Latest Story

QOTD: Threat Intelligence Is a Process, Not a Product

June 29, 2015
By
Bruce_Schneier_at_CoPS2013

As I have been researching threat intelligence lately, the services that provide it, and the organizations that really produce it, I was struck with an odd thought that harkened back to the turn of the century from Bruce Schneier describing how to fix security. In this post from 2000 Schneier introduces the concept of security...
Read more »

Weekly Rewind – Monitor First, TakeDownCon, Kids Hack & More…

June 27, 2015
By
Get caught up on this week's posts with Weekly Rewind

Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “Teaching Kids to Hack on Father’s Day”, 2) “Creating REAL Threat Intel…with Evernote Slides from TakeDownCon Capital Area...
Read more »

Monitor First – The Origin

June 25, 2015
By
Analysts work in a watch and warning center of a cyber security defense lab at the Idaho National Laboratory

Late last year @taosecurity wrote an article that questioned spending resources on a “pen test and fix” cycle rather than monitoring for intruders that may already be in your networks. The last sentence of the post not only emphasized his theme well but also...
Read more »

Teaching Kids to Hack on Father’s Day

June 21, 2015
By
Father and Son

A few weeks ago Martin McKeay put out a great post about his teenage son coming to him and asking “Dad, how can I learn to hack?” After a some Twitter “research” he pulled together a nice list of resources to get started. Some...
Read more »

Where You Want to Be This Week for 6-22-15

June 21, 2015
By
meetup

Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night. If you would like your event listed in...
Read more »


About Us

Founded in 2008, NoVA Infosec is dedicated to the community of Metro DC-based security professionals and whitehat hackers involved in the government and other regulated verticals. Find out more on our About Us page.