1950 Mercury Christmas Present

1950 Mercury Christmas Present

|
As a gift, or sometimes more like a curse, my dad passed down his love of classic cars to his children. Each of us has our favorites, and one of mine is a 1950 Mercury. Not just any 1950 Mercury, but a particular highly customized “led sled” hot rod. Chopped, ... Read More
A 1951 Ford for Dad

A 1951 Ford for Dad

|
I wanted to get my dad a gift, but not just any gift. The perfect gift. For a diehard hot-rodder like my dad, there can only be one thing -- a car. Of course, not just any ol' thing with four wheels. He quite literally has 50 mostly junkers and ... Read More

Evolution of The Press

|
Below is a working theory on the evolution of The Press in the United States as it relates to their relationship with the government and the people. I expect to continue refining the theory as new perspectives and competing ideas are discussed.Phase 1) TL/DR; The press’s primary value in the ... Read More

The evolutionary waves of the penetration-testing / vulnerability assessment market

|
Over the last two decades the penetration-testing / vulnerability assessment market went through a series of evolutionary waves that went like this…1st Wave: “You think we have vulnerabilities and want to hire an employee to find them? You’re out of your mind!"The business got over it and InfoSec people were ... Read More

All these vulnerabilities, rarely matter.

|
There is a serious misalignment of interests between Application Security vulnerability assessment vendors and their customers. Vendors are incentivized to report everything they possible can, even issues that rarely matter. On the other hand, customers just want the vulnerability reports that are likely to get them hacked. Every finding beyond ... Read More
My next start-up, Bit Discovery

My next start-up, Bit Discovery

The biggest and most important unsolved problem in Information Security, arguably all of IT, is asset inventory. Rather, the lack of an up-to-date asset inventory that includes all websites, servers, databases, desktops, laptops, data, and so on. Strange as it sounds, the vast majority of organizations with more than even ... Read More
SentinelOne and My New Role

SentinelOne and My New Role

Two years ago, I joined SentinelOne as Chief of Security Strategy to help in the fight against malware and ransomware. I’d been following the evolution of ransomware for several years prior, and like a few others, saw that all the ingredients were in place for this area of cyber-crime to ... Read More