Always Remember: With Gusto Comes Data Loss.

Introduction to Regular Expressions (Regex)

This next subject might seem a bit obscure, but I promise you, this guide will benefit you significantly if you work in IT/Security long enough. I’m going to be discussing what is usually referred to as a regular expression, or regex. Regex is a very powerful way to search through massive text files for exactly what you need. The problem is, it looks like gibberish until you know exactly how it works.

Continue reading

The Basics of Cryptography

With the nearly constant flood of data breaches that we read about almost every day, I thought I would take some time to cover the basic cryptographic techniques out there. I have avoided this so far because it is a rather difficult subject to explain without immediately going over many people’s heads. However, it is becoming increasingly clear that everyone, not just those using it on a daily basis, needs to understand just how encryption works. Continue reading

Security vs. Compliance and the Role of the Penetration Tester in 2016

Recently I was asked to write an article about one of the many challenges facing Penetration Testers in 2016. I decided to focus on the role that compliance plays in the process of securing corporate systems. This is not as simple as it may seem, as being in compliance with security regulations does not necessarily mean your systems are secure. Below is the text of the published article. If you would like the original publication you can find it at Continue reading