![](https://images.squarespace-cdn.com/content/v1/61a7bfaef593f65a736336ec/0d166502-05a7-4d34-a667-dea564c31e3e/3.png)
Tech Bytes
Friends in low places
Think of these blogs as a follow-up reference for our conversation. In my playtime, this is where I stash technical research, analogies on technical concepts (usually referencing art 🎨), and resources for non-techie friends.
![Dance Fancy Bear. Dance!](https://images.squarespace-cdn.com/content/v1/61a7bfaef593f65a736336ec/1642189237995-YTQ9J05DZC9NL1L695N7/2.jpg)
Dance Fancy Bear. Dance!
GrrCon 2019 Presentation by Cat Self. Dance, Fancy Bear. Dance! A starving artist guide to threat emulation on macOS.
![cyber Security for the everyday Cat](https://images.squarespace-cdn.com/content/v1/61a7bfaef593f65a736336ec/1642182986046-OKLGQUFV8AODN08S9571/1.jpg)
cyber Security for the everyday Cat
Personal recommendation for framily on security tools to integrate into your everyday lifestyle around technology.
![cone of silence](https://images.squarespace-cdn.com/content/v1/61a7bfaef593f65a736336ec/1642196167251-KLQYA8R0P745LC9N4LFT/coneofsilence.jpg)
cone of silence
A diagram to explain the relationship between information collection and the amount of discernment needed when divulging information discovered publicly.