327 Followers
319 Following
99 Posts
Partner at Blackthorne Consulting; Former Red Team Director at GE and US Navy; Advisory Board member; US Navy Veteran.

 Keynote speaker; featured in Tribe of Hackers - Red Team (published by Wiley)

 My opinions are my own. Links are not endorsements.
twitterhttps://twitter.com/operant
Keybasehttps://belldavidr.keybase.pub
CallsignW3DRB
webhttps://operant.io
LocationVirginia Beach, USA
You don't need your company name on the side of a race car. You don't need an army of sales folks getting paid 3x what your engineers are. You don't need to spend half a million on a conference booth. Your security tool just needs to be good and help people at a reasonable price.
Last week, we launched a high-altitude balloon into the stratosphere. The payload included three Cube Satellite emulators built by rural classroom students we worked with. Their CubeSats collected real atmospheric data, which was returned to the classes for analysis. One of the neater projects we've done with Rural Tech Fund and our partner Teachers in Space. Check out these views from the balloon!

I keep forgetting to mention this little trick.

One of the most effective Cybersecurity tools at an enterprise, costs nothing, and if you can get it - access to the list of charges people put on corporate cards.

You’ll find shadow IT in the form of SaaS signups.

You’ll see charges at Best Buy for wireless access points and unmanaged switches.

OpenAI subscriptions.

AWS charges for accounts you never knew about.

As the old saying goes. You want answers? Follow the money.

#infosec

I was reminded of this today for no particular reason ;)

James Mickens’ “Mossad/not-Mossad Duality” in threat models

If you’re going to be in Las Vegas next week and want to reconnect, let me know! Hope to see you there.
IT suppliers hacked off with Uncle Sam's demands in aftermath of cyberattacks https://go.theregister.com/feed/www.theregister.com/2024/02/08/us_tech_industry_changes/
IT suppliers hacked off with Uncle Sam's demands in aftermath of cyberattacks

Plan says to hand over keys to networks – and report intrusions within eight hours of discovery

The Register
I’m at Black Hat; let me know if you’re around and want to catch up!

Great reporting showing the combination of cyber and physical security threats by nation state group.

Requiring less than 10 minutes to watch, this is a video you should absolutely be using to evangelize security concerns with stakeholders.
https://youtu.be/0xlq4WSpUH8

Intrigue in Copenhagen: A Tale of High-Stakes Corporate Espionage

YouTube
We're now verified with @hachyderm as a specialized account, and have agreed to the Specialized Account Expectations. https://community.hachyderm.io/docs/account-types/verification/
Specialized Account Verification with Hachyderm

How to become a verified, specialized, account with Hachyderm.

Have an extra #Shmoocon barcode, anyone looking?