March 11, 2019 How I used Digikrieg.com to host a CTF at my university. If you haven’t heard of Digikrieg.com, you should definitely check it out. I wrote this site back in 2016 as part of Promethean Information…
March 3, 2019 “Rolling your own Crypto” This blog post is specifically for r/netsec (and a few other security pros I’ve met outside of there). Cryptography is one of the subjects…
March 3, 2019 If you’re not peppering your passwords, you are irresponsible. You heard me. You know how weak your user’s passwords likely are. You know your users are almost certainly sharing their passwords with multiple…
March 2, 2019 Reactive Hashing I recently had a version of this idea proposed to me by the team over at FusionAuth: “Why not determine the type of hashing…
February 16, 2019 No-one is Prepared for Space Based Cyberwarfare Spaceborne cyberwarfare is easily one of the largest issues looming on the near future horizon, and nobody is talking about it. It doesn’t take…
February 12, 2019 There are Two Types of Hackers When you think of a “hacker” what do you picture? Is it a child computer genius with incredible math skills? A wild former spy…
February 11, 2019 Introducing SecRate.io Today is an exciting day for me. Today I am announcing the release of a brand new web service I’ve been working on in…
January 13, 2019 Why You Shouldn’t be Using BCrypt and Scrypt I start by saying that this is certainly an opinion piece. However it’s not just pure opinion. My opinion on this subject is backed…
November 15, 2018 Aliens will be Amazing There is a common theory floating around in the collective consciousness of humanity, that if aliens are out there (hint: they almost certainly are)…
November 9, 2018 Beauty and Mastery What came first, the chicken or the egg? It’s a joke, a metaphor, a twisted question to ask yourself when you have nothing better…