Quantcast

Interviews

Read our exclusive interviews with security industry’s renowned gurus and get comprehensive answers to most exciting computer threatscape questions.

A Security Aficionado – Interview with Tom Eston. Part 2

In this part of our interview with Tom Eston we’re discussing today’s down-to-earth and most relevant enterprise security issues from a pen testing perspective. – You say that accounting systems are frequently overlooked by penetration testers. Why? – Accounting systems are overlooked by...

A Security Aficionado – Interview with Tom Eston

Tom Eston has many years of experience in penetration testing and security assessments. Currently Tom is the manager of the highly skilled Profiling and Penetration Team at SecureState. Tom focuses much of his research on new technologies such as social media and mobile applications. He is the founder of...

Employ Bees to Protect Your Servers: Honeypots That Bite Back

Alexey Sintsov graduated from Saint Petersburg State Polytechnical University. Since 2001 Alex has been working on practical questions in the field of security analysis and vulnerability detection, as well as exploit development. He works for Nokia as a Senior Security Engineer. Alexey also writes for...

Windows Desktop Gadgets are Dangerous: Interview with Mickey Shkatov

Privacy PC came across an interesting topic raised by Mickey Shkatov and Toby Kohlenberg at the last Black Hat USA conference. The researchers were talking about comparatively rare but potentially very hazardous attack vector dealing with Microsoft Windows desktop gadgets. We have contacted Mickey Shaktov...

Open Everything – Interview with Robert David STEELE Vivas. Part 6

In the final part of our interview Robert Steele comments on today’s security industry, identity theft, and highlights his view of the future without secrecy. – How would you characterize the present-day security software? How will it develop in future? – Not a good question for me other than...

Open Everything – Interview with Robert David STEELE Vivas. Part 5

This part of the interview reflects Steele’s thoughts on computer security, biohacking, cyber warfare exemplified by Stuxnet, and online authenticity models. – How would you characterize the current state of things around computer and Internet security? Are you seeing any good new tendencies? Do you...

Open Everything – Interview with Robert David STEELE Vivas. Part 4

Moving on with the discussion, Robert Steele dwells on pros and cons of the present-day online search, primary OSINT challenges, and technical surveillance. – What type of search engines do we need? Will Google stay or go? – One of the great things about nurturing OSINT has been the quality...

Open Everything – Interview with Robert David STEELE Vivas. Part 3

This part encompasses Mr. Steele’s view of collective intelligence, hackers’ role in facing information security challenges, and several other relevant matters. – At The Fifth HOPE in 2004, you predicted an explosion in on-demand tailored intelligence during the following 5 years – to what extent...

Open Everything – Interview with Robert David STEELE Vivas. Part 2

This section of our interview with Mr. Steele is dedicated to a retrospective insight into the past of OSINT, terrorism, and today’s top high-risk technologies. – Mr. Steele, is there anything you regret about or would have done differently if you could just go back to the 80s and start it over? ...

Open Everything – Interview with Robert David STEELE Vivas

Robert David STEELE Vivas is a native New Yorker who has lived practically all over the world. He is best known for promoting the ubiquitous use of Open-Source Intelligence (OSINT), and more recently for his latest book, “THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth &...