Monday, November 6, 2017

DNS, DNS what is your name?

- A little poem of DNS visiting DNS-OARC 27 in San Jose, CA

As I sitting quietly on the metal chairs, a tap on my shoulder 
asking “DNS, DNS what is your name?”
I quickly responded “I am not playing your game?”
Don’t you really know I am cybersecurity, 

Thursday, March 9, 2017

Data analysis - Clustering using euclidean distance

Recently our ability to gather large amounts of complex data has far outstripped our ability to analyze them.  Although our human brains can process data in complex ways but it does not scale when it comes to large volumes of data. Clustering is one way to distill data to some groups and understand relationships within the dataset.  Clustering is used in many scientific research fields such as natural science, genetics, politics and of course in sales and marketing.  I recently published a blog on analysis performed using euclid distance and clustering at my work SEI for cybersecurity- link here.  Here I am going to simply explore the mechanics of using Euclid distance for clustering using some simple Python code and examples.  Don't worry, it is simple Math hopefully once you walk through this sample.

Thursday, December 17, 2015

The phishing game new tactics

I recently came across a very well formatted phishing email with a valid SSL certificate and close enough domain name to PayPal - paysnal.com that caught my attention.  The techniques are age old as in the real world of fishing - the lure, the distraction and the impersonation.  Like in the real world of fishing - what a fish considers a day-to-day normal business (like fish eating worms), can be a successful trap (death for the fish).  Let me explore this to show how the story unfolded

Tuesday, November 10, 2015

Information Security Strategy


In the few encounter I have with C-level executives, I find that most of information security investments (both engineering and its operations) are done with very little strategy.  My attempt here is to target C-level executives with a model and a set of standards with nomenclature to enable strategic decision making.  It is important to note that this strategy will require some fine tuning by project managers, solutions architects and others for each organization.  The focus here is to ensure The CEO, CIO, CISO and CTO can have the right toolkits and an abstract model to drive the information security needed for a mid to large enterprise.

"Strategy a deliberate, conscious set of guidelines that determines decisions into the future".

- adopted from "Patterns in Strategy Formation" Henry Mintzberg 

Saturday, November 7, 2015

Uncovering a code injection attempt via user-agent

After a long time, I took some time to analyze results of monitoring I put in place for my website. The data is collected from an apache module to track user agent string that were scanning for "Wordpress" looking URL's in my webserver..   I just pulled some recent ones to see if code injection is still being attempted! Let's see

Friday, October 30, 2015

IPv6 geolocation in database

IPv6 popularity is grown to the extent that I have about 15% of my visitors to my website and tools download to be using dual stack.  It is time for me to get a handle on these IPv6 using some geolocation to identify the users.

Thursday, October 15, 2015

Why choose an Enterprise Architect?

As one who has come from electrical and computer engineering with experience building infrastructure from instrumentation to Information Technology, I find it hard to explina to people what I actually do as an Enterprise Architect.  As you can guess there are major misunderstandings when people hear the word "Architect" or "Architecture."