RMISC: Things To Do In Denver

The new year has started rolling and one of the things that people try to hammer out early in the calendar year is often the training budget. Picking a good security conference can be a problem. What I mean, is it can be difficult to pick the right conference for you. I've been fortunate to have been to many conferences over the years. I've learned a great many things, such ...

Continue reading

Remembering Hurricane Rita

Featured image by NASA/Goddard Space Flight Center Scientific Visualization Studio. This will be a long post. Hurricane Rita 10 years ago today, Shannon and I were staying with Mom and Dad. We had evacuated from our house in Beaumont, Texas a few days or so before. Hurricane Rita was so awesome/frightening on the satellite picture...just like Katrina was. I was assigned to the evacuation team at work. The ...

Continue reading

2015 Black Hat, DEF CON, BSidesLV Survival Guide

A couple weeks ago I wrote a post for veterans of so-called security summer camp, focusing on ways to get the most from it even if the mind has grown jaded. This week, I'm focusing on the newbies. Every year I try to offer some advice for people attending Black Hat, BSidesLV and DEF CON for the first time. As always, it's based on my personal experience. Everyone is different, ...

Continue reading

Data Breach Victims or Enablers?

Back in May,  my good friend Eric Cowperthwaite caused a stir with a blog post about security breach victims getting demonized for failing to prevent break-ins. Other industry friends passionately disagreed. My thinking on the matter continues to evolve. But as is usually the case, my thinking takes me to the middle. Companies that suffer a breach -- Home Depot and Target have been among this year's biggest poster children ...

Continue reading

5 Things a Revere, MA Upbringing Taught Me About Infosec

Growing up in Revere, Mass., taught me some very simple lessons about information security. Note: When people hear the name Revere, they think of these things: Paul Revere's ride, guns, the IROC-Z automobile, lots of gold chains and language that doesn't include the letter r at the end of a word. Information security? You probably think I've lost what little sanity I had. But I'm serious. Revere incident 1: Me and ...

Continue reading

Blackhat and Defcon Parties 2014

Back for the Blackhat and Defcon Parties 2014...FINALLY! Yet again, sorry I was late getting this published. Here is the list. It is a little short as I didn't take the time to include ones that have already filled up. You can try your hand with the remaining ones. Please note that this sched should work fine in most smart phone browsers. Also, feel free to leave a comment if ...

Continue reading

BH, DefCon, BSidesLV Primer

Many security professionals are making plans for a week in Las Vegas early next month for three big InfoSec conferences: Black Hat, Defcon and BSidesLV. I've been going for years and am familiar with what to expect and how to make the best use of my time there.  If you're a first-time attendee, however, the experience can be overwhelming. For that reason, each year I put together a survival guide ...

Continue reading

Is there a Cuckoo in your control system?

Notice: if you haven't read The Cuckoo's Egg by Cliff Stoll, STOP, go read the book (or at least watch the NOVA special) then come back. You can get a signed hardcover copy from the man himself for $20.  https://www.kleinbottle.com/ExtrasAndMisc.htm tl;dr - Defend your ICS against intruders: You need at least one person solely dedicated to hunting evil, Network Security Monitoring, and an ICS honeypot. ...

Continue reading

Aegis ICS Fuzzing Framework

https://twitter.com/bloerwald/status/448415935926255618 As you may or may not know, Adam Crain @jadamcrain and I have been working on an ICS/SCADA procotol fuzzing framework -Aegis- for a year now.  It is a generational type fuzzer that tests both the server/slave and client/master side of industrial protocols.  Adam originally wrote Aegis to test his openDNP3 protocol stack.  It turned out to be very effective in finding ...

Continue reading

“Cyber”: Critical to security nutrition

A few weeks ago, I sat down next to a friend who happened to be in the middle of a conversation between a lawyer, a hacker, and philosopher and I was just in time for the “I hate the word ‘cyber’. FamousHacker#2138123 and I are trying to get people to stop using it.” Sigh.  At this stage the anti-“cyber” routine is really starting to sound a little bit high ...

Continue reading