The Department of Yes [securitytheater.phoneboy.com]
I was listening to Episode 395 of the Security Weekly podcast when I heard one of the guys say that Information Security is often The Department of No. As in, no, you can't use that device. Why?
PhoneBoy Speaks, the Information Security Edition [securitytheater.phoneboy.com]
While it's not always a focus area of my PhoneBoy Speaks podcast, I do occasionally cover Information Security topics on my podcast.
Breaches Are Inevitable, Or Are They? [securitytheater.phoneboy.com]
From Palo Alto CEO: Beware the Internet of Things – and watch your car: [Read More]
Shocked Instagram let me "reclaim" the username PhoneBoy by simply renaming my account to it. Not complaining. [instagram.com]
Gotta love how Pourover decides to vomit posts all over my timeline. At least these are blog posts I actually wrote :P
Lies, Damn Lies, and Inspecting SSH Traffic Securely [securitytheater.phoneboy.com]
SSH is a wonderful tool for accessing remote systems via a CLI. If you're so inclined, you can even use an SSH tunnel as a SOCKS proxy. [Read More]
The Right Way To Inspect SSH Connections [securitytheater.phoneboy.com]
When talking with Check Point customers, a common request I hear is for the ability to "decrypt" SSH traffic, see inside of said traffic, and make security decisions based on what it finds, including…
All The Security Tools In The World Won't Help If You Don't Do This [securitytheater.phoneboy.com]
In my travels as a Security Architect for Check Point Software Technologies, I have seen many different customer environments.
There's a Nintendo Wii-U Sized Hole In My Firewall [securitytheater.phoneboy.com]
In order to allow your Nintendo Wii-U to participate in multiplayer online games, you have to configure your router/firewall/whatever in one of three ways per Nintendo: [Read More]