Domain Doppelganger

Domain Doppelganger

Is this what you expected to find at the URL you just clicked?   Domain Doppelganger (aka Lookalike domains) are URLs that look similar to a trusted URL, but have subtle differences. Doppelganger domains are used to trick users into visiting a malicious website...
CyberCamp

CyberCamp

Nearly a decade ago I was approached by a defense colleague with this crazy idea of creating a high school cybersecurity summer camp program. We knew it would be a lot of work, but we also knew there was a very real need in our industry: we just don’t have...
Common Sense Security

Common Sense Security

The occurrence of data breaches has been on a continual rise over the past 18-24 months. Some of this is arguably due to increased reporting, but what about the rest? How do some of the largest companies in the world manage to get breached by so-called “advanced”...
Adaptive Password Policies

Adaptive Password Policies

Stanford recently published a new security policy allowing their users to choose length over complexity.  Password complexity has always been the go-to answer for creating secure passwords. Of late, there has been a big push to change that; and for good...
Open Source Enterprise Security

Open Source Enterprise Security

My second presentation at BSides Orlando 2014 was on Open Source Enterprise security solutions. The idea was to present a number of tools to help the struggling small business meet enterprise security objectives.  It’s easy to forget that many (most?)...