Reflection after Twenty Two Years
This month marks the completion of my twenty-second professional year in the technology industry. From days of system/network/IT work, in the worlds of AS400, UNIX,… Read More »Reflection after Twenty Two Years
This month marks the completion of my twenty-second professional year in the technology industry. From days of system/network/IT work, in the worlds of AS400, UNIX,… Read More »Reflection after Twenty Two Years
A bunch of industry friends and colleagues were asked to provide security predictions for 2019. Here’s what we each had to say: Excerpt from Rapid7… Read More »Facing the Future: Rapid7’s 2019 Security Predictions
Repost from: Veracode blog The news regarding the NSA and its British counterpart discussed how the Angry Birds app was targeted as a means to… Read More »How Angry Is That Bird?
Repost from: MITRE Cybersecurity Mobile device security still tops the list of IT security concerns. In this post, we interview Shawn Valle about his 2-day… Read More »Cyber Training: Introduction to Android Forensics & Security Testing
Here’s a report from the first publicly released security audit of an iPad app using the iMAS developed open-source security libraries. This report shows that… Read More »hReader iOS Mobile Application Security Audit
Now Available! iMAS – iOS Mobile Application Security January 2013 iMAS is a secure iOS application framework research project focused on reducing iOS application vulnerabilities… Read More »iMAS – iOS Mobile Application Security
This is the publicly released slide deck that accompanies a 1-hour webinar that briefed the security (and anti-security) techniques of the Android operating system and… Read More »Android Forensics & Security Testing
Led research and development of white paper on technical details of developing Android mobile applications with a focus on data security and software assurance. Leveraged… Read More »Android Secure App Development Guidance for DoD