Aggregator
Eldorado: A New Ransomware Targeting ESXi VMs
大模型两则:尚不存在的AI手机和大模型产品化的两条路
破局与重塑:一家头部券商的研发精益效能之路
6 Tips for a Successful Security Vendor Consolidation
Blue Team Diaries E015: Tony Wilson
In this month’s episode, host Peter Manev meets with Tony Wilson, IT Security Director at Wolters Kluwer to discuss his current projects and experience with advanced adversaries and share advice for prospective Blue Team members.
Tony kicks the episode off with his recent experience setting up and maintaining a FedRAMP environment. He highlights the challenges of FedRAMP authorization that arise from controls needed and the additional steps that must be taken for each control.
Tony also reflects on an ongoing Blue Team activity he participated in with a large retail organization and shares a fascinating example of a credential-stuffing attack, where a highly organized adversary routinely changed tactics to avoid capture.
Peter and Tony close out the episode with some advice for Blue Team hopefuls or SOC team members early in their careers: embrace the chaos, don’t shy away from the hard work, and above all stay curious.
This interview provides great insight into what young cybersecurity professionals could expect to see out in the field, and Tony provides wisdom that can only be gained through years of experience.
Biography
Tony Wilson is an IT Security Director at Wolters Kluwer. He is responsible for supporting the CISO and Divisional CIO/CTOs in developing, aligning, and implementing the global information security strategy. As one of the lead incident handlers during the infamous Target Corporation data breach of 2013 and its aftermath, he has an acute appreciation for the value of sound information security. He holds a Bachelors degree in MIS and has obtained over a dozen certifications including CISSP, CISM, and GCIH. He has also taught a cybersecurity bootcamp at the University of Minnesota and maintains mentor relationships with his former students.
Tony was born and raised in Saint Paul, Minnesota, and will debate anyone over its superiority over Minneapolis. He’s closer to 50 than 30, but still enjoys to break a sweat by staying active and lifting weights. Other “hobbies” include blockchain investment, serverless architecture engineering, and cocktail experimentation.
Important Links:
- LinkedIn: https://www.linkedin.com/in/tony-wilson-58b3b89/
Why NetFlow Is Still the Best Mechanism for Detecting DDoS Attacks
全球数字经济大会 | 百度安全运营智能体平台入选信通院“安全守卫者计划”优秀案例
第98篇:Struts2全版本漏洞检测工具19.32版本更新
ARL联动AWVS脚本项目
微软2024年7月补丁星期二修复了2个被积极利用的漏洞
三问+一图,读懂《关于开展“网络去NAT”专项工作 进一步深化IPv6部署应用的通知》
Malware Trends Report: Q2, 2024
We’re excited to share ANY.RUN‘s latest malware trends analysis for Q2 2024! Our quarterly update provides insights into the most widely deployed malware families, types, and TTPs we saw during the last 3 months of the year. Summary In Q2 2024, ANY.RUN users ran 881,466 public interactive analysis sessions, which is a 0.5% increase from […]
The post Malware Trends Report: Q2, 2024 appeared first on ANY.RUN's Cybersecurity Blog.