WadeW

132 Flips | 11 Magazines | 5 Likes | 33 Following | 42 Followers | @wadew | Hacker, Leader, Family guy, GSD lover, motorcycle enthusiast. Manager of @rapid7 strategic services. My flips are my own.

Forensic Case Studies - Carving and Parsing Solaris WTMPX Files

A few weeks back I was analyzing a Solaris 10 (SPARC) raw partition image and was trying to determine from the <i>wtmpx</i> files who had logged into the …

Forensics

How To Lead When You Aren't The Leader

I was recently coaching a group of young professionals who work for one of my clients in New Jersey. I was helping them analyze their 360Reach personal brand survey reports (disclosure: 360Reach is a product of my company, Reach Personal Branding) so they could understand how they are perceived by …

The 5 Types Of Organizational Structures: Part 2, 'Flatter' Organizations

This is part two of a five part post that explores various types of organizational structures that either already exist in today’s business landscape or are starting to emerge as viable options for the future of work. Each post will explore one of these structures and then I’ll provide a final …

What are the best ways to motivate your employees?

3 Qualities LinkedIn's CEO Looks for in a Great Leader

Jeff Weiner, who has the highest ratings of any CEO on Glassdoor, weighs in on what it takes to inspire employees.<p>Since becoming CEO in 2009, Jeff Weiner has led LinkedIn to become a network of 364 million registered users with offices in 30 countries and a market cap of $26 billion.<p>Weiner's …

Leadership

Designing Data-Driven Interfaces

Telling the story of your data<p>“Dashboard”, “Big Data”, “Data visualization”, “Analytics” — there’s been an explosion of people and companies looking …

Start A Fire

"Detecting Shellcode Hidden in Malicious Files"

A challenge both reverse engineers and automated sandboxes have in common is identifying whether a particular file is malicious or not. This is …

Cybersecurity

How Malware Campaigns Employ Google Redirects and Analytics, Author: Lenny Zeltser

The email message sent to the bank employee claimed that the sender received a wire transfer from the recipient's organization and that the sender …

Apple Pay: a new frontier for scammers

Apple’s mobile payment system has provided a method for US criminals to make fraudulent transactions – and banks are rushing to stem the tide<p>Criminals in the US are using the new Apple Pay mobile payment system to buy high-value goods – often from Apple Stores – with stolen identities and credit …

Banks are skimping on website security

Nearly every major bank is using second-rate security to guard its website.<p>Capital One, JPMorgan Chase, Suntrust, Wells Fargo -- none of them use what's commonly referred to as the "best practice" in the industry when it comes to Web security.<p>The worst offenders are HSBC and TD Bank. Their …

Customers

The Top Complaints from Employees About Their Leaders

If you’re the kind of boss who fails to make genuine connections with your direct reports, take heed: 91% of employees say communication issues can drag executives down, according to results from our new Interact/Harris Poll, which was conducted online with roughly 1,000 U.S. workers.<p>In the survey, …

Fortune.com

• 1. To license Fortune articles, excerpts, or headlines for republication in various media (including books, eBooks, film, web, newsletters, …

7 Ways Leaders Can Improve Trust Within Their Organizations

"Leadership without mutual trust is a contradiction in terms." - Warren Bennis<p>Trust is imperative for any relationship or team to be successful. Studies show that the levels of trust within an organization have a direct positive or negative impact on retention, productivity and profitability. This …

How to Work with People Who Aren’t Good at Working with People

Twenty five years after the term “emotional intelligence” was first introduced by academics, thousands of independent scientific studies have highlighted the importance of managing your own and others’ emotions in relation to career success, job performance, entrepreneurship, and leadership.<p>But …

Oil Gas Firms Hit By Cyberattacks That Forgo Malware

New spin on the 'Nigerian scam' scams crude oil buyers out of money with bait-and-switch.<p>An unusual type of targeted attack underway for two years …

Building High Performance Teams Takes More Than Talent

We’ve all come across this type of person in our careers: the guy who is miserable to work with but who’s also “the top salesman we have.” Or how about “the smartest guy in the room,” who’s also the most unapproachable person you’ve ever met? The talent may well be there but, in today’s …

This Is Why Leadership Requires Mentorship

Mentoring is not just an optional activity. It is the best way to work through failure in a way that leads to a healthier, more well-informed success.<p>Failure <i>is</i> an option in entrepreneurship. In fact, it's a required step on the path to success. Without failure, you can't really figure out how to …

Steganography and Malware: Concealing Code and C&C Traffic

In our earlier post discussing steganography, I discussed how it is now being used to hide configuration data by malware attackers. Let’s go discuss …

Cybersecurity

Rising Cyber Attacks Costing Health System $6 Billion Annually

A rise in cyber attacks against doctors and hospitals is costing the U.S. health-care system $6 billion a year as organized criminals who once …

Algorithms Can Make Your Organization Self-Tuning

<i>“</i>Never let an MBA near a marketplace that can run itself<i>.”</i><p>So said Ming Zeng, CSO of Alibaba, when I was interviewing him for my upcoming book. His words struck me as deeply provocative. As we dug into what he meant, we realized that we had both been thinking independently about what we came to call …

SOC Analyst Pyramid, Author: Brad Duncan

<i>Introduction</i><p>Last weekend, I did a 10 minute fireside chat during lunch at BSidesSATX 2015 [1]. It was an informal presentation, where I discussed …

7 Short Books Worth More Than an MBA

You can spend $250,000 to get an MBA or spend a weekend reading these classics. Your choice.<p>Over the past few decades, the value of an MBA has declined, probably because the academic world can't keep up with the rapid pace of change in the business world.<p>Relatively few entrepreneurs have MBAs, but …

How Attackers Move Through Networks to Steal Data

Once an attacker has made their way in, they're going to perform reconnaissance. They need to know where they are prior to trying to accomplish their …

Information Security

10 Inspiring Examples of Data Visualization

Data can communicate powerful information—but only if you can actually understand what the data is telling you. Data visualization closes that gap, …

Data Visualization

Russians Hacked White House Via State Department, Claims Report

Russian hackers managed to breach White House security, accessing non-classified but sensitive information, including the president’s non-public schedule, according to a report from CNN. Speaking with officials with knowledge of the attack, investigators including the FBI, Secret Service and US …

Report: U.S. officials say Russians hacked White House computer system

The White House has been hacked and investigators think they know how, according to unnamed officials in a CNN report.<p>In November, hackers are said …