Technicalinfo.net Blog
Monday, October 25, 2010

Where are those botnet CnC's at?

›
If you're building or managing a botnet of more than a few thousand victim machines, where and how you host your command and control (Cn...
Tuesday, September 28, 2010

In situ Automated Malware Analysis

›
Over the past few years there's been a growing trend for enterprise security teams to develop their own internal center of excellence fo...
Sunday, September 19, 2010

Intel Pentium Processor "Performance Upgrade"

›
Catching up with some of the RSS feeds I monitor earlier today I came across some chatter about the newly launched/noticed upgrade option f...
Saturday, September 18, 2010

Musings on Metasploit

›
The week before last I attended and spoke at the OWASP AppSec 2010 conference on the first day, meanwhile HD Moore spoke on the second day....
3 comments:
Saturday, September 4, 2010

Infinite Malware & Infinite Protection?

›
Infinite detection of malware? In Sophos' blog entry " To infinity and beyond " it's pointed out that there's an infin...
1 comment:
Friday, August 20, 2010

Blacklists, Clustering and The Matrix

›
Blacklists are the mainstay of many security technologies protecting enterprise networks today. Despite being used practically everywhere ho...
Monday, July 12, 2010

Mobile Threats - Cellular Botnets

›
Smartphones are getting smarter. You know it, I know it, and every would-be criminal botnet operator knows it too. But why haven't we s...

Forgotten Password?

›
The increased proliferation of malware and botnet agents designed to rapidly intercept, retrieve and copy the passwords you use on a daily b...
‹
›
Home
View web version

About Me

My photo
Gunter Ollmann
Hi, I'm Gunter Ollmann. I've built and led multiple professional hacking and security research organizations around the world, and envisioned and delivered some of the most advanced threat detection and SOC products in the market. I founded Ablative Security LLC as a consultancy to guide cyber executives, CISO's, VC's, PE's, and Family Offices investing in and building/scaling kick-ass meaningful cybersecurity solutions. As part of my journey I've worn the CTO hat at Microsoft, Devo, IOActive, NCC Group, and Damballa. I've also worn the Chief Security Officer (CSO/CISO) hat at Microsoft, IBM, Vectra AI, and Devo, and along the way I've led product and services strategy many times - and built and led some of the worlds best known security R&D organizations. Note that any comments and blog postings here on Blogger are my personal thoughts and opinions, and do not necessarily reflect those of my employer.
View my complete profile
Powered by Blogger.