Offense & Defense
Bridges red team insights with blue team readiness to shorten detection and response cycles.
Cyber Security Researcher · Standards Advocate · Educator
Three decades of building resilient infrastructure, championing global security standards, and mentoring teams on both sides of the cyber defense spectrum.
Matthew J. Harmon is a technologist who has been hands-on with offensive and defensive cyber security since the 1990s. He has designed and hardened UNIX-like environments—from Linux and FreeBSD to OpenBSD and HardenedBSD—while teaching teams how to interpret threat intelligence, hunt for intrusions, and recover from incidents without losing momentum.
Matthew shares his perspectives through public speaking, media contributions, and written guidance that translate complex emerging threats into actionable playbooks. He maintains a steady focus on practical, evidence-based security that meets teams where they are.
Bridges red team insights with blue team readiness to shorten detection and response cycles.
Designs secure-by-default network and cloud topologies, stress-tested against modern adversaries.
Develops courses, workshops, and mentoring programs that raise the bar for cyber practitioners.
Matthew represented ANSI as liaison to ISO and the ITU, contributing to the development of foundational security standards within ISO JTC 1 / SC 27, SC 31 / WG 7, and technical committees focused on fraud countermeasures and secure item management.
His work helped establish baseline expectations for radio-frequency identification security, software infrastructure protections, and smart transducer interfaces (ISO/IEC 21450, IEEE 1451).
A precise time-synchronisation reference that presents Modified Julian Dates with clean visual context.
Check My Footprint pairs live IP telemetry with Shodan InternetDB and VirusTotal intelligence for instant situational awareness.
Hosted reading of Applied Linux with synced manuscript and audio chapters direct from the S3 distribution.
A lighter look at path traversal mishaps—memes, cautionary tales, and teachable moments.
Hybrid-signed, parity-hardened archives with resumable workspaces, selective restore, and Reed–Solomon repair. Built for cold storage, remote recoveries, and trust-enforced workflows.
SF128 snowflake variants, compression math, and a live encoder/decoder that underpins telemetry pipelines with deduplicated log IDs ready for MsgPack/Zstd storage.
Experimental peer-to-peer messenger showcasing post-quantum key negotiation, proof-of-work gatekeeping, and defensive telemetry aimed at raising the bar for small-team collaboration tooling.
A playful, fully documented substitution cipher that rotates mappings quarterly—great for illustrating why agility, shared keys, and audit trails matter even in lightweight puzzle tooling.
A field toolkit for sanitizing compromised systems: guided checklists, detection scripts, and recovery notes distilled from real-world IR rotations.
We run a tiny in-browser proof-of-work to keep bots from bulk-downloading the résumé.
Keep this window open—once verification completes, the download will start automatically.