When you are building an Information Security practice you need a solid governance structure in place. For those of you who might not be familiar…
Summary Over the past few months, I’ve been monitoring the proliferation of exploits for some of my disclosed Wordpress Plugin and Joomla Extension vulnerabilities against…
I’ve spent a fair amount of my time examining code for vulnerabilities, I recently began to focus specifically on SQL injection. While investigating this specific…
Parties Back once again for the Blackhat, BSidesLV and DEF CON Parties 2017. Here is the list. Please note that this is a work in…
Vote Dave Lewis For (ISC)2 Board Election! That's right, I am looking for your vote! I'm starting my new campaign for the (ISC)2 Board of…
I've been finding bugs in software since 1999 or so, I've reported over 150 vulnerabilities in that time, ranging from format string vulnerabilities to XSS.…
I was rather pleased to see that Liquidmatrix was nominated in the Best Security Podcast category for the Security Blogger Awards this year. While we…
I’ve been a road warrior now for almost 4 years in my current role. I’d be lying if I said anything other than that I…
RSA Parties 2017 List It is that time of year again and the RSA Parties 2017 list is back again! The RSA Security Conference approaches…
Over the past several months I've been working with a few folks including Kurt Seifried from Redhat and Dan Adinolfi from Mitre on improving the…