InfosecConsultCon
VALUABLE RESOURCES AND STRATEGIES REVEALED BY THE TOP INFOSEC CONSULTING ENTREPRENEURSHIP EXPERTS IN THE WORLD
VALUABLE RESOURCES AND STRATEGIES REVEALED BY THE TOP INFOSEC CONSULTING ENTREPRENEURSHIP EXPERTS IN THE WORLD
Interactively explore how common operating system activities impact NTFS timestamps.
Use a temporary system that is totally isolated from anything sensitive
Recommendations and lessons learned from the Equifax Data Breach
Illustrating the business value of early SAST
Here is a simple one-liner to check all the buckets in a single account:
Customize your bash_history...
I have found that Lynis (https://cisofy.com/lynis/), is a great way to audit a system for CIS benchmark compliance
How can a young professional convince startups that InfoSec is needed?
To summarize, SHA-1 has not been hacked, it is just simply not strong enough with today's computing power.
Guide to understanding FIPS 140-2 validation levels
I must trust that the benefit that I gain from using your service exceeds the concerns (Fear, Uncertainty, and Doubt) that I have about using it.
Encryption is not a magic bullet, but it does it play a vital role in a company’s data protection strategy.
Need something quick and dirty to create a log of outbound connections on Windows?
The /var/log/wtmp file in a Linux system contains data about past user logins.
I was researching BitTorrent and noticed in the Specification that it said that the typical length of a Piece was 250 kilobytes long. That made me curious...
The difference between a SOC 1 report and a SOC 2 report and why an organization would have both.
You should be interviewing the company that you are considering working for to determine if you will be a good fit for the culture and values of the company.
To help understand the data contained in a metainfo file, I created a python script called “bittorrent-parse.py.”
Using sed in bash scripts to check for root and OS version
After extensive searching the InterWebs and finding a lack of documentation on how to install TShark in a silent/unattended mode, I came across a related Sta...
There is a trend to perform all system administration tasks using scripts. The benefit of this approach is that the scripts can be checked into a source cont...
A friend of mine recently made the following post on his Facebook page. It resulted in an interesting discussion, so I thought that I would share it and my ...
Just as there is a life cycle for software development, there is a life cycle for contracting and this cycle must be managed as well to assure information se...
When working with the Payment Card Industry Data Security Standard (PCI-DSS) it is important to understand this definition to make sure your compliance progr...
Last post, I discussed the concept of defense-in-depth (DiD) where overlapping controls provide increased security, particularly if one of the controls shoul...
Sébastien Sauvague has just informed me that he has released Version 0.19 to address the Cross-Site Scripting vulnerability that I wrote about in my previous...
What if you could have hundreds of websites from which to launch an encrypted cross-site-scripting attack?
Think about your security controls. Have you identified which controls are preventive, and which are detective or deterrent controls? Also remember that th...
I was reading a debate on a Linkedin.com forum discussing all kinds of edge cases that some participants were arguing needed to be considered in a security ...
Today, I will show the results of using this tool for a cursory examination of the Shannon entropy of various, common file formats.
Entropy is the measurement of the randomness. The concept originated in the study of thermodynamics, but Claude E. Shannon in applied the concept to digital...
There is a variety of GUI-based utilities such as CCleaner or Freeraser, but SDelete is very simple to use for anyone comfortable with the command line. SDe...
I have found that not everyone has considered the role of security policy in an organization’s information security management program. Therefore, I will sh...
The Oz Data Centa (ozdc.net) was a very useful tool for monitoring PasteBin and I, for one will miss it.
I came across this typewritten list from about 25 years ago. I’m not exactly sure who wrote it, but at the time it made an impression on me.
Simple list of Eight Traits for Vision
The Log-Connections.ps1 file is a PowerShell Script that Logs active TCP connections and includes the process ID (PID) and process name for each connection o...
The Web is full of news about websites that have been breached or defaced by internet hackers. Occasionally these articles will include a hyperlink to Pasteb...
Since the Software Engineering Institute first published the capability maturity model, many other organizations have adapted the concepts to process maturit...
Earlier this week media outlets had a field day with the news story about Daniel Casillo, the guy who swam up to the JFK runway...
What do I mean by Zero Factor Authentication? ...
I love reading about brain research and understanding how we learn. It seems our brain is constantly making connections between things that we are learning ...
But ponder for a moment, a double meaning...
I am delighted to have an entry written by Jack Emanuelson, an independent contractor specializing in OPSEC and information assurance.
What struck me as ironic is that the document is labeled For Official Use Only (FOUO) which means that the government intends to limit its distribution.
Systems that contain more sensitive data need to have stronger passwords. Strong passwords do not use words from the dictionary and use symbols and numbers...
Let’s think about what trust has to do with what we do
Yesterday I was asked a question in passing. The question was this --Are we more secure today? My reflexive answer was...
In my role as a security professional, I have pondered the various dimensions of trust and have some thoughts on the subject...
During the course of my career I have had the opportunity to be exposed to a variety of leadership styles and have also adopted a style one of my own...
An essay of how I think about security management
As a leader, you want to establish the strategy (MBO) and operating parameters (MBE) and then inspire and fuel the discussion by MBWA.
The following excerpt is a thread... This discussion was the impetus for my article Is Skype Secure?
In today’s fast paced world, we are often so busy trying to scratch off items on our to-do lists that we short change ourselves of time to reflect on how to ...
Is server downtime an information security event even if it was due to a technical fault?
'Moments of truth' are snapshots that reveal the character of an organization.
I reread a John C. Maxwell book entitled The 17 Indisputable Laws of Teamwork. In this book, Maxwell has a chapter dedicated to the Law of the Scoreboard...
Several years ago, I saw a quote that has resonated with many of the people that I have consulted with over the years.
The little steps we take each day accumulate to become the distance traveled on the path to success.
One methodology that I use frequently is called the 'Plan-Do-Check-Act' Cycle.
A thought or two on the topic of Quality
An important consideration for organizations incorporating agile techniques into their Software Development Life Cycle (SDLC).