Hash collisions in computer security

Hash collisions in computer security

Last week, Robin of the YouTube channel 8-bit Show and Tell wondered out loud on Twitter why Chrome flags Netracer 1.1, a modern indie Commodore 64 game, as malware. I think this is a classic case of hashing algorithms having gone wrong. In this blog post, I’ll explain what a hash collision is, using this collision of my hobby of retro computing and my day job of information security as an example.

Read more

Resume hacks for your first security job

Resume hacks for your first security job

I conduct a fair number of interviews, and that means I see a lot of resumes. In my most recent round of interviews, I was interviewing intern candidates. There was absolutely nothing wrong with their resumes. They built exactly the type of resumes their counselors tell them to. In this blog post, I’ll tell you what your counselors in school aren’t telling you about resumes, including hacks to help you land your first security job.

Read more

You don’t need cyber threat intelligence. Buy this instead

You don’t need cyber threat intelligence. Buy this instead

Last week I saw another hot take on Twitter. This Twitter influencer asserted that for most organizations, Cyber Threat Intelligence (CTI) is a waste of money and they would be better off spending that money elsewhere. In this blog post, I will dig into this argument, including what proper use of Cyber Threat Intelligence looks like.

Read more

Is CISSP worth it in 2024? How to know

Is CISSP worth it in 2024? How to know

I’ve had two different people ask me in the last month if CISSP is still worth it in 2024. I have mixed feelings, so in this blog post, I’ll explore this complicated question so you can decide if CISSP is still worth it for you.

Read more

Wireshark security risk and how to manage it

Wireshark security risk and how to manage it

A couple of social media influencers got into an argument over banning Wireshark in corporate environments because Wireshark is a security risk. While I don’t like getting involved in this type of drama, the argument does raise an important point in information security and vulnerability management. It’s very important as a security professional not to overplay the hand you’re dealt.

Read more

How Tenable sets plugin severity

How Tenable sets plugin severity

How Tenable sets plugin severity is a question customers have been asking me for years, dating back to the days I worked for Tenable partners. It can be a bit complicated, so in this blog post I will explain what goes into Tenable plugin severity.

Read more

What peer benchmarking is in vulnerability management

What peer benchmarking is in vulnerability management

Successful vulnerability management is deceptively simple. It comes down to being able to answer yes to two questions: Are you fixing the right things? And are you fixing them fast enough? But how fast is fast enough? In this blog post, I’ll explain how I use peer benchmarking to help companies figure out how fast is fast enough. I’ll also explain how to know if your security policies are less popular than speed limit laws, and why that will make them fail.

Read more

What happened to NCIX

What happened to NCIX

NCIX was a Canadian computer retailer, similar in concept to Fry’s or Micro Center. It went out of business in 2017 and its data was breached in 2018. Here’s what happened to NCIX.

Read more

Why physical destruction of RAM is sometimes necessary

Why physical destruction of RAM is sometimes necessary

I found this photograph along with the question about its intent. The photo was a RAM module with holes drilled in it. The person who posted the photograph asked a very valid question as to why physical destruction of RAM is necessary.

Read more

SCCM vs WSUS

SCCM vs WSUS

Since I work for a vulnerability management company, I get tons and tons of questions about patch management. I don’t speak for my employer, and they probably don’t have an opinion since neither product comes close to meeting their needs. But I’m glad to share what I know. Recently, someone asked me which is better, SCCM or WSUS. My answer probably was not what they were expecting me to say.

Read more