PinnedNate NortonLyrical Injection: How I Exploited Defcon 30 and John LennonI just returned from my very first Defcon, where I gave a very unofficial talk. I did not submit for this talk, and my name was not on any…Aug 16, 2022Aug 16, 2022
Nate NortonThis Is Your Brain On BurnoutA few weeks ago, I made a really tough decision; I suddenly took leave of absence from work. It may be more accurate to say that my body…Sep 9, 2022Sep 9, 2022
Nate NortonWhy Your Dominion Without AAA is a SandcastleFirst, some housekeeping. I am tired of typing the word “company” when I talk about security. It makes the assumption that this stuff only…Sep 1, 2022Sep 1, 2022
Nate NortonZen And the Art of Getting Your Bicycle StolenThere is a weakness in every system. This week, my bike was stolen and recovered, and I have some security-related takeaways.Aug 25, 2022Aug 25, 2022
Nate NortonSymmetric Encryption 101A few weeks ago, we covered the very basics of cybersecurity; confidentiality, integrity, and availability. Now we’re going to put them to…Aug 10, 2022Aug 10, 2022
Nate NortonContain Yourself Part 1: A Docker PrimerWhen a fellow developer at previous job first recommended that we use containers for our product, I almost spit out my drink…Aug 1, 2022Aug 1, 2022
Nate NortonWTF is Cybersecurity?The internet is still the wild west, and it’s only getting wilder and wester. What is cybersecurity? Why do we care? How to get involved?Jul 26, 2022Jul 26, 2022