<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Security n Cigars: Fear, Uncertainty, & Doubt]]></title><description><![CDATA[This is where the old Security, Cigars, & FUD blog lives now. This archive contains all my information security postings. ]]></description><link>https://securityncigars.com/s/fear-uncertainty-and-doubt</link><image><url>https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png</url><title>Security n Cigars: Fear, Uncertainty, &amp; Doubt</title><link>https://securityncigars.com/s/fear-uncertainty-and-doubt</link></image><generator>Substack</generator><lastBuildDate>Fri, 03 Apr 2026 23:58:23 GMT</lastBuildDate><atom:link href="https://securityncigars.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Eric W. Cowperthwaite]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[securityncigars@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[securityncigars@substack.com]]></itunes:email><itunes:name><![CDATA[Eric]]></itunes:name></itunes:owner><itunes:author><![CDATA[Eric]]></itunes:author><googleplay:owner><![CDATA[securityncigars@substack.com]]></googleplay:owner><googleplay:email><![CDATA[securityncigars@substack.com]]></googleplay:email><googleplay:author><![CDATA[Eric]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Getting Back To New Normal and Good Security Hygiene]]></title><description><![CDATA[Today at work we were working with some clients who still had some very old, and insecure, authentication methods in their networks.]]></description><link>https://securityncigars.com/p/getting-back-to-normal-for-security-professionals</link><guid isPermaLink="false">https://securityncigars.com/p/getting-back-to-normal-for-security-professionals</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Fri, 26 Mar 2021 20:46:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7f512f57-c9ca-4c69-8f1a-3231fb762c54_640x427.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today at work we were working with some clients who still had some very old, and insecure, authentication methods in their networks. Methods that could enable a malicious person to take over their entire Active Directory domain in a matter of minutes. Fortunately these clients are taking action to fix the problem and while they are doing that, they have <a href="https://www.miltonsecurity.com/">my company</a> actively protecting them. But it highlights how security hygiene in the new normal has to change.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://i0.wp.com/securityandcigars.com/wp-content/uploads/2021/03/new_normal.jpeg?ssl=1" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9eTe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9eTe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9eTe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9eTe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9eTe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg" width="640" height="427" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:427,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://i0.wp.com/securityandcigars.com/wp-content/uploads/2021/03/new_normal.jpeg?ssl=1&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!9eTe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9eTe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9eTe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9eTe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5ccf7c1-9024-4820-84b3-43c148df58f5_640x427.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This led me to back to thinking about the new normal again. Things are changing rapidly and continuously, as we all know. And in getting back to normal, that is not going to change. That is one of the aspects of getting back to normal that is here to stay. So, we see things like the Exchange Server attacks by Hafnium (a Chinese threat actor) that we learned about in February, 2021, or the Solarwinds attack that we first learned of in December, 2020. These things are going to continue to happen. And faster, more rapidly than ever before.</p><p>Side note: In the <a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">Solarwinds attack</a>, 18,000 entities globally were vulnerable. But only 10% or so were actually breached by malicious actors. In the <a href="https://www.csoonline.com/article/3610389/chinese-cyberespionage-group-hacks-us-organizations-with-exchange-zero-day-flaws.html">Exchange Server breaches</a>, over 70,000 entities were vulnerable and it appears that 30,000, or so, were breached by malicious actors. The changes in magnitude are quickly exploding.</p><p>At the same time, so is the change in our own networks, applications, and infrastructure supporting our schools, governments, companies, and homes. Over the last 12 months we have seen organizations move ALL of their data and applications to cloud computing, whether to something like Amazon Web Services or to Software as a Service like Sales Force or to Storage as a Service like Dropbox. They are moving, or have entirely moved, their traditional network infrastructure (authentication, file services, email, office productivity) to the cloud as well: Google Drive, Microsoft Azure, Apple iCloud have all been great beneficiaries of this. Many of these organizations are maintaining crazy hybrid environments. All in a quest to support their business that is seeking to survive this insane time we are going through.</p><p>But all of this leads us to how do we, security professionals, deal with the inevitable problems that this is going to introduce in to our networks. Unpatched systems, poorly configured authentication, new vulnerabilities, and more. How do we deal with the cyber hygiene problems?</p><p>I&#8217;m going to suggest that now is the time for even more of the basics than ever before. Every vendor under the sun is going to try and sell you some miraculous tool to solve your problems. It will be magical for the low, low price of just XXXX. And I&#8217;m going to tell you that your first instinct should not to be to buy some magic silver bullet. We&#8217;ve been chasing the silver bullet in security for decades now. If that was going to work, wouldn&#8217;t it have worked already?</p><p>What I can tell you from decades in the business, as both a practitioner and a vendor, is that the organizations that solve the basics are the ones that do the best when confronted by security challenges.</p><p>But, just like everything else about Getting Back To Normal, there are going to be changes you need to make to the basics. You have to patch faster. You have to look deeper into your environment. You have to connect on-prem and cloud systems better. You need more resiliency in your defensive layers. And, most importantly, you have to figure out how to detect and respond to bad things much faster.</p><p>If you do, your organization stands a chance in the new normal. &nbsp;</p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2021/03/26/getting-back-to-normal-for-security-professionals/">Getting Back To New Normal and Good Security Hygiene</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>]]></content:encoded></item><item><title><![CDATA[Back to Normal]]></title><description><![CDATA[Yesterday I was thinking about this whole &#8220;back to normal&#8221; thing that we are now experiencing.]]></description><link>https://securityncigars.com/p/i-just-bought-tickets-to-a-mariners-baseball-game-life-is-heading-back-to-normal</link><guid isPermaLink="false">https://securityncigars.com/p/i-just-bought-tickets-to-a-mariners-baseball-game-life-is-heading-back-to-normal</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Wed, 24 Mar 2021 23:53:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Yesterday I was thinking about this whole &#8220;back to normal&#8221; thing that we are now experiencing. You know, COVID-19 vaccinations, and herd immunity, re-opening the economy and institutions, all of the things that are happening around us right now after over 12 months of a very decidedly not normal world. Public schools in WA state are beginning full in person education next week. I just bought tickets to a Mariners baseball game. Life is heading back to normal.</p><p>And that really means all sorts of things. We are going to see people returning to working in offices, children back in schools, bars open, regular travel again.</p><p>However, the world changed dramatically 12 months ago. Businesses transitioned to a completely remote work force and no travel. Schools moved to online education. Bars are allowed to send you cocktails via Uber Eats. The genie of a modern, networked, computerized world is well and truly out of the bottle. In our desire to &#8220;get back to normal&#8221;, we haven&#8217;t realized that there is no going back. You can&#8217;t stuff the genie back in the bottle.</p><p>And this new world is going to be difficult and challenging, fast paced, and ever changing.&nbsp;<a href="https://www.cnbc.com/2020/03/11/who-declares-the-coronavirus-outbreak-a-global-pandemic.html">March 11, 2020</a>&nbsp;is as much a world changing day in the history of the world as&nbsp;<a href="https://www.historyextra.com/period/first-world-war/ww1-armistice-day-remembrance-sunday-poppies-silence-commemoration/">November 11, 1918</a>&nbsp;or&nbsp;<a href="https://www.history.com/topics/21st-century/9-11-attacks">September 11, 2001</a>&nbsp;or&nbsp;<a href="https://www.history.com/topics/world-war-ii/bombing-of-hiroshima-and-nagasaki">August 6, 1945</a>.</p><p>I will be seeing the Mariners play baseball in person, working from home, supporting clients globally, and traveling somewhere this summer with my family. And perhaps all of that explains my thinking in&nbsp;<a href="https://www.prnewswire.com/news-releases/milton-security-hires-cowperthwaite-as-chief-operating-officer-301241507.html">joining Milton Security</a>&nbsp;a few weeks ago. I had literally left my previous employer just a few days prior. In the past, I&#8217;d always taken a little while to figure out what is next, what I want to do, where I want to go. This time, though, it happened very quickly, just a couple days.</p><p>And that is part of this &#8220;new normal&#8221;. Things change. Rapidly. You have to adjust and adapt just as quickly. An opportunity to do really great things in this brave new world popped up and I jumped on it. A company by veterans, dedicated to supporting veterans, and committed to the mission of protecting clients. What could be better?</p><p>So, here I am &#8230;. and yes, there will be cigars and FUD, not just blah blah about security stuff. Meanwhile, I&#8217;m the Chief Operating Officer of a great company, working with one of my best friends, taking care of great people.</p><p>As Jim McMurry and I say to each other &#8230; #BLESSED</p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2021/03/24/i-just-bought-tickets-to-a-mariners-baseball-game-life-is-heading-back-to-normal/">Back to Normal</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>]]></content:encoded></item><item><title><![CDATA[How To Get My Attention]]></title><description><![CDATA[A couple days ago, I let it be known on LinkedIn that I had taken a new position as the Director, Information Security at Esterline Technologies. Then I got a bunch of private messages from sales folks trying to sell me stuff. So, I posted a quick response to that calling out the poor behavior. And finally, decided to write something longer. I wrote it as an article on LinkedIn, but thought I&#8217;d post it here, also. Everything below the line is the original LinkedIn article.]]></description><link>https://securityncigars.com/p/how-to-get-my-attention</link><guid isPermaLink="false">https://securityncigars.com/p/how-to-get-my-attention</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Fri, 05 Jan 2018 20:33:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6e7fd1d5-24a4-480f-aa59-53453ded6063_640x360.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A couple days ago, I let it be known on LinkedIn that I had taken a new position as the Director, Information Security at <a href="http://www.esterline.com/">Esterline Technologies</a>. Then I got a bunch of private messages from sales folks trying to sell me stuff. So, I posted a quick response to that calling out the poor behavior. And finally, decided to write something longer. I wrote it as an article on LinkedIn, but thought I&#8217;d post it here, also. Everything below the line is the original LinkedIn article.</p><p>I know the other day I was somewhat flip, and absolutely critical, of a common social media behavior used by many in the sales, business development, and marketing professions. But, perhaps, I wasn&#8217;t clear on two things. First, why this behavior is so wrong and second, that I absolutely like, need, and want good sales folks in my ecosystem.</p><p>What has happened is that many folks in sales, marketing and business development have turned to using social media in the same way that they conduct direct email marketing. When I&#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/how-to-get-my-attention">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Travel Like a Pro]]></title><description><![CDATA[I was chatting with my friend Katie Ledoux (@kledoux) a few weeks ago about travel type stuff.]]></description><link>https://securityncigars.com/p/travel-like-pro</link><guid isPermaLink="false">https://securityncigars.com/p/travel-like-pro</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Fri, 26 May 2017 16:18:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I was chatting with my friend Katie Ledoux (@kledoux) a few weeks ago about travel type stuff. She was totally stoked that, for the first time ever, she had status on an airline. Remembering that, I saw that her airline had a bonus for flights going to/from NYC. Since she lives in Boston, it should be pretty easy for her to route through NYC airports and earn the bonus.</p><p>When I shot her a quick note this morning about the bonus offer, Katie got excited all over again. I asked her if she had a travel credit card, and she said that was next on her &#8220;being a grown-up&#8221; list of things to do. Thinking about what travel credit card to advise her to get, I asked if she was loyal to a specific hotel chain. After saying &#8220;wow, imagine being fancy enough to prefer a particular hotel chain&#8221;, then Katie said to me &#8220;please advise&#8221; &#8230;.. hence the new blog tags of &#8220;please advise&#8221;, &#8220;being a grown-up&#8221; and &#8220;doing adulting right&#8221;.</p><p>Millenials are the biggest group of new travelers, with cash in hand, that the a&#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/travel-like-pro">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Trolls]]></title><description><![CDATA[I hate it when I get caught by trolls.]]></description><link>https://securityncigars.com/p/trolls</link><guid isPermaLink="false">https://securityncigars.com/p/trolls</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Wed, 16 Dec 2015 16:05:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I hate it when I get caught by trolls. No, there is no new LinkedIn breach. I read the article and missed the date on it. Thanks Jayson Street for pointing out the date to me.&nbsp;</p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2015/12/16/trolls/">Trolls</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>
      <p>
          <a href="https://securityncigars.com/p/trolls">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Eric Update]]></title><description><![CDATA[As many of you probably know by now, we sold Core Security.]]></description><link>https://securityncigars.com/p/eric-update</link><guid isPermaLink="false">https://securityncigars.com/p/eric-update</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Wed, 09 Dec 2015 21:15:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As many of you probably know by now, we sold Core Security. Courion and Core Security will be merging as a result of the sale. This is good for Core. At the same time, I am leaving Core Security and looking for my next adventure!</p><p><a href="http://www.coresecurity.com/news-and-events/courion-acquires-core-security">Courion acquires Core Security</a></p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2015/12/09/eric-update/">Eric Update</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>
      <p>
          <a href="https://securityncigars.com/p/eric-update">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Information Security and Tanks]]></title><description><![CDATA[Not too long ago my good friend, Michael Farnum, invited me to be the closing speaker at HouSecCon. I told him I would love to &#8230; then he asked me to give a talk that involved my military experience and how it prepared me for the world of Information Security. Two things that are very important in my life, but not necessarily ones I had connected very strongly. After I spent a bunch of time looking at old pictures and revisiting stories of my years in the Army, I realized that the Army had actually prepared me quite well for a career in Information Security. And I knew just the pictures and stories to share with my audience.]]></description><link>https://securityncigars.com/p/information-security-and-tanks</link><guid isPermaLink="false">https://securityncigars.com/p/information-security-and-tanks</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Tue, 20 Oct 2015 16:39:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Not too long ago my good friend, Michael Farnum, invited me to be the closing speaker at <a href="http://www.houstonseccon.com/v6/">HouSecCon</a>. I told him I would love to &#8230; then he asked me to give a talk that involved my military experience and how it prepared me for the world of Information Security. Two things that are very important in my life, but not necessarily ones I had connected very strongly. After I spent a bunch of time looking at old pictures and revisiting stories of my years in the Army, I realized that the Army had actually prepared me quite well for a career in Information Security. And I knew just the pictures and stories to share with my audience.</p><p>One of the things that was going to be key was to share my experiences on tanks and to show pictures of tanks. And,&nbsp;because of the awesome contributions of <a href="http://www.irongeek.com">Adrian Crenshaw</a>, I am able to share not just the slides and pictures of tanks, but the entire presentation with you.</p><p><a href="http://www.irongeek.com/i.php?page=videos/houseccon2015/keynote01-everything-i-need-to-know-about-information-security-i-learned-shooting-tank-guns-eric-cowperthwaite">Everything I Know About Information Security, I Learned Shooting Tank Guns!</a></p><p>Facebook 0 Twitter 0 &#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/information-security-and-tanks">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Emergency Preparedness and Cyber Security]]></title><description><![CDATA[This week I had the opportunity to be the plenary speaker for the Alaska Homeland Security Preparedness Conference. It was a great chance to talk to folks who worry about terrorism and natural disasters and convey to them the impact that information security threats could have in their readiness planning and response. I thought people might be interested in the presentation I used. It doesn&#8217;t have huge detail in it, I spoke to that. But it conveys the issues I think Homeland Security Emergency Planners at the state and local level should be thinking about.]]></description><link>https://securityncigars.com/p/preparedness</link><guid isPermaLink="false">https://securityncigars.com/p/preparedness</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Fri, 09 Oct 2015 18:49:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week I had the opportunity to be the plenary speaker for the <a href="https://www.ak-prepared.com/Preparedness/Conferences/Fall2015">Alaska Homeland Security Preparedness&nbsp;Conference</a>. It was a great chance to talk to folks who worry about terrorism and natural disasters and convey to them the impact that information security threats could have in their readiness planning and response. I thought people might be interested in the presentation I used. It doesn&#8217;t have huge detail in it, I spoke to that. But it conveys the issues I think Homeland Security Emergency Planners at the state and local level should be thinking about.</p><p><a href="https://securityandcigars.com/wp-content/uploads/2014/07/Homeland-Security-And-Cyber-Threats.pdf">Homeland Security And Cyber Threats</a></p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2015/10/09/preparedness/">Emergency Preparedness and Cyber Security</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>
      <p>
          <a href="https://securityncigars.com/p/preparedness">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Thinking About Reducing Risk]]></title><description><![CDATA[Wow, it&#8217;s been a long time since I&#8217;ve posted here.]]></description><link>https://securityncigars.com/p/thinking-about-reducing-risk</link><guid isPermaLink="false">https://securityncigars.com/p/thinking-about-reducing-risk</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Fri, 02 Oct 2015 20:56:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f40284eb-120f-4c94-889f-b3b16ed8e724_640x349.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Wow, it&#8217;s been a long time since I&#8217;ve posted here. I&#8217;ve been kinda busy, tons of travel, sending a kid off to college, BlackHat and DefCon and DerbyCon, lots of engagement with customers around the idea of a mature vulnerability management program. It&#8217;s been busy. No excuse, though. Although some of my content and thoughts can be found over at the <a href="http://www.rsaconference.com/blogs/by/169/cowperthwaite">RSA Conference Blog</a>. So, I&#8217;ve got that going for me anyway.</p><p>Be that as it may, I&#8217;ve been thinking about something and thought I would put it out there.</p><p>I often hear that perfection when it comes to risk is critical for airlines and the aviation industry. But that perfection is not possible for the security industry and we just have to do our best. Now, let&#8217;s think about this for a minute. Does it really makes sense to just blithely say we can&#8217;t do it, throw our hands in the air and give up?</p><p>When I was a kid growing up I remember roughly an airplane crash almost once a week&nbsp;on the evening news. It was sort of common place. Today? We are shocked &#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/thinking-about-reducing-risk">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Advice for Board Members]]></title><description><![CDATA[Recently a CEO that I worked for in the past reached out to me.]]></description><link>https://securityncigars.com/p/advice-for-board-members</link><guid isPermaLink="false">https://securityncigars.com/p/advice-for-board-members</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Mon, 06 Apr 2015 22:18:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Recently a CEO that I worked for in the past reached out to me. Like many successful CEO&#8217;s, he has &#8220;retired&#8221;. But do you ever really retire at that point? John now sits on the board of a few companies and does some consulting. He&#8217;s written a very insightful book about transformation in the industry we worked in. And he is an insanely successful guy in his entire career. I was very pleased and honored that he reached out to me for some advice.</p><p>His question revolved around what a board member should be asking to get informed about the security program of the company he was responsible for as a Director. This is a fantastic question. One I think more Directors need to think about. After all, they have a fiduciary responsibility for that company.</p><p>I wrote my former CEO a long (for me) email around all of this. After thinking about it a bit, I realized that this is something that should be shared more broadly. So, stripping the personal content out, I am including my answer to John in full fo&#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/advice-for-board-members">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Do The Security Basics Well ….. AGAIN (and again, and again)]]></title><description><![CDATA[I&#8217;m not really sure what it is going to take for people to do Information Security basics well.]]></description><link>https://securityncigars.com/p/security-basics-well</link><guid isPermaLink="false">https://securityncigars.com/p/security-basics-well</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Wed, 10 Dec 2014 19:01:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;m not really sure what it is going to take for people to do Information Security basics well. Just how many multi-million credit card breach, PLA attacks a hospital company, hacktivists use insider to breach you headlines is it going to take? Seriously people, I feel like <a href="http://en.wikipedia.org/wiki/The_Boy_Who_Cried_Wolf" title="The Boy Who Cried Wolf">the boy who cried wolf</a>. Except that I really am alerting you to the wolf and you appear to think I&#8217;m just making it up.</p><p>I&#8217;ve been writing and presenting on what is going on for years now. For example, there is <a href="https://securityandcigars.com/2014/07/09/what-is-a-good-security-program/" title="What Is A Good Security Program?">this piece</a> I wrote in July. In it I said that you could reduce 80-90 percent of the risk you face by doing the following:</p><blockquote><ul><li><p>Patch and Update (yep, they listed it first)</p></li><li><p>Good fundamental policies</p></li><li><p>Security education</p></li><li><p>Encryption where it&#8217;s warranted</p></li><li><p>Serviceable perimeter protection</p></li><li><p>Identity and Access Management</p></li></ul></blockquote><p>Based on the onslaught of breaches since then, this hasn&#8217;t sunk in yet. Nor the 14 other times I wrote some variation of that piece. In Jan, 2008 I gave <a href="https://securityandcigars.com/wp-content/uploads/2014/12/ISSA-Q1-Tomorrow.pdf" title="Tomorrow">this presentation</a> to the ISSA CISO Forum &#8230;. notice that most &#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/security-basics-well">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cigars]]></title><description><![CDATA[I realized I haven&#8217;t been living up to the full name of this site lately. Here&#8217;s what&#8217;s on the menu for this weekend!]]></description><link>https://securityncigars.com/p/cigar-reviews</link><guid isPermaLink="false">https://securityncigars.com/p/cigar-reviews</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Tue, 28 Oct 2014 21:43:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d554d873-4f2f-4683-abc6-a2267dcccba6_640x853.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I realized I haven&#8217;t been living up to the full name of this site lately.&nbsp;Here&#8217;s what&#8217;s on the menu for this weekend!</p><a class="image-link image2 is-viewable-img" target="_blank" href="https://i0.wp.com/securityandcigars.com/wp-content/uploads/2014/10/IMG_4775.jpg?ssl=1" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W56o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!W56o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!W56o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!W56o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W56o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg" width="640" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Lagavulin, Graycliff and a Montecristo&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://i0.wp.com/securityandcigars.com/wp-content/uploads/2014/10/IMG_4775.jpg?ssl=1&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Lagavulin, Graycliff and a Montecristo" title="Lagavulin, Graycliff and a Montecristo" srcset="https://substackcdn.com/image/fetch/$s_!W56o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!W56o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!W56o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!W56o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa663197b-82e3-42f7-8ae7-24d9db52672c_640x853.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><p>Lagavulin, Graycliff and a Montecristo</p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2014/10/28/cigar-reviews/">Cigars</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>
      <p>
          <a href="https://securityncigars.com/p/cigar-reviews">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Threat & Vulnerability Management Maturity Model Arrives]]></title><description><![CDATA[If you follow my blog, you know the Threat & Vulnerability Management Maturity Model has been in the works for a while now.]]></description><link>https://securityncigars.com/p/threat-vulnerability-management-maturity-model-arrives</link><guid isPermaLink="false">https://securityncigars.com/p/threat-vulnerability-management-maturity-model-arrives</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Thu, 23 Oct 2014 13:25:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you follow my blog, you know the Threat &amp; Vulnerability Management Maturity Model has been in the works for a while now. I&#8217;m happy to report the full model has finally been published in&nbsp;<a href="http://ws.coresecurity.com/vulnerability-management-maturity-model.html">Core Security&#8217;s latest white paper</a>.</p><p>What&#8217;s the value?</p><blockquote><p>By moving through this model, organizations will simultaneously 1) reduce risk exposure and the likelihood of a breach 2) gain ongoing visibility into true business risk, improving future decision-making 3) align IT, information security, and the rest of the organization in the direction of strategic business goals and 4) significantly increase operational efficiency. It&#8217;s not merely an ideal model from a security perspective; it&#8217;s a no-brainer for the business.</p></blockquote><p>So&nbsp;<a href="http://ws.coresecurity.com/vulnerability-management-maturity-model.html">take a look</a>. What do you think? Can you easily identify where your organization stands on the model, and steps for advancing to the next level? Looking forward to your thoughts and feedback!</p><p>PS This is free to the security community and completely focused on how security programs improve t&#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/threat-vulnerability-management-maturity-model-arrives">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Burj Khalifa]]></title><description><![CDATA[On Saturday evening I went up to the top of the Burj Khalifa.]]></description><link>https://securityncigars.com/p/burj-khalifa</link><guid isPermaLink="false">https://securityncigars.com/p/burj-khalifa</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Mon, 13 Oct 2014 05:47:05 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/982f931c-bb10-4a24-be81-3f8e5bc9376a_640x853.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On Saturday evening&nbsp;I went up to the top of the Burj Khalifa. If you aren&#8217;t sure what I mean, the <a href="http://en.wikipedia.org/wiki/Burj_Khalifa">Burj Khalifa</a> is the tallest building in the world. It&#8217;s 2772 feet high (830 meters). The observation deck itself is 1483 feet high. It is insanely impressive.</p><p>Below the fold are some of the pictures I took while I was up there.</p><p>Yes, I was 1480 feet above Dubai.</p><a class="image-link image2 is-viewable-img" target="_blank" href="https://i0.wp.com/securityandcigars.com/wp-content/uploads/2014/10/IMG_4660.jpg?ssl=1" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bN_t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bN_t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bN_t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bN_t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bN_t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg" width="640" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Burj Khalifa is the world's tallest building&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://i0.wp.com/securityandcigars.com/wp-content/uploads/2014/10/IMG_4660.jpg?ssl=1&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Burj Khalifa is the world's tallest building" title="Burj Khalifa is the world's tallest building" srcset="https://substackcdn.com/image/fetch/$s_!bN_t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bN_t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bN_t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bN_t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff90c85ce-b08e-4b1e-aa54-f203a12e93dc_640x853.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><p>Burj Khalifa is the world&#8217;s tallest building</p>
      <p>
          <a href="https://securityncigars.com/p/burj-khalifa">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[23 Years is a Long Time]]></title><description><![CDATA[I woke up in the Middle East this morning.]]></description><link>https://securityncigars.com/p/23-years-is-a-long-time</link><guid isPermaLink="false">https://securityncigars.com/p/23-years-is-a-long-time</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Sat, 11 Oct 2014 07:14:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/36f2746c-e335-47ed-a3f3-f86914131514_640x480.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I woke up in the Middle East this morning. In Dubai in the United Arab Emirates, to be precise. This isn&#8217;t the first time I have been in the Middle East. I&#8217;ve been to Saudi Arabia, Kuwait, Iraq, Egypt and Bahrain. Although there are no stamps in my passport for any of those countries. That&#8217;s because I went to those countries in 1990 and 1991 during Operation Desert Shield/Storm.</p><p>23 years is a long time. I left Saudi Arabia on April 14, 1991. And I was prepared then to say that I would never go back to the Middle East. In fact, until a few months ago I would have told you that the only country in the Middle East I would ever willingly visit, unless things changed dramatically, was Israel. Obviously, now I find myself in the Middle East again.</p><p>It&#8217;s really an interesting experience. So many things are similar. The smells and sounds are the same. The color of the sky, the way the town and the horizon and the colors look. They are different here. It&#8217;s more brown, less green, of course. But r&#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/23-years-is-a-long-time">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Another Preventable Breach]]></title><description><![CDATA[Another entry in the &#8220;Preventable Breach&#8221; and &#8220;We could have prevented this&#8221; columns.]]></description><link>https://securityncigars.com/p/another-preventable-breach</link><guid isPermaLink="false">https://securityncigars.com/p/another-preventable-breach</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Wed, 08 Oct 2014 15:43:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4fb4142c-c286-43b7-a9d1-a34e411f9c6c_640x480.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Another entry in the&nbsp;&#8220;Preventable Breach&#8221; and &#8220;We could have prevented this&#8221; columns. This appears to be all about change and configuration management. An area that really needs some work, clearly.</p><p>Brian Krebs announced last night that there has been a huge data leak at MBIA, the nation&#8217;s largest bond insurer. On Monday, he notified MBIA Inc. that a misconfiguration in a company Web server had exposed countless customer account numbers, balances and other sensitive data. Much of the information had been indexed by search engines. That includes a page listing administrative credentials that attackers could use to access data that wasn&#8217;t accessible via a simple Web search:&nbsp;<a href="https://krebsonsecurity.com/2014/10/huge-data-leak-at-largest-u-s-bond-insurer/">https://krebsonsecurity.com/2014/10/huge-data-leak-at-largest-u-s-bond-insurer/</a></p><p>Let&#8217;s be honest, a misconfigured webserver simply should not happen. This is what makes this a preventable breach. This is the same class of problem as connecting a test server with a default password to the internet, like happened at&nbsp;<a href="http://healthcare.gov/">Health&#8230;</a></p>
      <p>
          <a href="https://securityncigars.com/p/another-preventable-breach">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Year One]]></title><description><![CDATA[It&#8217;s the end of Year One at Core Security. Time really flies when you&#8217;re having fun. I&#8217;ve been here for 12 months now, and a couple days, and I guess I should do the &#8220;looking back after the first year&#8221; blog post. A year ago I wrote about my new adventure]]></description><link>https://securityncigars.com/p/year-one</link><guid isPermaLink="false">https://securityncigars.com/p/year-one</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Sun, 05 Oct 2014 18:12:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s the end of Year One at <a href="http://www.coresecurity.com/">Core Security</a>. Time really flies when you&#8217;re having fun. I&#8217;ve been here for 12 months now, and a couple days, and I guess I should do the &#8220;looking back after the first year&#8221; blog post. A year ago I wrote about my <a href="https://securityandcigars.com/2013/09/23/a-new-adventure/">new adventure</a>:</p><blockquote><p>Most people in the information security field &#8230; know that I am firmly convinced that the bad guys are currently winning the war we are engaged in. This move is, in many ways, because I want to do even more to change the situation. One key area where we can do that is by providing security professionals with tools that allow them to reduce the attack surface they have to worry about. Right now, organizations have to defend everything. CORE Security can help with how to defend what is critical in ways that are meaningful. Frederick the Great said, &#8220;he who defends everything defends nothing&#8221; &#8230; and that applies now in information security as much as it did in the 1700&#8217;s during Frederick&#8217;s military campaigns.</p></blockquote><p>And that has really turned out &#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/year-one">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Maturity Model … Matures]]></title><description><![CDATA[We are making good progress with the Vulnerability Management Maturity Model now.]]></description><link>https://securityncigars.com/p/maturity-model-matures</link><guid isPermaLink="false">https://securityncigars.com/p/maturity-model-matures</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Tue, 26 Aug 2014 21:20:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9a83da1e-74e7-4a32-8a18-a76beffc90fe_640x480.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We are making good progress with the Vulnerability Management Maturity Model now. We have a very nice looking graphic that aligns activity across each stage of maturity. Next steps include demonstrating the business value of improving maturity, providing an assessment tool, and developing a white paper to fully explain this.</p><p>I should also note that we appear to be ahead of most folks in this line of thinking. I read <a href="http://www.infosecurity-magazine.com/news/regulator-warns-financial-major/?utm_source=twitterfeed&amp;utm_medium=twitter">an article</a> on financial services cyber risk today where it appears that someone (the SEC, perhaps) is developing risk management standards that &#8220;firms in the industry could better use to spot and block cyber-attacks.&#8221; Sounds an awful lot like our Maturity Model. Nice to know we aren&#8217;t the only folks thinking about this and glad to see others following where we are already at.&nbsp;</p><p>I thought I&#8217;d share the mostly final graphic of the Maturity Model. This is something that anyone is free to use for their security program as long as you provide attribution to <a href="http://www.coresecurity.com">Core Security</a> and I for&#8230;</p>
      <p>
          <a href="https://securityncigars.com/p/maturity-model-matures">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Thinking About BlackHat – The Suits vs. The Shorts]]></title><description><![CDATA[One of the interesting things about BlackHat is that hackers and CISOs rub elbows.]]></description><link>https://securityncigars.com/p/thinking-blackhat-suits-vs-shorts</link><guid isPermaLink="false">https://securityncigars.com/p/thinking-blackhat-suits-vs-shorts</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Wed, 13 Aug 2014 20:55:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>One of the interesting things about BlackHat is that hackers and CISOs rub elbows. One of the few places where that happens routinely. It&#8217;s kinda funny. The CISOs are trying not to look so much like a &#8220;suit&#8221;, so they wear khakis and polo shirts. The hackers aren&#8217;t worried about that, so they wear shorts and t-shirts, kilts, jeans, camo, etc. And have crazy hair and tattoos. I thought of Suits vs. Shorts all week.</p><p>On Monday, with a little rest and a weekend under my belt, <a href="http://www.coresecurity.com/">Core&#8217;s</a> Communications Manager asked me what I thought about <a href="http://www.blackhat.com">BlackHat</a> and how it was different from the past. A couple folks chimed in, not just me, and there&#8217;s a good write up on the Core blog. I thought I&#8217;d put my relevant thinking in a quote here and invite you to read <a href="http://blog.coresecurity.com/2014/08/12/the-evolution-of-black-hat/">the whole thing</a>, as well.</p><blockquote><p>Sure, the conference has become much more mainstream,&#8221; noted our VP of Advanced Security and Strategy Eric Cowperthwaite. &#8220;Some have started to refer to it as &#8216;RSA Lite.&#8217; I think that is unfair. This is a conference dealing wit&#8230;</p></blockquote>
      <p>
          <a href="https://securityncigars.com/p/thinking-blackhat-suits-vs-shorts">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Just A Few Things Left]]></title><description><![CDATA[That&#8217;s right, not too much more left here at BlackHat.]]></description><link>https://securityncigars.com/p/just-things-left</link><guid isPermaLink="false">https://securityncigars.com/p/just-things-left</guid><dc:creator><![CDATA[Eric]]></dc:creator><pubDate>Thu, 07 Aug 2014 21:19:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zI0y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7762c4ba-711b-4dbc-b1a6-0fe3c6c324f9_198x198.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>That&#8217;s right, not too much more left here at BlackHat. A couple of meetings with customers, a couple of analysts. And of course, Core&#8217;s party at the RX Boiler Room. Which is supposed to be pretty epic.</p><p>Then I&#8217;m gonna get some sleep, get on a plane tomorrow and head home now that Security Summer Camp is over with.</p><p>So far have seen many good friends, like RSnake, Bill Brenner, Alex Hutton, Katie Moussouris, Wendy Nather, Mortman, McKeay, Adam Shostack, Richard Stiennon, Mark Weatherford, Mike Yaffe, MattJay, Michael Farnum, Cindy Valladares, ThatDwayne &#8230; hmmmmm, not sure I can catalog everybody. Sorry for those I missed. It&#8217;s been great to see you, chat with you, get caught up and generally enjoy summer camp.</p><p>Facebook 0 Twitter 0 LinkedIn 0Shares</p><p>The post <a href="https://securityandcigars.com/2014/08/07/just-things-left/">Just A Few Things Left</a> appeared first on <a href="https://securityandcigars.com">Security &amp; Cigars</a>.</p>
      <p>
          <a href="https://securityncigars.com/p/just-things-left">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>