Author: Samuel Liles

Presentations, posts, categories

Presentations (PDF) Teaching Presentation Research Presentation   Blog Posts Considerations of defense in depth Attribution of cyber adversaries Research Note: Defining attacker knowledge, skill, and ability   Blog Categories Digital Forensics Incident Response Threat Intelligence Student Work    

Today’s Attack IPs

For those that are interested. The following list of IP addresses were attempting to brute force log in against the Selil blog. If you own the addresses below. Before you contact me. Make sure your stuff is clean. Anybody out…

Attribution of cyber adversaries

Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels and analysis strategies Adversaries must interact with systems to exploit them and this creates evidence or anomalies that can be used for attribution…

Am I looking for a job?

I’m a senior executive, a subject matter expert, and an influential strategic leader in cyber security. Why would I always be looking for a job, why would I always be keeping my ear to the ground, and why would I…