There has been extensive, emotional political debate over the use of shadow IT and misuse of mobile phones in sensitive areas by former US Secretaries of State Colin Powell and Hillary Clinton. There is a much needed and very complex discussion we must have about executive security awareness and buy-in, but due to extensive misinformation… Read More Why do Smartphones make great Spy Devices?
I do quite a bit of InfoSec résumé reviewing and critiquing, both personally and professionally, so I’m repeatedly asked for tips on common problems. In order to ensure that these problems were not exclusive to me, I recently had a lengthy discussion with a number of InfoSec professionals involved in hiring (thank you!). We discussed… Read More The Worst InfoSec Resume, Ever
[You can find the previous chapters in this continuing blog series here: Starting an InfoSec Career – The Megamix – Chapters 1-3 Starting an InfoSec Career – The Megamix – Chapters 4-5] Chapter 6: Self-Study Options In the previous chapters, I’ve discussed potential career paths, education and certification options, and the fundamental knowledge needed to become a… Read More Starting an InfoSec Career – The Megamix – Chapter 6
Chapter 4: Blue Team Careers With the help of many people in InfoSec who kindly gave me advice and quotes, I have created a perhaps overly simplistic listing of common InfoSec roles in today’s market. For each role I have listed a brief summary of what the job does, where these jobs can be found… Read More Starting an InfoSec Career – The Megamix – Chapters 4-5
Around con time, I’m frequently asked ‘how to become a computer hacker’. Since it’s a delightfully non-specific question, I have decided to illustrate my response for posterity: The most critical things when getting into infosec are the right attitude, curiosity, and interest, a solid foundation of technical knowledge, and the motivation to take advantage of… Read More How to become a hacker… now with 80% more pictures.
One of my friends commented today as the infosec community broke into another quabble that, If nothing else, today we learned how fragile the InfoSec community is. — Robert Olson (@NerdProf) September 9, 2015 Okay. Let’s step back for a moment. Disagree or agree with me, but kindly let me present an argument. Have you… Read More Community
Wow! I can’t believe Gen Con is already over. We had an amazing time at the con and giving our Hacking in Fiction panel for 43 lovely people on Thursday night. I want to extend a big thanks to my co-speakers, Johnny and Beltface. We ended up going over our allotted 90 minutes again –… Read More Gen Con 2015 – A Big “Thank You!” from Us to You!
It’s almost that time again! Johnny Xmas, Beltface, and myself will be returning next week to Gen Con 2015 in Indianapolis (under the Circle City Con flag) to begin the yearly rotation of our panel on the state of hacking in fiction. Something I hear repeatedly mourned by infosec professionals is that there’s not enough… Read More Gen Con 2015 Preview – Hacking in Media: The Good, The Bad, and The Ugly (2015 Edition)
I had the honor and pleasure of being asked to teach a four hour incident response class at last month’s Circle City Con in Indianapolis, IN (you can watch a recording, here). The subject was preestablished based on attendee interest: building an incident response program in small, medium, and large enterprises. Granted, most of the… Read More The Gamemaster’s Guide to Incident Response