data security

Professionally Evil Perspective Podcast:Misconfigurations and Default Credentials

So we are at it again!  James Jardine, Jason Wood and I were at BSides Orlando this weekend and decided to take the opportunity to record the latest episode of the Professionally Evil Perspective (even if Jason doesn’t necessarily remember the title of the podcast completely!). As with the previous ones, we try to dig …

Professionally Evil Perspective Podcast:Misconfigurations and Default Credentials Read More »

Finding the Leaks

One of the common vulnerabilities we find when performing internal network penetration testing is sensitive data on open SMB file shares.  Now, by “open” I am including both unauthenticated as well as file shares that allow any authenticated user.  It certainly makes sense for organizations to have file shares that are accessible to all employees …

Finding the Leaks Read More »

How To: Encrypting Mac Mail

As a security consultant, frequently traveling, it is critical to implement security controls to protect sensitive data on my computer.  One of the most often overlooked data is locally stored email.  A quick search on the web identified some good ways to encrypt the Mac Mail store.  A great resource that I found was an …

How To: Encrypting Mac Mail Read More »

Scroll to Top