On hype versus reality when it comes to covert channels and backdoors.
Watch more videos on my YouTube channel.
On hype versus reality when it comes to covert channels and backdoors.
Watch more videos on my YouTube channel.
Give me a perimeter firewall, an endpoint antivirus, and a strong place to stand, and I’ll move the world. Except when more than half our device inventory has neither. Well then. Now what?
Watch more videos on my YouTube channel.
Software supply chain attacks and defenses.
Watch more videos on my YouTube channel.
The WiPro breach reminds us of the importance of prioritizing security controls around what criminals want.
Watch more videos on my YouTube channel.
What happens when our insurance provider declares damages were causes by an act of war? Turns out, in many policies, they can avoid paying due to “war exclusions.”
Commentary on The New York Times article: Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong.
Watch more videos on my YouTube channel.
What to do when our organization has too much information?
Watch more videos on my YouTube channel.
Blacklisting vendors to protect against shadow IT. Shout out to Adam Eickhoff for the idea.
Watch more videos on my YouTube channel.
MySpace lost millions of photos and videos due to data corruption during a server migration. Upside, that probably includes those embarrassing photos from twelve years ago. Downside, data loss is data loss, and this reminds us of the importance of backing up our SaaS data.
Watch more videos on my YouTube channel.
One key takeaway from the 6th annual DevSecOps Community Survey conducted by Sonatype and others.
Watch more videos on my YouTube channel.
Presented at BSides SF 2019.
Muscle memory, incident responders will tell you, is crucial to acting quickly in a crisis. Cyber Threat Intelligence informs what we do, but practice ensures we do it well—executing effectively to eliminate the threat and protect the organization. This session provides an approach to developing security exercises and running practice drills. MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) forms the basis of this approach. We will cover the fundamentals of an exercise: selecting the story, identifying the tactics, threat modeling, table top discussions, adversarial emulation, and scoring. The session concludes with advice on creating an overall exercise program, focusing on repetition, momentum, and building muscle. Turn intelligence into practiced action with security game
Watch more videos on my YouTube channel.