The Evaluation: Stage 4 – Determining the Outcome

Wrapping up this series on evaluating technologies and services is actually fairly simple. Determining the outcome of an evaluation is, in fact, mechanical. That is to say, that you shouldn’t have any emotion or subjectivity in your determination… Continue reading The Evaluation: Stage 4 – Determining the Outcome

Video: Safe Harbor for Hackers

Join the Disclose.io Movement!
Video and Slide Deck from EH-Net Live! April 2019
The Internet has an Auto-Immune Problem! It affects everyone on the planet, whether they’ve been the victim of a cyber-attack directly or not. Even those who have ne… Continue reading Video: Safe Harbor for Hackers

Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations

You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash functions in Part 1, were introduced to symmetric ciphers, keys, and … Continue reading Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations

Hardware Hacking 101 – Lesson 3: Abusing UART (U Are RooT)

As a reminder, Lesson 1 was a primer on electronics and setting up your lab, and Lesson 2 was an introduction to classical hardware hacking. To get started with security-focused hardware hacking, let’s look at a pretty simple example: getting a root sh… Continue reading Hardware Hacking 101 – Lesson 3: Abusing UART (U Are RooT)

Video: Inside the MSRC – Blue Team, Bug Bounties & IR

See Security Done the Microsoft Way!
Video and Slide Deck from EH-Net Live! March 2019
So… here we are. For many of us, it’s been a brutal winter. As bad as it was, we survived! We’re only a few days into Spring, but it’s spring… Continue reading Video: Inside the MSRC – Blue Team, Bug Bounties & IR

Security Assumptions – Don’t Make an ASS of U and ME

Have you ever stopped to ask yourself if the things you are defending against are really your biggest security problems? I am going to challenge you to think about things a little differently, as I have been myself recently. Prepare yourself, as this m… Continue reading Security Assumptions – Don’t Make an ASS of U and ME

From Dev to Infosec Part 5 – Fortis Fortuna Adiuvat

Two years ago, I set out to get into cybersecurity. I had no idea where this journey would take me, and I had no aspirations at the time of turning this into a career. I’ve found that very rarely do people who have been doing something as long a… Continue reading From Dev to Infosec Part 5 – Fortis Fortuna Adiuvat

Webinar: Inside the MSRC – Blue Team, Bug Bounties & IR

Register Now to See Security Done the Microsoft Way!
Mechele Gruhn of Microsoft gives a behind the scenes view of the Microsoft Security Response Center (MSRC). Get the inside scoop on lessons from the past, how MS handles security incidents and bug bo… Continue reading Webinar: Inside the MSRC – Blue Team, Bug Bounties & IR