Data Breach Victims or Enablers?

Back in May,  my good friend Eric Cowperthwaite caused a stir with a blog post about security breach victims getting demonized for failing to prevent break-ins. Other industry friends passionately disagreed. My thinking on the matter continues to evolve. But as is usually the case, my thinking takes me to the middle. Companies that suffer a breach -- Home Depot and Target have been among this year's biggest poster children ...

Continue reading

5 Things a Revere, MA Upbringing Taught Me About Infosec

Growing up in Revere, Mass., taught me some very simple lessons about information security. Note: When people hear the name Revere, they think of these things: Paul Revere's ride, guns, the IROC-Z automobile, lots of gold chains and language that doesn't include the letter r at the end of a word. Information security? You probably think I've lost what little sanity I had. But I'm serious. Revere incident 1: Me and ...

Continue reading

Blackhat and Defcon Parties 2014

Back for the Blackhat and Defcon Parties 2014...FINALLY! Yet again, sorry I was late getting this published. Here is the list. It is a little short as I didn't take the time to include ones that have already filled up. You can try your hand with the remaining ones. Please note that this sched should work fine in most smart phone browsers. Also, feel free to leave a comment if ...

Continue reading

BH, DefCon, BSidesLV Primer

Many security professionals are making plans for a week in Las Vegas early next month for three big InfoSec conferences: Black Hat, Defcon and BSidesLV. I've been going for years and am familiar with what to expect and how to make the best use of my time there.  If you're a first-time attendee, however, the experience can be overwhelming. For that reason, each year I put together a survival guide ...

Continue reading

Is there a Cuckoo in your control system?

Notice: if you haven't read The Cuckoo's Egg by Cliff Stoll, STOP, go read the book (or at least watch the NOVA special) then come back. You can get a signed hardcover copy from the man himself for $20.  https://www.kleinbottle.com/ExtrasAndMisc.htm tl;dr - Defend your ICS against intruders: You need at least one person solely dedicated to hunting evil, Network Security Monitoring, and an ICS honeypot. ...

Continue reading

Aegis ICS Fuzzing Framework

https://twitter.com/bloerwald/status/448415935926255618 As you may or may not know, Adam Crain @jadamcrain and I have been working on an ICS/SCADA procotol fuzzing framework -Aegis- for a year now.  It is a generational type fuzzer that tests both the server/slave and client/master side of industrial protocols.  Adam originally wrote Aegis to test his openDNP3 protocol stack.  It turned out to be very effective in finding ...

Continue reading

“Cyber”: Critical to security nutrition

A few weeks ago, I sat down next to a friend who happened to be in the middle of a conversation between a lawyer, a hacker, and philosopher and I was just in time for the “I hate the word ‘cyber’. FamousHacker#2138123 and I are trying to get people to stop using it.” Sigh.  At this stage the anti-“cyber” routine is really starting to sound a little bit high ...

Continue reading

Nuggets from S4x14

Digital Bond's S4x14 is the first ICS/SCADA security conference of the year which means it gets the juices flowing again after the holidays.  This year was a little different than previous years as Dale Peterson chose the speakers based upon "New People, New Techniques, and New Process Impact."  Bringing new people and new ideas to tackle the problem of "insecure by design" ICS components.  There were about 50 more ...

Continue reading

Thank you from the Arlen family

Dear friends and strangers who have yet to become friends, When we arrived at R00tz Asylum, the kids’ electronic badges which we had volunteered to design and assemble were not complete. We needed to produce about 50 more badges. We knew we had some to make but we did not anticipate so many to be damaged or broken beyond repair in transit. With help, we pulled together people to pick ...

Continue reading

No security without maturity

Security vulnerabilities are the symptom, lack of IT maturity is the disease; information security is not the cure to security vulnerabilities, IT maturity is. It’s not unusual to see a company with hundreds if not thousands of known security defects, commonly called vulnerabilities, presents in their network, on servers and in applications. The tools to detect these defects are easy to purchase and run, the tools to deploy patches ...

Continue reading