Technicalinfo.net Blog
Thursday, March 10, 2011

Optimal Methods for Spam and DDoS Offender Discovery

›
As botnet threats go, Spam and DDoS are probably the most widely known and discussed tactics employed by criminal operators. Despite being...

GeoIP Irrelevance

›
GeoIP has traditionally served as a first pass filter for prioritizing the analysis of inbound threats. Over the last few years the value ...

Nuclear Winter PCAP Repositories

›
Recently I've been thinking about the catchall approach to security - in particular the absolute-last-stop method of just recording ever...
Wednesday, February 23, 2011

Threatology

›
Just a recap on some thinking covering threats and the folks who study them... One of the key principles to understanding the threat is havi...

Reinventing the Sandpit

›
Sometimes it feels that the IT security world loves innovation as much as it loves to reinvent the wheel – particularly when it comes to w...

Post-emptive Detection

›
In the week before RSA I managed to pull together a blog on the Damballa site covering several of the problems with approaches that focus up...
Monday, December 27, 2010

Covert Penetration

›
In what sometimes feels like a past life after a heavy day dealing with botnets, I remember fondly many of the covert and physical penetrati...
Friday, December 10, 2010

Google Maps for Command & Control

›
You've probably heard about the protests going on in London concerning the proposed uptick in University fees and the way in which some ...
‹
›
Home
View web version

About Me

My photo
Gunter Ollmann
Hi, I'm Gunter Ollmann. I've built and led multiple professional hacking and security research organizations around the world, and envisioned and delivered some of the most advanced threat detection and SOC products in the market. I founded Ablative Security LLC as a consultancy to guide cyber executives, CISO's, VC's, PE's, and Family Offices investing in and building/scaling kick-ass meaningful cybersecurity solutions. As part of my journey I've worn the CTO hat at Microsoft, Devo, IOActive, NCC Group, and Damballa. I've also worn the Chief Security Officer (CSO/CISO) hat at Microsoft, IBM, Vectra AI, and Devo, and along the way I've led product and services strategy many times - and built and led some of the worlds best known security R&D organizations. Note that any comments and blog postings here on Blogger are my personal thoughts and opinions, and do not necessarily reflect those of my employer.
View my complete profile
Powered by Blogger.