speaking

Project Mayhem to be Unleashed at Black Hat Abu Dhabi

For the last several months I’ve been performing research on techniques attackers could use for performing accounting fraud in popular accounting systems. This research coincides with a whitepaper that SecureState has developed entitled “Cash is King: Who’s Wearing Your Crown?” To perform this research I have collaborated with a coworker of mine, Brett Kimmell, who is the

Project Mayhem to be Unleashed at Black Hat Abu Dhabi Read More »

Free Webinar July 12th: Android vs. Apple iOS Security Showdown

It’s not too late to register for my webinar on July 12th: Android vs. Apple iOS Security Showdown.  I’ll be taking a entertaining look at the current security posture of both platforms. I’ll be battling the Apple App Store vs. Google Play, device updates, MDMs, developer controls, security features and the current slew of vulnerabilities for both

Free Webinar July 12th: Android vs. Apple iOS Security Showdown Read More »

Three Areas You Need To Test When Assessing Mobile Applications

Having spoken at both at the SANS Mobile Device Security Summit as well as OWASP AppSec DC recently about testing mobile applications I’ve encountered that like the old saying goes “There are many ways to skin a cat”, there are also many ways to assess a mobile application.  I’ve seen very detailed testing methodologies, not

Three Areas You Need To Test When Assessing Mobile Applications Read More »

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social Media Policies

This is the final article in my series on Enterprise Open Source Intelligence Gathering.  This information relates to the main topics from my presentation that I am giving this week at the 7th Annual Ohio Information Security Summit.  For more background information, see part one.  If you missed part two (blogs, message boards and metadata)

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social Media Policies Read More »

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards and Metadata

This post is part two of my three part series on Enterprise Open Source Intelligence Gathering.  This information relates to the presentation that I am giving this week at the 7th Annual Ohio Information Security Summit.  For more background information, see part 1.  Part three will be about putting together a simple monitoring program/toolkit and

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards and Metadata Read More »