Blog

Culture – The Card That Completes Our Winning Hand

Culture – The Card That Completes Our Winning Hand

Finding and retaining talent is a priority for most any successful business. In the cybersecurity field, with a well-documented workforce shortage, it is doubly important. One of my responsibilities at…
A Strong Foundation

A Strong Foundation

Since starting Anvil, and adding our first partner, Vincent Berg, in February 2017, a whole heck of a lot has changed. We have grown, added more employees, added Kim Bauer…
Capital One: Wake Up Call or Snooze Button?

Capital One: Wake Up Call or Snooze Button?

This week’s data breach at Capital One was not shocking. Data breaches have been occurring for so many years at such a frequency that consumers have been numbed to the…
Cultivating Q2

Cultivating Q2

When I began looking for my next professional adventure, I wanted to make sure that I ended up in a place that was an accurate reflection of the values and…
Looking inside the box

Looking inside the box

This blog post talks about reverse engineering the Dropbox client, breaking its obfuscation mechanisms, de-compiling it to Python code as well as modifying the client in order to use debug…
Linux Attack Surface Analysis

Linux Attack Surface Analysis

Recently on an application security review project I ended up having analyze a lot of before- and after- statuses when installing several pieces of software on Linux operating systems. It made me realize that…
Solving the Q4 Crunch for InfoSec Consulting

Solving the Q4 Crunch for InfoSec Consulting

In information security consulting and especially in the area of bespoke penetration testing services, the fourth quarter tends to be a bit of a shit show for lack of a…