Monday May 30

The Official RSA Conference Guide by Industry’s Top Snarkers

Friday, 27 March 2015 07:03

The Official RSA Conference Guide by Industry’s Top Snarkers

Sure, sure — you can check out the voluminous agenda and event catalogs detailing what you’ll find at RSA this year. But to get the real scoop on “where the world talks security”, you need an insider’s view, and the most accurate, full-featured, and entertaining take on the world’s largest security conference comes from us. Head over to the RSA Conference Blog site and soak in all the blogs you can find from the Securosis Team.

I’m delighted and honored to join my colleagues in contributing to this year’s conference Official (Unofficial) RSA Conference Guide. Like Rich said, I still can’t believe RSA gave us a mile-long leash; I’m looking around in disbelief, waiting for posts to disappear from the site.

Read more: The Official RSA Conference Guide by Industry’s Top Snarkers

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Monday, 23 March 2015 12:00

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

The afternoon of Monday, March 23rd at InfoSec World in Orlando, I’ll be giving a talk in the mobile track titled “Best, Worst and Common Practices for Securing Enterprise WiFi“. Since the event site doesn’t post the full abstract, I figured I’d share it here for you, and I’ll tweet the crap out of it so you can find it.

Read more: InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Your Favorite Speakers at Infosec World 2015

Sunday, 15 March 2015 10:45

Your Favorite Speakers at Infosec World 2015

Okay, in full disclosure this probably isn’t going to be a list of YOUR favorite speakers, but it’s a list of some friend, colleagues, and mentors you don’t want to miss at this year’s Infosec World.

A key to the session ID codes is below, and my favorite schedule format is their at-a-glance you can get here http://www.infosec-world.com/OS15_Grid_for_Web.pdf. Infosec World 2015 is March 23-25 at Disney’s Contemporary Resort in Orlando, FL.

In no particular order… Oh, actually these are mostly alphabetical by last name. Deviant’s at the top because I wanted that handsome devil above the crease. That, and he’s doing an opening keynote.

Read more: Your Favorite Speakers at Infosec World 2015

Diana Kelley: 3 Books that Changed My Life

Saturday, 14 March 2015 08:52

Diana Kelley: 3 Books that Changed My Life

In this series, I asked infosec professionals to name 3 books that changed their life. This entry features picks from Diana Kelley, an industry mover and shaker currently serving as an executive in IBM Security Systems.

If you looked at my profile and Diana’s side-by-side, you’d think we must run in the same circles – we’ve spoken at many of the same events, both serve as faculty at IANS, have written content for the same magazines. But the truth is I didn’t “find” Diana until some time last year, and it was purely by chance. She’s one of those extremely level-headed, fun, and energetic people that just has a magnetism you can’t resist and she’s a pure bottomless pit of positive professional energy. Going in to 2015, I look forward to connecting more with Diana. You can too, through the links at the bottom of this post.

Read more: Diana Kelley: 3 Books that Changed My Life

Jack Daniel: 3 Books that Changed My Life

Tuesday, 17 February 2015 08:59

Jack Daniel: 3 Books that Changed My Life

In this series, I asked infosec professionals to name 3 books that changed their life. This entry features picks from Jack Daniel, the self-proclaimed security curmudgeon and peer-described “glue” of our industry.

Perhaps best known as the co-founder of Security BSides, there are many accolades of Jack’s professional success, and I might say the more subtle, softer side of Jack is often overshadowed by his well-developed curmudgeonly persona. The short version is that he wins awards, does great things, helps lots of people, and will never turn a blind eye or hurried goodbye to a friend in need. He does all this while sporting an exceptionally long beard and skeptical brow, both of which he’s well known for.

Read more: Jack Daniel: 3 Books that Changed My Life

Wireless


Wireless for Beginners Part 1: RF and Waves
Share
This article by Jennifer Minella originally appeared in Network Computing. Wireless networking presents a unique set of challenges that have to be overcome to get information from point A to point B. Most of the quirkiness of wireless technologies has to do with the controls put in place to allow it to operate over the physical medium of the air. From collision avoidance to time slicing and even data rates, the functions and characteristics of wireless success (and failure) can most often be traced to the challenges of communicating over the air. This series starts with an overview of wireless’s most often-overlooked but fundamental elements: the properties of RF and waves. 
More
Secret Wireless March 17th… shhhh
Secret Wireless March 17th… shhhh
Share
I’ve been punchy these past few days; I’ll apologize for this week and in advance for the next one. After a week of hopping around the Southeast, I’m heading down to Charlotte with Jack for a talk at the US Secret Service Electronic Crimes Task Force meeting.
More

Get the Real Scoop on Dynamic Frequency Selection (DFS) and 802.11ac
Share
The wireless world has been abuzz with talk of Dynamic Frequency Selection (DFS) and the complications with adhering to the DFS requirements while deploying a 5GHz-only high-speed 802.11ac network. What is DFS? Why is DFS an issue? How does wireless impact radar, and vice versa? What are the added challenges when deploying 802.11ac WiFi? In my three-part series over at Network Computing, we take a dive in to these questions, and more.
More
Analysis after the demo: Hole 196 and the WPA2 vulnerability
Analysis after the demo: Hole 196 and the WPA2 vulnerability
Share
You guys asked me to break out this information instead of posting as comments on the original post. Here is more updated information on the WPA2 Hole 196 vulnerability now that AirTight has given the demo at BlackHat/Defcon.
More

Other Stuff

The First 802.1X Training?
Share
Well, we may just have the first ‘official’ dedicated 802.1X Training. We may not… but after extensive Google searches, all I’ve been able to find are white papers, implementation guides and some classroom training on wireless security with mention of 802.1X. More
Where to find JJ at RSA 2013 – NAC, certs, SBN and more
Share
Each year I like to share some of my where-abouts with you, and invite you to come say hello or join me in a session, discussion, debate or even a party. This year, I’m involved with two RSA sessions and some extra-curricular activities with organizations like TCG. Here’s the scoop! More

Search

Get Social

RSSFacebookLinkedinYoutube

NetworkedBlogs

Subscribe

Enter your email address:

Delivered by FeedBurner