OpenDNS is now part of Cisco Learn More

BSidesNash 2016

BSidesNash 2016

The OpenDNS labs team once again continued it’s strong Thought Leadership history by being invited to speak at the 2016 BSidesNash conference, held in Nashville, Tennessee, with this author being the representative. A couple of things here that made this trip special: The first being that usually my speaking and event engagements take me to the border regions of the United States, and hardly ever inland, and the second being I’m an avid user of Ride-Sharing services while on ...

QuBit Conference, Prague, CZ

Last week, OpenDNS Labs had the good fortune to attend and present at the QuBit Conference in Prague, CZ. It was held in the beautiful Grandior Hotel, just minutes from Pragues downtown center.

Speakers traveled from multiple countries and were employed in a wide range of positions, from independent security researchers to CEO’s.

Josh Pyorre from OpenDNS spoke on increasing efficiency in security operations and incident response through the use of automation and other techniques. It’s an evolving and ever-changing conversation, so ...

BlackHat Asia 2016: OpenDNS Labs Travels to Singapore to Talk About Real-Time Detection Techniques

This past March OpenDNS Labs had the privilege of presenting at BlackHat Asia 2016, hosted at the Marina Bay Sands in Singapore. At the conference our team got to present some of the cool data science and data engineering research that we are working on at OpenDNS Labs. This was one of the more technical conferences we have attended, and it was exciting to see a mix of very talented info sec folks from all over the world.

At the conference, ...

BSides Austin, 2016

For the second year, I was fortunate enough to attend and present at BSides Austin 2016. This year had a larger turnout and some exciting presentations!

BSides Austin, 2016

Ed Skoudis, from SANS started off the first day with a great keynote.

Chester Wisniewsky of Sophos gave an entertaining and informative presentation titled “Protecting your toys: Attempts at protecting the IOT.” He discussed his discoveries after researching devices that probably shouldn’t have an internet connection. My favorite part was his description of ...

Fishing for Angler: Pivoting Through Angler’s Infrastructure

Two of the most popular methods of delivery for various types of malware are the Angler and Rig exploit kits. These kits employ known vulnerabilities to exploit a user’s web browser and deliver various payloads such as TeslaCrypt and the fairly new Locky ransomware. For more information on exploit kits and protecting yourself from them, see this past blog post. We’ll be taking a look at how we can leverage some of the techniques that the Angler actors utilize — ...