribe via RSS