Posts by

Kelly Shortridge - Photo credit: @montaelkins
A Cloudy Forecast for ICS: Recap of S4x20
January 30, 2020
Photo credit: @montaelkins – Kelly Shortridge Keynote at S4x20 Last week, I keynoted S4x20, the biggest industrial control systems (ICS) security conference in the world, and was able to catch quite a few talks, too. While it took place in sunny Miami Beach, my highlights from the conference suggest a far cloudier outlook. Specifically, there […]
Takeaways from Art into Science
January 22, 2020
What do you get when you take a security conference and pare back its typical formula of swag-laden vendor tables, high-concept lighting that promises to be “an experience”, bougie parties with LED-lit stemware and a surplus of decibels — not to mention all of the offsec-focused talks? You find a group of dedicated defenders who, […]
Anomaly detection with Google BigQuery ML and Capsule8
Unsupervised Anomaly Detection Using BigQueryML and Capsule8
January 16, 2020
In a sea of data that contains a tiny speck of evidence of maliciousness somewhere, where do we start? What is the most optimal way to swim through the inconsequential information to get to that small cluster of anomalous spikes? Big data in information security is a complicated problem due to the sheer volume of […]
What is the Linux Auditing System (aka AuditD)?
January 7, 2020
The Linux Auditing System is a native feature to the Linux kernel that collects certain types of system activity to facilitate incident investigation. In this post, we will cover what it is as well as how people deploy and manage it. We will also discuss its strengths — namely it being offered for the delicious […]