Forget what you know, what you think you know about attribution - I present to you Javvad’s Attribution Methodology or Javtribution(tm) for short. Maybe Dr. Krypt3ia will yell Javtribution Shmattribution and try to poke holes in my findings - but I assure you, my findings can be considered holy enough without any poking. There are … Continue reading Javtribution
Author: j4vv4d
Become a Hollywood Hacker in 3 simple steps
Step 1: Setup a large screen on the wall. Play the threatbutt map on the large screen http://threatbutt.com/map/ Step 2: Whilst dressed up in your hoodie and surrounded by empty cans of energy drinks, keep looking up at the screen and uttering some techno-babble. It doesn't matter what you say as long as you say it … Continue reading Become a Hollywood Hacker in 3 simple steps
Best conference swag
What's the best or most useful free conference swag you've ever received? Here's my countdown of my favourite five. T-shirts and laptop stickers were excluded from the running because there are far too many to pick from. After making the video, I did start finding other little things that I could have mentioned. Typically, I've found … Continue reading Best conference swag
Spiceworld London
Spiceworld London has nothing to do with the Spice Girls and everything to do with Spiceworks. It's their annual conference and my first time attending. Having only been embedded within the spiceworks community for a short while, I wasn't entirely sure what to expect. I guess I was cautiously optimistic. But found it to be … Continue reading Spiceworld London
RSA 2015: The Movie
My first time as a vendor at a security conference and what better way to kick it off than with RSA.
It’s simple, but not easy to become a better speaker
At RSA 2015, Thom Langford gave, in my opinion, an outstanding presentation entitled, Stop selling and start marketing your information security program. I shared it with a few of my friends who I knew were working on security programs at their own companies as there was a lot of useful information in the talk. One … Continue reading It’s simple, but not easy to become a better speaker
10 hours walking a security conference
What happens when you walk a security conference in silence for 10 hours? Wendy helped me so we could find out.
Security Haiku
Do you ever get bored when someone starts of a presentation by going over how bad the infosec situation is? They'll quote figures of breaches and how vulnerabilities are going through the roof. Or maybe you're pressed for time and need to get to the meaty part of your security presentation but want to make … Continue reading Security Haiku
Bane for CISO
Last weekend I came to the conclusion that Bane - the bad guy from The Dark Knight Rises would make the perfect chief information security officer.
Think like a hacker – the GC version
Girl Cynic weighs in her opinions on what it means to 'think like a hacker' and it isn't pretty.
