
Upgrading My Data Storage System: A New Approach to Handling Terabytes of Breach Data
Anyone who’s heard me teach or speak about breach data, info stealer logs, etc., knows that I actively monitor a lot of different places and

Anyone who’s heard me teach or speak about breach data, info stealer logs, etc., knows that I actively monitor a lot of different places and

Hey everyone! I’m still very much recovering from jet lag after my trip back from Singapore. You’d think that when you’re falling asleep all day,

I got home late last evening from Singapore after an exhausting 30-hour travel day. All in all, Singapore was incredible—not just because of the amazing



Last night I had the pleasure of speaking to over one hundred people in person, and more online at the SANS community night here in

I had a student in class today talk about potentially using metadata to determine if the person who took a photo was left or right



I had an OnDemand student reach out to ask for some tips for exam prep. Rather than type it up, I decided to cut a

