<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4064575309422184605</id><updated>2026-03-26T20:35:37.468-04:00</updated><category term="InfoSec"/><category term="Cyber Security"/><category term="Cyber"/><category term="Talks"/><category term="Observations"/><category term="SANS"/><category term="STI"/><category term="malware"/><category term="Career"/><category term="Incident Response"/><category term="Leadership"/><category term="cryptolocker"/><category term="cybercrime"/><category term="hacking"/><category term="privacy"/><category term="Cloud"/><category term="DOJ"/><category term="Education"/><category term="FBI"/><category term="Food for Thought"/><category term="Veterans"/><category term="cloud security"/><category term="Blue Team Summit"/><category term="Bsides"/><category term="GC-PT/EH"/><category term="Graduate Certificate"/><category term="Guest Posts"/><category term="HackFest"/><category term="LeakWare"/><category term="Lightning Talks"/><category term="MSISE"/><category term="Millennials"/><category term="O365"/><category term="PCI"/><category term="Social Engineering"/><category term="Software"/><category term="TPRM"/><category term="analysis"/><category term="apple"/><category term="colo"/><category term="colocation"/><category term="encryption"/><category term="facebook"/><category term="infosecon"/><category term="ransomware"/><category term="resources"/><category term="tesla"/><title type='text'>Cyber Security Minder</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://blog.casterlan.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>26</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-1236864827291506975</id><published>2021-09-07T12:49:00.007-04:00</published><updated>2021-09-20T18:44:39.927-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blue Team Summit"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="colo"/><category scheme="http://www.blogger.com/atom/ns#" term="colocation"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="SANS"/><category scheme="http://www.blogger.com/atom/ns#" term="STI"/><category scheme="http://www.blogger.com/atom/ns#" term="Talks"/><category scheme="http://www.blogger.com/atom/ns#" term="TPRM"/><title type='text'>Cloud Connectivity Resources</title><summary type="text">&amp;nbsp;&amp;nbsp; &amp;nbsp; via&amp;nbsp;https://twitter.com/mindseyeccfTalk slides here:





Recordings:Video Coming Soon!Further Reading:https://sixthirty-ventures.medium.com/why-we-invested-neosec-1a01d44b12e2https://www.wsj.com/articles/wells-fargo-embraces-multicloud-with-microsoft-google-deals-11631717100Tools:Coming Soon!Related Talks:Coming Soon!For more information or to set up a consultation </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/1236864827291506975/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2021/09/cloud-conn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/1236864827291506975'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/1236864827291506975'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2021/09/cloud-conn.html' title='Cloud Connectivity Resources'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPpbA-7XLs6-Q3quHufSSOKqUydQa39Ulmxs-94yQRuv654Bvehn06l-20Z4b-F4V69Om1ZwwdqI3WspIMW8RstGKqB108xVswRaBwerfZMsXdaVis08k_BprjOr9kaQqj6xPHqsOEcnY/s72-w457-h277-c/14_BlueTeamSummit_Aaron+Lancaster.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-2143715076734033328</id><published>2020-05-08T12:09:00.002-04:00</published><updated>2021-07-02T18:01:35.039-04:00</updated><title type='text'>Cloud Pro Dev Resource - leveling-up</title><summary type="text">



Further reading:
DevSecOps -&amp;nbsp;http://iotiran.com/media/k2/attachments/devopssec.pdf

Encapsulation -
https://tools.ietf.org/html/rfc7348
https://en.wikipedia.org/wiki/Virtual_Extensible_LAN

Software Defined Networking (SDN)
https://www.cisco.com/c/en/us/solutions/software-defined-networking/overview.html

Software Defined - Wide Access Networking (SD-WAN)
https://www.cisco.com/c/en/us/</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/2143715076734033328/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2020/05/cloud-pro-dev-resource-leveling-up.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2143715076734033328'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2143715076734033328'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2020/05/cloud-pro-dev-resource-leveling-up.html' title='Cloud Pro Dev Resource - leveling-up'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-2044926834744127188</id><published>2019-10-24T15:22:00.004-04:00</published><updated>2019-10-24T15:22:55.427-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Incident Response"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="infosecon"/><category scheme="http://www.blogger.com/atom/ns#" term="Talks"/><title type='text'>End of a theme: Sky-high IR</title><summary type="text">They say all good things must come to an end. If my talk Sky-high IR: IR at Cloud Scale has been a good thing (and I think it has for many) the saying applies here too. Triangle InfoSeCon tomorrow will be the last time I will be giving this one, at least for a while.


</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/2044926834744127188/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2019/10/end-of-theme-sky-high-ir.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2044926834744127188'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2044926834744127188'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2019/10/end-of-theme-sky-high-ir.html' title='End of a theme: Sky-high IR'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-2719921231692838277</id><published>2018-11-30T19:04:00.002-05:00</published><updated>2018-11-30T19:04:46.925-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GC-PT/EH"/><category scheme="http://www.blogger.com/atom/ns#" term="Graduate Certificate"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="SANS"/><category scheme="http://www.blogger.com/atom/ns#" term="STI"/><title type='text'>SANS GC-PT/EH</title><summary type="text">I am very excited to announce I completed my Graduate Certificate Studies in Penetration Testing and Ethical Hacking (GC-PT/EH) through the SANS Technology Institute (STI) this Month!&amp;nbsp;

&quot;The SANS Technology Institute&#39;s post-baccalaureate certificate program in Penetration Testing &amp;amp; Ethical Hacking is based entirely upon four courses already available as an elective path through its </summary><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2719921231692838277'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2719921231692838277'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/11/sans-gc-pteh.html' title='SANS GC-PT/EH'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-3509856335440497938</id><published>2018-10-19T14:30:00.000-04:00</published><updated>2018-10-19T19:19:42.740-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bsides"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="DOJ"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Incident Response"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="SANS"/><category scheme="http://www.blogger.com/atom/ns#" term="STI"/><category scheme="http://www.blogger.com/atom/ns#" term="Talks"/><title type='text'>Cloud IR Resources - Sky-hi IR: IR at cloud scale</title><summary type="text">


Talk slides here:




Recording here: https://www.youtube.com/watch?v=Q8hfcBJVKq8&amp;amp;t=15s

Big &quot;Thanks!&quot; to BsidesRDU.org and Adrian Crenshaw (@irongeek_adc)


Data costs:
https://azure.microsoft.com/en-us/pricing/details/bandwidth/
https://aws.amazon.com/blogs/aws/estimate-your-c/


Tools:
SIFT Workstation
Getting Data from S3 via Python
AWS Montoring and Alerting 3-rd party tools:


</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/3509856335440497938/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2018/10/cloud-ir.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/3509856335440497938'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/3509856335440497938'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/10/cloud-ir.html' title='Cloud IR Resources - Sky-hi IR: IR at cloud scale'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-6463561920982300487</id><published>2018-09-09T16:06:00.000-04:00</published><updated>2018-09-13T16:52:52.261-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Education"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="MSISE"/><category scheme="http://www.blogger.com/atom/ns#" term="SANS"/><category scheme="http://www.blogger.com/atom/ns#" term="STI"/><title type='text'>What I Hope to Get out of My Masters Degree in InfoSec Engineering</title><summary type="text">I have shared with some of you that I am continuing my graduate studies, which I began in the Graduate Certificate Program in Penetration Testing and Ethical Hacking, in the Masters of Science in Information Security Engineering. This is a transition I have been planning for a couple years and I&#39;m excited to get started. 

For the time, money, and effort I invest in this degree program I expect </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/6463561920982300487/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2018/09/what-i-hope-to-get-out-of-my-masters.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/6463561920982300487'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/6463561920982300487'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/09/what-i-hope-to-get-out-of-my-masters.html' title='What I Hope to Get out of My Masters Degree in InfoSec Engineering'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-5681757767452291652</id><published>2018-08-20T16:29:00.000-04:00</published><updated>2018-09-13T16:30:27.321-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Career"/><category scheme="http://www.blogger.com/atom/ns#" term="Guest Posts"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Leadership"/><title type='text'>How to Get into Infosec: InfoSec Career Path Hacking</title><summary type="text">
Maybe you&#39;ve always dreamt of getting into the InfoSec field, and have been thinking about getting into information security for a while, or it&#39;s just coming to mind now. Regardless of where you are in your journey, welcome to the InfoSec community! In the words of the great Kung Fu Master, Shifu, “There is no level zero.”

If you’ve seen Kung Fu Panda, you may recall that Po is a panda who eats</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/5681757767452291652/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2018/08/how-to-get-into-infosec-infosec-career.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/5681757767452291652'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/5681757767452291652'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/08/how-to-get-into-infosec-infosec-career.html' title='How to Get into Infosec: InfoSec Career Path Hacking'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-1000677083017623464</id><published>2018-07-15T20:48:00.000-04:00</published><updated>2018-09-13T15:59:17.984-04:00</updated><title type='text'>The Importance of Leadership in InfoSec</title><summary type="text">

&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Over the years I have had the privilege of being a member of many organizations that put a great emphasis on leadership. From those experiences, both educational and military, I have grown to appreciate several characteristics of a leader, whom I prefer to define as someone who uses influence to bring people together and contribute to a common goal. I have seen that </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/1000677083017623464/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2018/07/the-importance-of-leadership-in-infosec.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/1000677083017623464'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/1000677083017623464'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/07/the-importance-of-leadership-in-infosec.html' title='The Importance of Leadership in InfoSec'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-8373216497431742113</id><published>2018-06-16T17:00:00.000-04:00</published><updated>2018-08-07T20:54:24.190-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Food for Thought"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><title type='text'>Change the Way You Talk Change the Way You Think</title><summary type="text">
Quick, think of a word that describes a combination of letters and numbers that can be used to login to your system...



What came to mind? Was it &quot;password&quot;?



One of the greatest problems in our industry may be the use of the word &quot;password.&quot; The origination and proliferation of this word has led us to believe that we must construct this security device using such things as words rather than</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/8373216497431742113/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2018/06/change-way-you-talk-change-way-you-think.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8373216497431742113'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8373216497431742113'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/06/change-way-you-talk-change-way-you-think.html' title='Change the Way You Talk Change the Way You Think'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXUIMhxyPdBAZpxM9aX2FZiRqYRR9rFhC670iJt16tSLbUWsF-zNX5Q3_DpZyWeIhWrNhacDp5DRf2cYpHACwWoOT6FEZSPwOHCHxnQq1dYSvXXXyqIxpmJE8Iz4nQAzt0biUDQBSfrLA/s72-c/Excellence-is-an-art-won-by-training.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-677184452622246070</id><published>2018-04-16T10:00:00.000-04:00</published><updated>2018-08-07T20:38:39.153-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Food for Thought"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="Observations"/><title type='text'>Not a conference conference</title><summary type="text">
This week many people are at RSAC for the week gaining knowledge and a ton of vendor swag.

Believe me when I say I am not bitter about not being there. But watching from the sidelines got me thinking...&amp;nbsp; &amp;nbsp; What if we took all the time and resources we spend on conferences and put them into security improvements?&amp;nbsp;



What would that look like? Well, surely you&#39;ve been to working </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/677184452622246070/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2018/04/not-conference-conference.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/677184452622246070'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/677184452622246070'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2018/04/not-conference-conference.html' title='Not a conference conference'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-5290821658064802022</id><published>2017-11-15T00:05:00.001-05:00</published><updated>2017-12-10T19:07:28.242-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HackFest"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="Lightning Talks"/><category scheme="http://www.blogger.com/atom/ns#" term="Millennials"/><category scheme="http://www.blogger.com/atom/ns#" term="Talks"/><title type='text'>Hacking the generation Gap - leading millennials in infosec</title><summary type="text">

Millennials are the generation born from 1980 to 2000. Do you work with or lead millennials? The answer is likely yes. This group encompasses all workers between 18 and 37 years old!



Would you approach a problem in your job the same no matter the requirements, challenges or other considerations? Would you try to secure a cloud infrastructure the same way you would an on-premise </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/5290821658064802022/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2017/11/hacking-generation-gap-leading.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/5290821658064802022'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/5290821658064802022'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2017/11/hacking-generation-gap-leading.html' title='Hacking the generation Gap - leading millennials in infosec'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/7rd_FJ_N_U8/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-4585299547629244337</id><published>2017-02-01T18:05:00.000-05:00</published><updated>2017-12-10T18:15:41.449-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Career"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Veterans"/><title type='text'>Why military members past present and future are more well equipped for Cyber Security than almost every other candidate</title><summary type="text">


How many of your candidates have consistently received user awareness training in phishing, information security and operational security annually for the past 3 or more years?



I am guessing not many, which is precisely why military members are among the most well-trained candidates you will see. Military members receive world-class user awareness training that&#39;s application focused. Like </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/4585299547629244337/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2017/02/why-military-members-past-present-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4585299547629244337'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4585299547629244337'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2017/02/why-military-members-past-present-and.html' title='Why military members past present and future are more well equipped for Cyber Security than almost every other candidate'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-4415741401483853494</id><published>2016-12-01T17:05:00.000-05:00</published><updated>2017-12-10T18:03:22.375-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><title type='text'>An open letter from a Social Engineer</title><summary type="text">





Hello! My name is social engineer. I like to use any and all
information about you to gain access to your money, healthcare records and
personal identity. It’s Halloween and it can be a scary time. Sometimes I’m
scared by the amount of info people share about themselves and their loved-ones
online. 



A great way to wrap-up National Cyber Security Awareness
Month is to limit the amount of </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/4415741401483853494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/10/an-open-letter-from-social-engineer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4415741401483853494'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4415741401483853494'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/10/an-open-letter-from-social-engineer.html' title='An open letter from a Social Engineer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-7WsUPcXu-Q9IXJQJVY2pWAoNhznUNJnfCU_3cy8X09lww9dAJSpjIb0_vwj5eWAAzIVmAeq8ttWID6j_gstXnve7ac8L8SBsLjUtAyl6Ij2xb1ysX4JZZwErc6vt-RXH1FK4i0UPaZk/s72-c/Social_Engineer_Port.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-8236138770456963367</id><published>2016-10-31T11:27:00.001-04:00</published><updated>2016-11-07T09:56:13.169-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Career"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Veterans"/><title type='text'>Free and reduced IT and Security Training for Vets</title><summary type="text">I have seen a lot of talk lately about Cyber Security training for Vets. So in observance of this upcoming Veterans Day I am publishing this list of free and reduced resources. Unlike a google search, I am sorting these by my percieved training value from a hiring manager&#39;s perspective as a seasoned InfoSec Practitioner.

But first an overview, employers are looking for people to work in InfoSec </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/8236138770456963367/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/10/free-and-reduced-it-and-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8236138770456963367'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8236138770456963367'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/10/free-and-reduced-it-and-security.html' title='Free and reduced IT and Security Training for Vets'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-1511352913373958642</id><published>2016-10-20T22:00:00.000-04:00</published><updated>2016-10-28T11:43:27.413-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cryptolocker"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="resources"/><title type='text'>CryptoMalware Resources</title><summary type="text">
Some resources for CryptoMalware Detection, Prevention, and Remediation

Presy Slides (updated periodically):&amp;nbsp;http://www.slideshare.net/AaronLancaster3/why-are-you-still-getting-cryptolocker

ISSA Journal April 2016 Feature Article -&amp;nbsp;CryptoLocker by Carl Saiyed


http://c.ymcdn.com/sites/www.issa.org/resource/resmgr/JournalPDFs/feature0416.pdf



Prevention
J. Wolfgang Goerlich </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/1511352913373958642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/05/cryptomalware-resources.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/1511352913373958642'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/1511352913373958642'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/05/cryptomalware-resources.html' title='CryptoMalware Resources'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-5013814712282003984</id><published>2016-09-20T10:35:00.000-04:00</published><updated>2016-09-20T10:39:09.209-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="tesla"/><title type='text'>Baking in security</title><summary type="text">There&#39;s a long-standing synicism around development not taking security into account and security picking up the pieces. In fact it&#39;s lead to memes like this:




Author Unknown

For many this cynicism may be hard to take seriously but in light of recent research below it takes on a different real-world perspective. Security is serious business and has serious real-world implications in safety, </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/5013814712282003984/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/09/baking-in-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/5013814712282003984'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/5013814712282003984'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/09/baking-in-security.html' title='Baking in security'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyWo8rACm9KyJl9F6ANIStgXOjX3gajX1e4NhTphwFtu-PDAmMwMN2JYz8fokw4rq_secGOXspsEg-y12gsCQ54r7D2cxnHacqvY30PUg61UlG51DJzsTKhwZ8aqifYXqhQ1KmUGZk8BU/s72-c/devops_rainbowpoop_sec.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-4433403119221722228</id><published>2016-09-15T16:30:00.000-04:00</published><updated>2016-09-20T12:25:47.830-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cryptolocker"/><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><title type='text'>FBI Asking for Ransomware Reports</title><summary type="text">In an FBI Public Service Announcement published today the Bureau is requesting that vicitims of ransomware report what hit them, the rootcause and even what they paid out in ransom.

NOTE: Please be advised that the FBI is not duty bound to protect your information and you should consider the effects to your company should the FBI choose to make that info public.

From the FBI PSA:




What to </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/4433403119221722228/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/09/fbi-asking-for-ransomware-reports.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4433403119221722228'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4433403119221722228'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/09/fbi-asking-for-ransomware-reports.html' title='FBI Asking for Ransomware Reports'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-4706152277574501614</id><published>2016-08-31T17:38:00.000-04:00</published><updated>2019-12-23T17:41:11.658-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="Education"/><category scheme="http://www.blogger.com/atom/ns#" term="Incident Response"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Talks"/><title type='text'>Cyber Panel at Nashville Business Journal</title><summary type="text">A while back I participated in a Cyber panel with the Nashville Business Journal.

Read the article here.</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/4706152277574501614/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/08/cyber-panel-at-nashville-business.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4706152277574501614'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4706152277574501614'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/08/cyber-panel-at-nashville-business.html' title='Cyber Panel at Nashville Business Journal'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-2779937220022936564</id><published>2016-07-29T10:34:00.000-04:00</published><updated>2016-08-24T11:18:15.606-04:00</updated><title type='text'>July Threat Highlights</title><summary type="text">July was an interesting month from a threat landscape perspective.

We saw android security bulletins for RCE bugs as well as high-severity flaws, and the Jigsaw ransomware decrypted yet again. Perhaps the most dis-concerting is the newly reported use of Conficker in attacks against IoT devices.

</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/2779937220022936564/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/07/july-threat-highlights.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2779937220022936564'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/2779937220022936564'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/07/july-threat-highlights.html' title='July Threat Highlights'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-8630399512209647923</id><published>2016-06-30T14:24:00.000-04:00</published><updated>2016-08-24T10:30:07.209-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Observations"/><title type='text'>InfoSec to Remote or Not? That is the question.</title><summary type="text">Lately, I&#39;ve been hearing of more and more companies &quot;reigning-in&quot; their Cyber Security professionals. At first impression this may seem like a no-brainer. But may be more backlash against the casual and laze faire behavior of a small group of abusive remote workers than anything. This begs several questions:

1. Is it more efficient?

2. Are workers (especially of certain generations) more </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/8630399512209647923/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/07/infosec-to-remote-or-not-that-is.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8630399512209647923'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8630399512209647923'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/07/infosec-to-remote-or-not-that-is.html' title='InfoSec to Remote or Not? That is the question.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-648303167647883767</id><published>2016-05-31T16:18:00.000-04:00</published><updated>2016-08-24T10:30:58.448-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cryptolocker"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Talks"/><title type='text'>BSides Knoxville 2016: CryptoMalware Talk</title><summary type="text">Had a great time presenting at&amp;nbsp;BSides Knoxville 2016: CryptoMalware: The persistent, ubiquitious threat: 

*update*
ICYMI: Watch the YouTube video of my presentation:&amp;nbsp;https://www.youtube.com/watch?v=6dP5Zt49uA8

I&#39;m greatly looking forward to next year!</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/648303167647883767/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/05/bsides-knoxville-2016-cryptomalware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/648303167647883767'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/648303167647883767'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/05/bsides-knoxville-2016-cryptomalware.html' title='BSides Knoxville 2016: CryptoMalware Talk'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-4051624714182739066</id><published>2016-05-18T13:49:00.002-04:00</published><updated>2016-08-24T10:30:54.178-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="LeakWare"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Observations"/><title type='text'>Moving from RansomWare to LeakWare</title><summary type="text">One of the trends I have observed on the Cyber Security threat landscape is the movement from &quot;Ransonware&quot; like CyrptoLocker, TeslaCrypt and CryptoWall to a new category of malware I am calling &quot;LeakWare.&quot; This is a distinct category of malware that needs its own category, defenses and and special attention.

Simply defined, we can expect LeakWare will hold a user or company&#39;s data for ransom (</summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/4051624714182739066/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/05/moving-from-ransomware-to-leakware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4051624714182739066'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/4051624714182739066'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/05/moving-from-ransomware-to-leakware.html' title='Moving from RansomWare to LeakWare'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-8995961623956204485</id><published>2016-03-31T10:28:00.000-04:00</published><updated>2016-08-24T10:33:21.225-04:00</updated><title type='text'>The house judiciary committee hearing on FBI vs. Apple</title><summary type="text">
The hearing listens like a user awareness training session boadcast via C-SPAN. This is a classic case of sacrificing the greater good for the emotional satisfaction (revenge?) of the few. It&#39;s cirtical during times like these when emotions run high to remember that two wrongs don&#39;t make a right. Obviously, this wrong choice won&#39;t make those crimes right either.


Congress, Please don&#39;t do this </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/8995961623956204485/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/03/the-house-judiciary-committee-hearing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8995961623956204485'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8995961623956204485'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/03/the-house-judiciary-committee-hearing.html' title='The house judiciary committee hearing on FBI vs. Apple'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-8487476692611722574</id><published>2016-02-29T09:45:00.000-05:00</published><updated>2016-08-24T10:30:58.453-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="DOJ"/><category scheme="http://www.blogger.com/atom/ns#" term="encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>The FBI, Apple and privacy encryption: Why the FBI is putting pressure on Apple to hack a terrorist&#39;s iPhone</title><summary type="text">
I&#39;ve heard a lot of talk lately about why a federal agency would bother with a hardware and software vendor in the course of obtaining a known terrorists associates. Here&#39;s my analysis FWIW...



If you follow DOJ cases you&#39;ll notice a trend of late where in the course of establishing an air tight case judges are requesting very intimate details of how the FBI and others have come by their </summary><link rel='replies' type='application/atom+xml' href='https://blog.casterlan.com/feeds/8487476692611722574/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://blog.casterlan.com/2016/02/the-fbi-apple-and-privacy-encryption.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8487476692611722574'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8487476692611722574'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2016/02/the-fbi-apple-and-privacy-encryption.html' title='The FBI, Apple and privacy encryption: Why the FBI is putting pressure on Apple to hack a terrorist&#39;s iPhone'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4064575309422184605.post-8648121819583392116</id><published>2015-05-18T00:00:00.000-04:00</published><updated>2015-12-30T02:22:16.646-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><title type='text'>Social Engineering: Low-Tech Hacking on the Rise</title><summary type="text">
The Threat That Tech Can’t Stop…


Your phone rings at work. The caller says he is from your IT helpdesk, and they need some information from you to wrap up a project that affects you. He asks for some information, and it seems legitimate enough, so you give it to him. Believe it or not, you’ve just fallen victim to a type of cybercrime called&amp;nbsp;social engineering, also known as the “low-tech</summary><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8648121819583392116'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4064575309422184605/posts/default/8648121819583392116'/><link rel='alternate' type='text/html' href='https://blog.casterlan.com/2015/05/social-engineering-low-tech-hacking-on.html' title='Social Engineering: Low-Tech Hacking on the Rise'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry></feed>