He, is a fat bald out of shape former academic with a penchant for classic plastic and specifically Taiwanese teak rejects. She, a high-speed low drag marathon runner who likes red wine on clean smooth decks with an Ikea interior.…
Cyber executive leadership: The gold rush for efficiency and dam risk
Working across organizational boundaries I hear the same refrain often enough to want to discuss it. From the intelligence analyst working an intrusion set I hear, “Why don’t they just patch their systems and we’d be fine.” On the other…
Rosetta Stone (network protocols)
![](https://i0.wp.com/sveoti.net/wp-content/uploads/2017/11/8086279A-4375-4F18-AD0B-D8A7BECD3F8A.jpeg?fit=560%2C324&ssl=1)
This gallery contains 1 photo →
Why you are going to pay me a million dollars a year to be your CISO
For me a job is usually never about the compensation. I’m a challenge seeking type personality. However, if I said why you’re going to pay me X it isn’t likely you’d read the essay. This is my sales pitch why…
Draft Rosetta Stone (Incident Response)
![](https://i0.wp.com/sveoti.net/wp-content/uploads/2017/11/Draft-Rosetta-Stone.jpg?fit=560%2C420&ssl=1)
This gallery contains 1 photo →
Veterans Day
I served in the Army National Guard and then transferred into the Marines. I have lectured at almost all the US military accademies. I have lectured at all of the US war colleges, and most of the staff colleges. I…
Dungeons and Data Centers
Dungeon Master: You are standing in a brilliant lit server roomed filled with millions of dollars in sunk legacy server costs. You: Roll the dice and advance. Dungeon Master: A DevOps ghoul jumps out from behind an IBM 360 running…
Road to somewhere
![](https://i0.wp.com/sveoti.net/wp-content/uploads/2017/10/IMG_1739.jpg?fit=560%2C409&ssl=1)
This gallery contains 1 photo →
Bay Boat
![](https://i0.wp.com/sveoti.net/wp-content/uploads/2017/10/IMG_1344.jpg?fit=560%2C420&ssl=1)
This gallery contains 1 photo →
City on the bay
![](https://i0.wp.com/sveoti.net/wp-content/uploads/2017/10/IMG_1321.jpg?fit=560%2C372&ssl=1)
This gallery contains 1 photo →
Covered Bridge
Research note: Security testing through forensic resistance
Senate Intelligence Committee hearing on Russia election interference
Presentations, posts, categories
Presentations (PDF) Teaching Presentation Research Presentation Blog Posts Considerations of defense in depth Attribution of cyber adversaries Research Note: Defining attacker knowledge, skill, and ability Blog Categories Digital Forensics Incident Response Threat Intelligence Student Work
Today’s Attack IPs
For those that are interested. The following list of IP addresses were attempting to brute force log in against the Selil blog. If you own the addresses below. Before you contact me. Make sure your stuff is clean. Anybody out…