Technicalinfo.net Blog
Friday, November 20, 2015

Battling Cyber Threats Using Lessons Learned 165 Years Ago

›
When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near ...
Wednesday, November 18, 2015

Exploiting Video Console Chat for Cybecrime or Terrorism

›
A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g...
Tuesday, November 17, 2015

Panel Selection of Penetration Testing Vendors

›
Most large companies have settled into a repeatable model in the way they undertake penetration testing and engage with their penetration t...
Monday, November 9, 2015

The Incredible Value of Passive DNS Data

›
If a scholar was to look back upon the history of the Internet in 50 years’ time, they’d likely be able to construct an evolutionary timeli...
Wednesday, October 28, 2015

Breaking out of the consulting wave

›
There are certain thresholds in the life of a company that must be crossed and, in so doing, fundamentally alter the business. In the world...
Friday, October 23, 2015

Hacker Hat-trick at TalkTalk

›
For the third time this year the UK broadband provider TalkTalk have seen their online defenses fall to cyber attackers. While the comp...
Tuesday, October 20, 2015

Ambulance Chasing vs Neighborly Support

›
The evolving world of Internet Security has a tendency to be a complex and bemusing arena for the professionals that make their living from...
Saturday, October 3, 2015

Experian Breached; T-Mobile Customer's Loss

›
The last couple of days has seen yet another breach disclosure - this time it's Experian , and the primary victims are 15m T-Mobile cust...
‹
›
Home
View web version

About Me

My photo
Gunter Ollmann
Hi, I'm Gunter Ollmann. I've built and led multiple professional hacking and security research organizations around the world, and envisioned and delivered some of the most advanced threat detection and SOC products in the market. I founded Ablative Security LLC as a consultancy to guide cyber executives, CISO's, VC's, PE's, and Family Offices investing in and building/scaling kick-ass meaningful cybersecurity solutions. As part of my journey I've worn the CTO hat at Microsoft, Devo, IOActive, NCC Group, and Damballa. I've also worn the Chief Security Officer (CSO/CISO) hat at Microsoft, IBM, Vectra AI, and Devo, and along the way I've led product and services strategy many times - and built and led some of the worlds best known security R&D organizations. Note that any comments and blog postings here on Blogger are my personal thoughts and opinions, and do not necessarily reflect those of my employer.
View my complete profile
Powered by Blogger.