Conrad Constantine
GET UPDATES FROM Conrad Constantine
With an early background in searching for forbidden knowledge, pushing computing hardware to its limits and a nose for the truth, Conrad was born for a career in Incident Response.

Over the last decade and a half, he has been on the front lines of defence work in telecom, medical and media corporations, not least of which being at ground zero for the 2011 RSA Breach.

Conrad’s a firm believer that incident response must become an accessible and effective discipline, available to all. He’s striving to bring the mysteries of open source intelligence generation, and defensive agility, to those willing to take the leap from fear to action - mostly via the medium of code, (with visio diagrams thrown in for good measure).

Entries by Conrad Constantine

My "Power Three" for Making Life Difficult for the Bad Guys (and They Are All Technology-agnostic!)

(0) Comments | Posted 21 October 2013 | (16:19)

There's been a lot of talk about how to use technology to protect against advanced targeted attacks, but in fact, technology is rarely the issue. These basics must be covered first and foremost before you even begin to think about technology.

#1 Employ System administrators who actually read their system's...

Read Post

Security Professionals Believe in Little Green Men - Fact

(0) Comments | Posted 9 July 2013 | (12:09)

While the Geek Squad, or IT professionals as the PC (politically correct) brigade would prefer you to address them, have often kept their superiority a closely guarded secret, a study has revealed that these broad-minded individuals believe in extra-terrestrial life forms. Perhaps the language the IT professionals use isn't actually...

Read Post

Preparing For Your First Breach

(0) Comments | Posted 3 September 2012 | (11:22)

So you've finally accepted it's just a matter of time before you experience your first major breach; despite all the work you've put in to your monitoring and response program, the long hours chasing down those last unidentified systems on the network, the endless meetings with department stakeholders and the...

Read Post

The Hype Around Big Data - What's it All About?

(0) Comments | Posted 17 May 2012 | (17:23)

Why is everyone so hyped over Big Data?

Possibly it's because people are now realising the power of Big Data as a rich source of information for detecting security intrusions, and has since developed a taste for more and more logs.

Log Correlation has since then followed as IT...

Read Post

Can the IT Security Community Collaborate to Beat the Hackers?

(1) Comments | Posted 12 April 2012 | (17:27)

Year after year, I hear the same refrain in information security: "We need to share more data about security threats." I know I've been singing the same song myself for at least a decade, too.

IT is a fast-moving field--ideas arise, reach prototype, and go to market quicker than...

Read Post