I'm guessing like most of you, the list of Slack accounts scrolls off the bottom of the screen. Yesterday I was scrolling through the list…
ICS vulnerabilities are still being discovered, and I don't think that will stop any time soon. I started tracking known ICS vulnerabilites in 2014, and…
The new year has started rolling and one of the things that people try to hammer out early in the calendar year is often the…
Featured image by NASA/Goddard Space Flight Center Scientific Visualization Studio. This will be a long post. Hurricane Rita 10 years ago today, Shannon and I were…
A couple weeks ago I wrote a post for veterans of so-called security summer camp, focusing on ways to get the most from it even if…
Back in May,  my good friend Eric Cowperthwaite caused a stir with a blog post about security breach victims getting demonized for failing to prevent break-ins. Other industry…
Growing up in Revere, Mass., taught me some very simple lessons about information security. Note: When people hear the name Revere, they think of these…
Back for the Blackhat and Defcon Parties 2014...FINALLY! Yet again, sorry I was late getting this published. Here is the list. It is a little…
Many security professionals are making plans for a week in Las Vegas early next month for three big InfoSec conferences: Black Hat, Defcon and BSidesLV. I've been…
Notice: if you haven't read The Cuckoo's Egg by Cliff Stoll, STOP, go read the book (or at least watch the NOVA special) then come back. You can get a…