

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://robertsinfosec.com/</id>
  <title>robertsinfosec</title>
  <subtitle>Exploring infosec in my homelab.</subtitle>
  <updated>2025-12-14T10:23:45-05:00</updated>
  <author>
    <name>robertsinfosec</name>
    <uri>https://robertsinfosec.com/</uri>
  </author>
  <link rel="self" type="application/atom+xml" href="https://robertsinfosec.com/feed.xml"/>
  <link rel="alternate" type="text/html" hreflang="en"
    href="https://robertsinfosec.com/"/>
  <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator>
  <rights> © 2025 robertsinfosec </rights>
  <icon>https://robertsinfosec.com/assets/img/favicons/favicon.ico</icon>
  <logo>https://robertsinfosec.com/assets/img/favicons/favicon-96x96.png</logo>

  <image>
    <url>https://robertsinfosec.com/assets/img/favicons/favicon-96x96.png</url>
    <title>robertsinfosec</title>
    <link>https://www.robertsinfosec.com</link>
  </image>


  
  <entry>
    <title>OpenVMS in WSL</title>
    <link href="https://robertsinfosec.com/posts/openvms-in-wsl/" rel="alternate" type="text/html" title="OpenVMS in WSL" />
    <published>2025-11-19T12:00:00-05:00</published>
  
    <updated>2025-11-19T12:00:00-05:00</updated>
  
    <id>https://robertsinfosec.com/posts/openvms-in-wsl/</id>
    <content src="https://robertsinfosec.com/posts/openvms-in-wsl/" />
    <author>
      <name>robertsinfosec</name>
    </author>

  
    
    <category term="Homelab" />
    
    <category term="Virtualization" />
    
  

  
    <summary>
      





      Overview

In our previous post about OpenVMS, we covered how to get OpenVMS running on Proxmox using the free Community License from VMS Software Inc. (VSI). This time, I wanted to explore running OpenVMS in Windows Subsystem for Linux (WSL). Technically, the "VMS-XDE" (Cross-Development Environment) is really just most of OpenVMS compiled to run on Linux. So, this will run on an x86-64 Linux e...
    </summary>
  

  </entry>

  
  <entry>
    <title>A Look at Cyber Resilience</title>
    <link href="https://robertsinfosec.com/posts/a-look-at-cyberresilience/" rel="alternate" type="text/html" title="A Look at Cyber Resilience" />
    <published>2025-11-17T20:00:00-05:00</published>
  
    <updated>2025-11-17T20:00:00-05:00</updated>
  
    <id>https://robertsinfosec.com/posts/a-look-at-cyberresilience/</id>
    <content src="https://robertsinfosec.com/posts/a-look-at-cyberresilience/" />
    <author>
      <name>robertsinfosec</name>
    </author>

  
    
    <category term="Security" />
    
    <category term="Risk Management" />
    
  

  
    <summary>
      





      Overview

In the olden days of computing it was a great sign of IT maturity if there was traditional Disaster Backup and Recovery (DBaR) and Business Continuity Planning (BCP). These concepts focused on preparing for and recovering from significant disruptions, such as natural disasters or major system failures. However, as cyber threats have evolved and become more sophisticated, the need for ...
    </summary>
  

  </entry>

  
  <entry>
    <title>Using Dev Containers</title>
    <link href="https://robertsinfosec.com/posts/using-dev-containers/" rel="alternate" type="text/html" title="Using Dev Containers" />
    <published>2025-06-26T07:00:00-04:00</published>
  
    <updated>2025-06-26T07:00:00-04:00</updated>
  
    <id>https://robertsinfosec.com/posts/using-dev-containers/</id>
    <content src="https://robertsinfosec.com/posts/using-dev-containers/" />
    <author>
      <name>robertsinfosec</name>
    </author>

  
    
    <category term="Development" />
    
    <category term="DevOps" />
    
  

  
    <summary>
      





      If you work on more than one technology stack and/or if you have multiple team members working on one project, Dev Containers in VS Code can really help. Help what? Well, there are a few issues that are common:


  Environment Drift: Different developers have different versions of tools, libraries, or even operating systems.
  Onboarding Friction: New team members struggle to set up their local...
    </summary>
  

  </entry>

  
  <entry>
    <title>Self-Hosting with Docker Compose</title>
    <link href="https://robertsinfosec.com/posts/self-hosting-with-docker-compose/" rel="alternate" type="text/html" title="Self-Hosting with Docker Compose" />
    <published>2025-05-18T07:00:00-04:00</published>
  
    <updated>2025-05-18T07:00:00-04:00</updated>
  
    <id>https://robertsinfosec.com/posts/self-hosting-with-docker-compose/</id>
    <content src="https://robertsinfosec.com/posts/self-hosting-with-docker-compose/" />
    <author>
      <name>robertsinfosec</name>
    </author>

  
    
    <category term="Homelab" />
    
    <category term="Infrastructure" />
    
  

  
    <summary>
      





      Overview

I self-host a lot of little services - everything from Jellyfin, Pi-Hole, to Cyberchef to the occasional throwaway prototype. After years of tinkering, I've started to basically set them up the same way every single time. The pattern is:


  Purpose-built Ubuntu 24.04 VM with Docker installed (a VM in my ProxMox cluster)
  Docker Compose for whatever the service I want to run
  An unp...
    </summary>
  

  </entry>

  
  <entry>
    <title>Threat Modeling 101</title>
    <link href="https://robertsinfosec.com/posts/threat-modeling-101/" rel="alternate" type="text/html" title="Threat Modeling 101" />
    <published>2025-05-11T05:00:00-04:00</published>
  
    <updated>2025-05-11T05:00:00-04:00</updated>
  
    <id>https://robertsinfosec.com/posts/threat-modeling-101/</id>
    <content src="https://robertsinfosec.com/posts/threat-modeling-101/" />
    <author>
      <name>robertsinfosec</name>
    </author>

  
    
    <category term="Guides" />
    
    <category term="Security" />
    
  

  
    <summary>
      





      1. Overview

In modern day, cyber threats are becoming increasingly sophisticated, a reactive approach to security is no longer sufficient. We need to anticipate potential attacks and build defenses proactively. This is where threat modeling comes into play.


  Threat Modeling is a structured approach to identifying potential threats, vulnerabilities, and countermeasures early in the developme...
    </summary>
  

  </entry>

</feed>

