The Evolution of Mobile Security

Today, I posted a blog entry to the Oracle Identity Management blog titled Analyzing How MDM and MAM Stack Up Against Your Mobile Security Requirements. In the post, I walk through a quick history of mobile security starting with MDM, evolving into MAM…

April 2, 2014
Read More >>

A Guide To Google Hacking Techniques

Hi everyone!! As we all know Google is the major search engine and #1 ranking site and it’s like a part of our daily routine.
Google hacking does not mean to hack Google’s site/server, it means likely to be smart in Google search. Almost every kind of …

March 3, 2014
Read More >>

Kali Linux Metapackages

One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa…

February 26, 2014
Read More >>

Deep Data Governance

One of the first things to catch my eye this week at RSA was a press release by STEALTHbits on their latest Data Governance release. They’re a long time player in DG and as a former employee, I know them fairly well. And where they’re taking DG is pret…

February 24, 2014
Read More >>

RSA Conference 2014

I’m at the RSA Conference this week. I considered the point of view that perhaps there’s something to be said for abstaining this year but ultimately my decision to maintain course was based on two premises: (1) RSA didn’t know the NSA had a backdoor w…

February 24, 2014
Read More >>

IAM for the Third Platform

As more people are using the phrase “third platform”, I’ll assume it needs no introduction or explanation. The
mobile workforce has been mobile for a few years now. And most organizations have moved critical services to cloud-based offerings. It’s not…

February 6, 2014
Read More >>

Kali Linux Amazon EC2 AMI

Kali Linux in the Amazon EC2 Marketplace
EDIT: For updated Kali Rolling images in the Amazon AWS, check this post.
After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 ma…

January 20, 2014
Read More >>

Passing the Hash with Remote Desktop

Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in…

January 14, 2014
Read More >>