Quantcast

Interviews

Read our exclusive interviews with security industry’s renowned gurus and get comprehensive answers to most exciting computer threatscape questions.

Busting Anti-Theft Software Myths: Interview with Simon Roses Femerling

Simon Roses holds a B.S. from Suffolk University (Boston), Postgraduate in e-Commerce from Harvard University (Boston), and an Executive MBA from IE Business School (IE, Madrid). Simon Roses is currently the CEO at VULNEX, driving security innovation. Simon is also working on a project for the DARPA Cyber...

Questions and Answers with Dave Kennedy. Part 3

We get our final set of questions answered in the interview with Dave Kennedy, addressing DerbyCon, today’s infosec, and more security-related matters. – DerbyCon community and the number of speakers grow. What new are you planning for DerbyCon 3.0? – Speaker lineup is going to be epic this...

Questions and Answers with Dave Kennedy. Part 2

In this part of our interview we asked David Kennedy about prospects of the Social-Engineer Toolkit, breakdown of attack vectors, and his plans for the...

An Interview with Dave Kennedy on Artillery, SET, DerbyCon and pentesting

David Kennedy is the founder and CEO of TrustedSec, former CSO for Fortune 1000, former Marine Corps. He is the author of The Social-Engineer Toolkit, Fast-Track and Artillery and other open source tools. He was previously on the BackTrack development team and Exploit-Database development team. David is...

Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council

Jason Healey is the director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and conflict in cyberspace. He also is a board member of the Cyber Conflict Studies Association and lecturer in cyber policy at Georgetown University. He co-authored...

Interview with Jim Aldridge on Targeted Intrusion Remediation. Part 3

The remediation activities being discussed with Jim Aldridge here include massive password change, software patching, and building security posture overall. – One of the most critical and difficult parts in remediation is universal password change. Do you have short advice to help organizations with...

Interview with Jim Aldridge on Targeted Intrusion Remediation. Part 2

In this subset of questions & answers, Mandiant’s Jim Aldridge sheds more light on the typical targeted attack lifecycle and the key countermeasures to adopt. – A lot of successful targeted intrusions have involved various red herring techniques. For example: some systems are DDoSed and while...

Best Practices of Targeted Intrusion Remediation: Interview with Mandiant’s Jim Aldridge

Jim Aldridge of cyber security firm Mandiant helps organizations investigate and respond to security incidents. His areas of expertise include security incident response, penetration testing, security strategy, as well as secure systems and network design. Jim has significant experience working with the...

InfoSec Blacklist of Charlatans: Part 2 of Our Interview with Jericho from Errata

Following the first part of our interview with Errata’s Jericho, this section encompasses more of his answers regarding nuances of InfoSec blacklisting. – Errata has a section dedicated to suspicious statistics, which various media outlets try to feed us. It’s a sad thing but is there any place for...

InfoSec Blacklist of Charlatans: Interview with Jericho from Errata

As Attrition.org states, Jericho is a security curmudgeon, pimp, helicopter pilot, lighter thief, HTML nazi, cat herder, guinea pig relationship specialist and obsessive compulsive TV game show participant. Jericho has been poking about the hacker/security scene for over 19 years (for real), building...