Friday, April 27, 2012
Thursday, April 5, 2012
Check it out at rootthebox.com or on their FB page. There is still time to register for this weekend's event. Root the Box is put on once a semester.
-Who are you?
My name is Zach Julian, and I’m currently attending the University
of Advancing Technology for my Bachelors in Network Security. I
am also on the Root the Box organizing committee, where I serve
as the security officer for the competition. I have loved
computers for many years, and consider myself fortunate to have
found a good community of hackers here in Phoenix, Arizona.
-What's it like as an infosec student at University of Advancing Technology?
It’s a unique experience- Network Security is undoubtedly the best
program UAT has to offer. We have a pretty tight-knit group of
people within our major, which includes a wide range of skill
levels and specialities. If you’re serious about learning
security, UAT is definitely the place to come. Coming to UAT,
I’ve found the class material to be challenging and useful, my
peers extremely bright, and the opportunities to network
constant. I’m always inspired to attain higher levels of
-How did you get involved with Root the Box?
So far, I have competed in two Root the Box competitions. After
that, I felt it would be a worthwhile experience to help the
competition in some way. Since my current job consists of
Intrusion Detection analysis, I volunteered to set up and
monitor a Snort box during the competition. This is to ensure
that the participants stay within scope during their attacks. ;)
-How long has Root the Box been happening?
This will be Root the Box number 8. During that time, we’ve improved
on everything from the hacking challenges to the scoring engine.
After several years, the competition has matured quite a bit.
-What skills do you hope students get out of participating?
Each Root the Box is an excellent opportunity to refine and expand
your skills a little bit more. Hacking is the same as any skill
- reading and thinking about it will give you some knowledge,
but there’s no replacement for actual experience. That is why we
so strongly encourage people interested in security, at all
levels, to participate in Root the Box.
Newcomers to hacking will benefit the most - Root the Box features
challenges that draw from all types of digital security, from
reverse engineering to web applications. If security or
penetration testing is your intended career path, Root the Box
will show you what to expect and where to focus your learning.
-How can people get involved?
Come compete! Anyone interested in volunteering for Root the Box will
be able to meet our staff and get a good idea of just what goes
into putting on this competition. More specifics are available
Thank you Zachary for filling us in on this very cool competition! Good luck this weekend!
Tuesday, February 14, 2012
One of those resources is SECore.info. This new website created by the Open Security Foundation brings verified security experts and reporters together, as well as a tool to help experts promote their ideas through presenting at security conferences.
I'll be speaking more about this topic of self-promotion during Security B-Sides PHX this weekend. Check out the B-Sides page for more information.
SECore is also providing a great opportunity to increase your communication skills on security topics by hosting a workshop during RSA in San Francisco this month. This one-on-one training is co-hosted by the technology PR firm LEWIS Pulse, and will help you with personalized training on how to effectively communicate about your work to the media and to your co-workers.
SECore Media Training for Security Professionals
Date: Wednesday, February 29
Time: 8:15am - 6:00pm (hour-long sessions)
Location: Marriott Marquis, 55 4th Street, San Francisco
Register at EventBrite.
Friday, December 23, 2011
From the BSides London website:
|BSides Byte Size - The Acoustic Set|
There are no invites, no sponsors, no projectors just you and beer. The Acoustic Set is a simple gathering of like minded people meeting, talking, listening, debating and drinking so come along and participate.
So what makes this acoustic? Anyone speaking is not provided with any electronic assistance. If you want to talk you need to go low-tech.
Who's speaking? We are going to have a few well known people come and speak but anyone can speak. Just turn up on the day.
Tell people you're coming on Twitter by using #BSidesByteSize.
No tickets or RSVP is required, but please join us on the event's SECore.info profile and let everyone know that you're "interested" or "attending" and post comments.
So hopefully we'll see you there!
Friday, September 16, 2011
Next week the InfoSecMentors team will be attending BruCon! We've been looking forward to this particular event all year because BruCon has been a valued supporter for the project. BruCon is a great conference not only because their slogan is "Hacking for Beer" but because they've captured that great balance between the black t-shirts and the suits. The trainings, presentations, and workshops are all very affordable (and a steal when you hear about the included after-party!) We're looking forward to learning a lot, meeting new friends, and drinking beer in amazing places.
This year, we're hosting a mentoring workshop on the second day. This workshop will tackle both sides of the mentoring relationship. For the mentees, we'll talk about ways to set yourself apart, how to efficiently do your homework, and what valuable benefits to expect from your mentorship. For the mentors, we'll go over different activity ideas, how to keep your mentee engaged, and the value mentors get out of the mentorship. After that, we'll put the question to the audience and try to define just what exactly counts as a successful mentoring relationship.
Our workshop panelists include David Rook (@securityninja), Chris Gates (@carnal0wnage), Wim Remes (@wimremes), and Marisa Fagan (@dewzi). We'll start at 19:30 Tuesday with a short presentation and open the floor for questions and experiences. Hope to see you there!
Tuesday, August 9, 2011
- "Here is the 1-2-3 Choice Technique: “Hi Ramit, I love your book on blah blah. I noticed you said I should XYZ in chapter 5, and so I tried it. I’m stuck due to XYZ. So I’ve come up with 3 possible routes:
- blah blah1
- blah blah2
- blah blah3
Which do you think I should do?
This will get almost a 100% response rate, since you have actually done the work in your head…plus all I have to do is tell you which is best. GOOD JOB."
Tuesday, May 3, 2011
|Guest blogger Brandon Tansey is back this week to tell us about his experience as a mentee. He also has some suggestions for thing to do with your mentor, including setting up an at-home hacklab, and getting involved in the Security Community.|
| You can find Brandon Tansey on his new blog at The Wormhole, on his Twitter feed, or on LinkedIn.|