Tag: security
-
the art of not thinking about elephants
Approaching risk management should be done in the most holistic manner, this means that EVERY aspect of information flow should be taken into account. This article describes how a red-team test managed to exfiltrate data out of a closed/non-connected network using innovative thinking.
-
Picking up the glove – DC9723
Every time I get back from the annual DefCon/BlackHat/BSides conferences in Vegas, i usually run into some of the local security folks that managed to make the trip as well, and the plan ride home usually goes like this:”so, this year was pretty cool, huh?”, “yeah, funny how we only get to meet up so…
-
The power of collaboration (BlueHat post)
Collaborating on the blueHat blog post, and getting some additional insights
-
The Botnet Wars – industry Q&A
I was approached recently by Bart PÂ from Panda security in order to participate in an industry expert Q&A about the botnet wars (apparently he did his homework as he got quite the lineup to participate in this, guessed he can count me as a close miss :-)…). He managed to compile a great Q&A where…