Webinar: Learning AI for Hackers – A Visual Primer on Dec 20 2018

Register Now for a Career Foundation in Data Science!
Join Joshua Saxe, Chief Data Scientist at Sophos and author of “Malware Data Science”, for an exploration of AI for the visual learner. Yes… there will be code, tools and advanced math… Continue reading Webinar: Learning AI for Hackers – A Visual Primer on Dec 20 2018

Book Review: Hacking for Dummies 6th Edition

Hacking for Dummies by Kevin Beaver is an information security professional’s introduction to ethical hacking. It is 22 chapters of information ranging from definitions (kept to a minimum) to reporting findings and everything in between. It als… Continue reading Book Review: Hacking for Dummies 6th Edition

The Evaluation: Stage 2 – Definition of Success Criteria

If you’ve read along so far, we’ve summarized the process of evaluating and choosing something new. We then helped you to define a specific problem to be solved. Whether you need a specific niche new tool for the toolbox, or are replacing s… Continue reading The Evaluation: Stage 2 – Definition of Success Criteria

From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt

While I’ve written a lot of code in my time, I don’t think I’ve ever firmly appreciated how complex it can be to write secure code. We go about our lives taking for granted that our apps will just work, and hopefully the programmers u… Continue reading From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt

Webinar: The Bots Are Coming! A Blue Teamer Survival Guide on Nov 29 2018

Register Now to See the SOC of Tomorrow and How to Survive It!
Peter Schawacker whips SOCs into shape with Security Automation and Orchestration (SOAR), SIEM Analytics, Big Data, Vulnerability Management and a healthy amount of AI for Deloitte customer… Continue reading Webinar: The Bots Are Coming! A Blue Teamer Survival Guide on Nov 29 2018

Ease Me Into Cryptography Part 2: Symmetric Ciphers

In the first article in this series on the basics of crypto, “Ease Me Into Cryptography Part 1: Buzzwords and Hash Function”, we learned some lingo and talked about the different aspects of hash functions. Remember that hash functions are one-way &#821… Continue reading Ease Me Into Cryptography Part 2: Symmetric Ciphers

Travel Hacking for the Successful InfoSec Pro

So, you want to be a road warrior? Maybe your job has morphed into something where travel is now part of the fun. Or maybe travel is required to reach that InfoSec rock star status you’ve always desired. Either way I want to share some of the tips and … Continue reading Travel Hacking for the Successful InfoSec Pro

Video: Blockchain Hacking for Investigating Cryptocurrencies

Video and Slide Deck from EH-Net Live! Oct 2018
Follow the money. Be it business, politics or crime, this is a common method of trying to find out who’s involved and their motivations. In the world of cyber crime, bad actors use cryptocurrencies for th… Continue reading Video: Blockchain Hacking for Investigating Cryptocurrencies

The Evaluation: Stage 1 – Definition of the Problem to be Solved

I need a better pen.
That statement may mean something dramatically different depending on who just said the words. In some cases, like with me, it means I want more consistent ink and a body that fits comfortably in my hand for longer periods of time…. Continue reading The Evaluation: Stage 1 – Definition of the Problem to be Solved

Maintaining a Pulse: Ransomware in the Healthcare Sector

It seems in media today, the rise of ransomware has plateaued and remained painstakingly prevalent , targeting the most critical of data. Committed through financially motivated efforts, these organizations still wake to the sorrowful sound of their as… Continue reading Maintaining a Pulse: Ransomware in the Healthcare Sector