Bad, Good, and Super-Cringey Infosec Lab Environments

I’ve had the (dubious) honor and privilege of witnessing a couple decades of IT educational lab environments. Even after well over a decade of full-time cybersecurity work, I often still have to re-certify on various tasks which require I complete a live lab or CTF (capture the flag). I build such environments myself. The way… Read More Bad, Good, and Super-Cringey Infosec Lab Environments

Human Honeypots: I Make Friends (and So Should You)

I recently ran across a tweet by the very insightful Fernando Montenegro in which he makes an interesting point about a phenomenon we occasionally run into while examining social media profiles associated with a business: Do people also find it creepy/sleazy coming across fake LinkedIn profiles when researching a company/vendor? Makes me question the ethics… Read More Human Honeypots: I Make Friends (and So Should You)

Security Things to Consider When Your Apartment Goes ‘Smart’

A couple weeks ago, I vented my frustration as an ICS security professional at my apartment building forcibly converting to networked smart locks. My tweets were widely misinterpreted, so I’d like to talk a little bit about privacy and security aspects to consider if (when) the property you rent from decides to go “Smart”. To… Read More Security Things to Consider When Your Apartment Goes ‘Smart’

I reviewed 600+ call-for-paper submissions, (and you’ll probably guess what happened next.)

Ever wondered if your conference talk proposal measures up? I definitely do, every time I submit to a conference. Over the past week I reviewed over 600 call for paper submissions for the Derbycon information security conference. This was definitely a unique experience – I had participated in review boards in the past, but never… Read More I reviewed 600+ call-for-paper submissions, (and you’ll probably guess what happened next.)