In Georgia, State Bill 315 was introduced in 2018 to criminalize unauthorized computer access. In addition to the two page bill being overly vague and open to interpretation, unauthorized access was already criminalized by the Computer Fraud and Abuse Act (CFAA), a federal law. The bill was quickly passed by the House and Senate and, […]
Your data is already stolen, now what?
I read an interesting article from Bruce Schnier today that was basically a commentary on an equally interesting article from Brian Krebs about the recently disclosed Marriott breach. I’ve linked both articles below but wanted to highlight a couple of key points. Accept that you are vulnerable (your data has been, and will continue to […]
Data protection for humans. What are the basics (and how can you protect your data with stuff you already have)?
I recently had a conversation about data protection, specifically protecting the confidentiality and integrity of sensitive data. Over the course of that conversation, realized that there is a LOT of confusion on the topic. How do we protect data? When does the data have to be protected? What constitutes protected? Ultimately, we discovered that the […]
The best place to get started on the red team?
The blue team.
The blue team.
One question that I get a lot, whether it’s from students, current or hopeful IT folks or just curious folks who wonder how one gets into this line of work, is “How do / can I get started hacking?” or “How do / can I get started on the red team?”. I’ve heard tons of […]
Pen tests and baby pictures
I had a conversation a few days ago that highlighted an interesting similarity between offensive security and, oddly enough, baby pictures. The conversation was with a photographer who worked extensively with families (family portraits, baby pictures, etc.). The photographer mentioned that they offer a package for parents to get pictures of their babies at newborn, […]
Some lessons learned from the ransomware attack on the City of Atlanta
On 22 March 2018, the public learned of a ransomware attack in the City of Atlanta information systems. The City of Atlanta held a press conference soon after the news broke and multiple news outlets covered the incident. In this article, I don’t want to re-hash the information already presented but rather highlight a few […]
Cyber Attack on the City of Atlanta – A stark reminder of the need for and importance of ethical hacking
Thursday morning (22 March, 2018), the City of Atlanta’s computer systems fell victim to what’s being called a ‘cyber attack’. According to the information that we’ve seen thus far, the attack is apparently a ransomware attack demanding payment in exchange for the decryption keys to unlock the affected data. According to news articles, local, state […]
Excellent article on the Georgia “Computer Crime” bill, SB315
S.B. 315 uses the term, “unauthorized access,” which is a very murky term. If you’re trying to go through all the proper channels in advance and get authorization for something, it’s not always clear who the person who has the authority to give that authorization is. If it’s a website and you’re testing some part […]
Partnerships to make the wise wiser; leveraging relationships to advance information security
At the end of the day, our goal is to help our clients see their organization from the perspective of an attacker; the unpatched vulnerabilities, the exposed services, the naive employee, the real-world risk that their security strategy has to address. It seems simple but, for someone that’s internal to the organization and actively engaged […]
Critical Infrastructure, Energy and More – The growing dangers of IoT
The Internet and the Internet of Things (IoT) has revolutionized the way that the world does business. I don’t mean things like Facebook, Twitter and all of those cat videos that everyone seems to be obsessed with, I mean the cool things that the Internet has enabled us to do (or do better). Connecting offices […]