spylogic.net
spylogic.net is a personal blog authored by Tom Eston, a cyber-security professional, security and privacy researcher, blogger and co-host of the Shared Security Podcast.
The Three Keys to Success in Cybersecurity
Tom | | career, Careers, communication, Communication Skills, Continuous Learning, Cyber Security, Cybersecurity, Cybersecurity Careers, Cybersecurity Industry, Data Privacy, Digital Privacy, education, empathy, future, Information Security, Infosec, Key Lessons, Leadership, Learning, Podcast, Podcasts, Privacy on the Internetz, security, speaking, Teaching, Teaching Others, technology
One of the big questions that I often get is: How does someone become successful in a cybersecurity career? In this blog I want to share with you the three key lessons ...
The Importance of Opting Out of CPNI Data Sharing
Tom | | ATT, CPNI, CPNI Data Sharing, CPNI Opt Out, Cybersecurity, Data Privacy, Digital Privacy, fcc, Federal Communications Commission, government, Information Security, Infosec, Internet, Internet Provider, Mobile, mobile phone, Mobile Provider, Phone Call, Phone Calls, Podcast, Privacy, Privacy on the Internetz, regulation, security, smartphone, T-Mobile, technology, telecommunications, telephone, verizon
Let’s talk about a topic that’s incredibly important for your privacy and data security. In this blog I’m going to talk about why you should opt out of the sharing of CPNI ...
The Legacy of The Hacker Manifesto
Tom | | Andra Zaharia, Apple, Apple ][e, Apple 2e, Apple II, BBS, Cyber Empathy, Cybersecurity, ethical hacking, Ethics, hacker, Hacker Manifesto, Hacking, Information Security, Manifesto, Modem, Old School, Podcast, The Hacker Manifesto, Vintage, Vintage Computing, Warez
I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
Introducing the Shared Security Weekly Blaze Podcast
As many of you may know, I’ve been co-hosting the Shared Security Podcast (formally known as the Social Media Security Podcast) with my fabulous co-host Scott Wright from Security Perspectives Inc. We’ve been ...
Using Technology to Defend Digital Privacy & Human Rights – Presentation Notes
Tom | | Presentation Notes, Privacy, Privacy on the Internetz, security, signal, tails, tor, VPN, whonix
If you attended my talk “Using Technology to Defend Digital Privacy & Human Rights”, thank you! Here’s a list of supplemental material discussed during the presentation as well as where you can ...
Top 5 Attack Vectors Report: Defend It Before You Hack It
Each year my team conducts hundreds of Penetration Tests in a wide variety of industries, ranging from Healthcare to Retail, Finance to Manufacturing, and many more. The team analyzed data collected from each of ...
Project Mayhem to be Unleashed at Black Hat Abu Dhabi
For the last several months I’ve been performing research on techniques attackers could use for performing accounting fraud in popular accounting systems. This research coincides with a whitepaper that SecureState has developed entitled “Cash ...
Burp Suite Series: Efficient use of Payload Options when Attacking HTTP Basic Authentication
In this series of blog posts I’ll be discussing some handy Burp Suite techniques we often use on our penetration tests. Burp Suite is our de facto tool of choice for assessing ...
SANS Mentor brings Security 542: Web App Penetration Testing and Ethical Hacking (GWAPT) to Cleveland
I’m proud to be teaching SANS Security 542 here in Cleveland through the SANS Mentor Program beginning in August. The SANS Mentor Program allows you to save thousands on your training budget ...
Are We Reaching Security Conference Overload?
I saw a post from my friend Matt Neely on Twitter about how CarolinaCon and BSidesROC are on the same weekend this year. I’ve also had conversations with others earlier this week ...