Who Watches the Watchmen?

Who Watches the Watchmen?

How does our behavior change when we know we’re being watched?In the health care industry, those practicing in the field must take the Hippocratic oath and swear to uphold specific ethical standards. This standard helps promote the idea of “do no harm” and health care practitioners take this oath very ... Read More
Using DNS to Clean Your Pipes

Using DNS to Clean Your Pipes

I really despise ads, they completely ruin my browsing experience. Auto-playing videos, popup and overlay ads, and Forbes begging me to buy a subscription or “turn off your adblocker.” It‘s all a drag, and although an browser-based ad-blocker will take care of most of them, ad-blockers work when you can ... Read More
Six Gone, Moving on Eight

Six Gone, Moving on Eight

| | Business, christmas, hiking, security
25 or 6 to 4?No matter how tired you are, you’ve gotta keep moving forward.I’ve just returned from a strenuous, Sunday-morning hike to Chimney Tops to get some exercise in, clear my mind, and reflect. I’m currently listening to Christmas music and sipping on hot tea and just thought “Wow, ... Read More
Savage Security October 2017 Newsletter

Savage Security October 2017 Newsletter

| | Cybersecurity, Newsletter, security
Savage DeedsPhotos from EDGE2017 aren’t available yet, so we’ll all have to settle for this REALLY OLD picture of Adrian from last year’s EDGE conference.Savage Security NewsOctober was another busy month for us, but we love busy! We kicked off the month joining our friends Jake and Tori on “The ... Read More
September 2017 Newsletter

September 2017 Newsletter

| | Cybersecurity, Newsletter, security
Firing on all cylinders with no end in sight.Wow… what a month it’s been. We’re running on all… 12 cylinders (remember the Jaguar V12?) and don’t plan on slowing down anytime soon. September was also a busy month for the security industry as a whole. New vulnerabilities, new breaches, and ... Read More
Scammer, Meet Hacker: Part 3

Scammer, Meet Hacker: Part 3

Posing as a target in a job scam to see how deep the rabbit hole goes…In part 2, our involvement became more than just a chat, and the scammers started trying to get some money out of me in earnest. Their persistence is as impressive as their lack of attention ... Read More
Scammer, Meet Hacker: Part 2

Scammer, Meet Hacker: Part 2

Posing as a target in a job scam to see how deep the rabbit hole goes…In part 1, I started playing a scammer’s game to learn more about how it would play out. Where we left off, I had managed to get ‘hired’. It seemed impossible to fail in this ... Read More
Scammer, Meet Hacker: Part 1

Scammer, Meet Hacker: Part 1

Posing as a target in an employment scam to see how deep the rabbit hole goes…This afternoon (8/30/17), I was checking up on all the chats I missed on Slack while I was away on my epic adventure. I noticed that in one of our local security groups, someone mentioned ... Read More
A Morning with Nothing Too Fancy

A Morning with Nothing Too Fancy

| | screenprinting, startup
The awesome crew of Nothing Too Fancy (including doggo).As with any company, eventually, you’re gonna need some swag. You know, the “Stuff We All Get” at conferences. However, here at Savage, we didn’t want just another piece of swag, e.g. cheap coozie, cheap pens, or…sigh… a cheap fidget spinner. Instead, ... Read More
How Google Protects Its Corporate Security Perimeter without Firewalls

August 2017 Newsletter

| | security
A month of adventuresKyle’s bike in repose — a rare moment when it isn’t conspiring with the terrain to murder him.Savage Security NewsThis past month, we attended Black Hat; explored the Trans America Trail; analyzed a thinly veiled attack piece; presented on ransomware at a local DEF CON group and a remote ... Read More
Loading...