Paul Shomo

@ShomoBits

Cybersecurity Pundit and CSO Online Columnist/Blogger. EnCase DFIR Strategist, Product Guy, Alliances and R&D Veteran.

Geregistreerd in mei 2013

Tweets

Je hebt @ShomoBits geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @ShomoBits wordt niet gedeblokkeerd door Tweets te bekijken.

  1. 19 apr.

    Forensic researcher at made the most newsworthy discovery of the year. Avast AV records even private browsing history in an unencrypted SQLite DB left on the hard drive. Not surprising to folks, but kinda awkward...

    Ongedaan maken
  2. 19 apr.

    Careful what products you go with after . The forensic pros at discovered that some area leaving behind a rather awkward trail...

    Ongedaan maken
  3. 16 apr.

    Avast AV leaves behind SQLite DB logging private browsing history. Found by at . Back when the media covered that GPS tracking DB, media didn’t use the words , or “Examiner.” Time for our community to get noticed.

    Ongedaan maken
  4. 16 apr.

    A little controversy to start out . NCIS practitioners find Avast AV leaves DB logging private web history. Ppl like toil in anonymity reversing artifacts, time to talk openly about forensic artifacts. @rasaconference

    Ongedaan maken
  5. 13 feb.

    I'm now an IDG Contributor and write the "Security & Forensics" column for CSO Online. Checkout, "4 Reasons Forensics Will Remain a Pillar of Cybersecurity" and see how AI, Orchestration and IoT will impact DFIR. via

    Ongedaan maken
  6. 31 jan.

    lose a 3rd round pick and a future star at CB so they can sign a 33 year old QB to the contract they should have gotten Kirk Cousins for in 2016/17!?!? Alex Smith's best season in 11 yrs (4k yards/26TDs) is equal to Cousin's worst season in his 3 year starting career.

    Ongedaan maken
  7. 24 dec. 2017

    Just so people know, contestants did *not* sign away their disclosure rights. Our program was researcher-centric: researchers own their work and how and when they disclose it. Just like they always have. We verbally asked them to wait until the end to promote their awards.

    Ongedaan maken
  8. 21 dec. 2017

    My Dark Reading post on the Guidance-OpenText Forensic Research Awards, including winner details. The researchers control the release of their own work; we'll have to wait for Justin Bartshe to release his findings in January!

    Ongedaan maken
  9. 21 dec. 2017

    The contest is done, and the awards have been issued. The community researchers came with even better submissions than we could have hoped for. Stay tuned for additional details in the coming weeks.

    Ongedaan maken
  10. 13 dec. 2017

    I've been watching the security orchestration and automation space for a few years. I believe it's going to be a big deal. Here's the roundup I published with : .

    Ongedaan maken
  11. 7 sep. 2017

    My latest post discusses malware's historic response to behavioral monitoring & how that applies today.

    Ongedaan maken
  12. 18 jul. 2017

    Time for a fan protest. Until the sign Kirk Cousins long term, let's refer to our GM as Bruce "Allem." We'll see how he likes it.

    Ongedaan maken
  13. 8 jun. 2017

    Checkout my interview, "End Point Incident Response with Paul Shomo of Guidance Software"

    Ongedaan maken
  14. 28 mrt. 2017

    Tomorrow see how to automate incident response and streamline your SOC with Demisto () and Endpoint Security.

    Deze Tweet is niet beschikbaar.
    Ongedaan maken
  15. 28 mrt. 2017

    eWeek won't publish vendor articles, but printed an adaptation of my "RSA Innovation Sandbox Reveals Hot Startups"

    Ongedaan maken
  16. 7 mrt. 2017

    CIA clearly favored the weak link in security: mobile devices. Apple/Google do not allow enough visibility for modern detection approaches

    Ongedaan maken
  17. 7 mrt. 2017

    Mobile OS "Don't Ask Don't Tell" strategy of security: Don't let security vendors see inside, nobody will find malware & security is assumed

    Ongedaan maken
  18. 7 mrt. 2017

    Reasons I'd Hack Mobile #4: Security vendors have to root mobile devices to see what's going on, you can't ship real security sw this way.

    Ongedaan maken
  19. 7 mrt. 2017

    Reasons I'd Hack Mobile #3: Can security sw obtain info about network traffic, indicating connection to malicious servers/theft? Nope!!!

    Ongedaan maken
  20. 7 mrt. 2017

    Reasons I'd Hack Mobile #2: Can security sw get a full list of processes, including metadata about their behavior to judge them? Nope!!!

    Ongedaan maken

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·