Archive by Author

In Your Face – Securing Digital Displays

On Monday, a large publicly visible art exhibit in Spain that normally shows projections of modern art displayed pornography for 45 minutes.  Per this story (in Spanish), the taxi drivers who viewed the porn while waiting for riders at a nearby train station were thrilled (pun definitely intended), but most people were understandably not happy.  The […]

Wikileaks and the Marble Framework

This week, Wikileaks released CIA’s Marble framework.  As Rendition Infosec works with many organizations on security and threat intelligence, we have been fielding calls asking what the release means for businesses. WikiLeaks suggests that the Marble framework can be used to confuse analysts into attributing CIA malware to Russia or China.  Many of our customers […]

Implications of the SHA-1 collision

Last week, Rendition Infosec founder Jake Williams educated the community about the implications of the recent announcement that Google has created the first SHA-1 collision.  After the announcement, many in the community blew the news completely out of proportion.  Noting that there was more misinformation than correct information about the collision, Mr. Williams created a no-FUD […]

Why is length > complexity? Because math…

I routinely work with people who argue that their 8 character passwords are secure because they force complexity requirements.  This simply isn’t true.   Picking a passphrase (or simply a much longer password is mathematically more secure.  Some smart person will point out that if I know all passwords consist of combinations of only dictionary […]