Technicalinfo.net Blog
Monday, March 25, 2013

Tales of SQLi

›
As attack vectors go, very few are as significant as obtaining the ability to insert bespoke code in to an application and have it automatic...
Thursday, March 14, 2013

Credit Bureau Data Breaches

›
This week saw some considerable surprise over how easy it is to acquire personal credit report information.  On Tuesday Bloomberg News led w...
Monday, February 4, 2013

Vulnerability Disclosures in 2012

›
A new blog post by me is up on the IOActive site -  2012 Vulnerability Disclosure Retrospective . It follows from a review of the new analys...
Monday, January 7, 2013

The Demise of Desktop Antivirus

›
 Are you old enough to remember the demise of the ubiquitous CompuServe and AOL CD’s that used to be attached to every computer magazine you...
Friday, December 21, 2012

How much is a zero-day exploit worth?

›
It's a pretty common question asked by both bug hunters and journalists alike - "How much is a zero-day vulnerability worth?" ...
Monday, December 17, 2012

Now at IOActive

›
For those that haven't seen the exchanges on Twitter or LinkedIn , I'm no longer with Damballa ... The last 3.5 years with Damball...
Sunday, November 25, 2012

Exploit Development for Fun & Profit

›
Last week I pulled together a posting for DarkReading covering the commercial aspects of exploit development - " The Business of Commer...

Persistent Threat Detection (on a Budget)

›
If there’s one simple – high impact – thing you could do to quickly check whether your network has been taken over by a criminal entity, or...
1 comment:
‹
›
Home
View web version

About Me

My photo
Gunter Ollmann
Hi, I'm Gunter Ollmann. I've built and led multiple professional hacking and security research organizations around the world, and envisioned and delivered some of the most advanced threat detection and SOC products in the market. I founded Ablative Security LLC as a consultancy to guide cyber executives, CISO's, VC's, PE's, and Family Offices investing in and building/scaling kick-ass meaningful cybersecurity solutions. As part of my journey I've worn the CTO hat at Microsoft, Devo, IOActive, NCC Group, and Damballa. I've also worn the Chief Security Officer (CSO/CISO) hat at Microsoft, IBM, Vectra AI, and Devo, and along the way I've led product and services strategy many times - and built and led some of the worlds best known security R&D organizations. Note that any comments and blog postings here on Blogger are my personal thoughts and opinions, and do not necessarily reflect those of my employer.
View my complete profile
Powered by Blogger.