Archive for May, 2011

On Television –

Posted: May 25, 2011 in Uncategorized

Someone, whom I regularly follow their blogs and podcasts, was recently on television. Most specifically on a Canadian television show called 16 by 9 (16:9).

Georgia Weidman recently made some IT security news by proposing that smart phones could be used as a botnet. She then took her theory and proved that it can be done. I invite those interested to watch the coverage from the episode ( ). I also think that if you are more interested in the information, you should research her slides and presentations she has done on the topic. Here is just one post on the topic – . For those further interested, check the Defcon site or similar sites for relevant slide materials. If you can’t find any, give me a shout out and I’ll help you locate them. Of course during your search(es) you will in all likelihood learn many other security details, so the search can be rewarding.

It was also great seeing Larry Pesce on the same 16:9 new story. Larry is a co-host of a podcast I regularly watch, PaulDotCom. For those IT security minded, I highly recommend catching the PaulDotCom weekly broadcast. Past episodes are also available for viewing.

In the end, your smart phone might be smarter than you think it is. And unfortunately, it doesn’t always keep your secrets.


Training with the IronGeek

Posted: May 23, 2011 in Uncategorized

This past Saturday, our local ISSA chapter set up a training session with Adrian Crenshaw. I had watched many conference videos of Adrian, as well as videos on his website ( ). It was great to finally get to meet the IronGeek. In addition, to meeting him, he provided quite a few hours of stimulating intellectual presentation and discussion. I highly recommend visiting his website and taking the time to view some of his presentations. There were also some great people at the training session that I had never gotten a chance to meet at local ISSA meetings. All in all it was a great day of learning.

This training session was sponsored by Splunk. They provided lunch for us. I first got exposed to Splunk as part of my schoolwork. I ended up writing a paper about them for a class. In addition, one of the challenges at our State CCDC competition was to setup and utilize Splunk. This simple product is one I highly recommend. The Splunk rep put on a nice simple presentation about their product after lunch, it was interesting seeing the perspectives of those who hadn’t heard of it, or had no idea of it’s potential.

Again, I had a great time learning some new stuff in addition to looking at stuff I already knew from different angles. I look forward to seeing Adrian again at DerbyCon later this year.

Another Achievement

Posted: May 19, 2011 in Uncategorized

So, today at around 11:45AM EST, I got my Security+ Certification. Looking forward to getting the Certificate sent to me as well as the logos so I can get my business cards made up. This is just one more stepping stone on my path to a brighter future. Over the past few months, I have really taken hard looks at the ‘playing field’ so to speak. IT security is growing by leaps and bounds, just as I thought it would over 2 years ago when I began this journey. I am looking forward to my further adventures and the challenges that lay ahead.