About
With over two decades in cybersecurity, Nathan has contributed to the field as an author…
Articles by Nathan
Activity
-
"Don't talk. Don't brag. Don't go to conferences. Don't publish anything - certainly not under your name. Stay hidden. Stay under the…
"Don't talk. Don't brag. Don't go to conferences. Don't publish anything - certainly not under your name. Stay hidden. Stay under the…
Liked by Nathan Sportsman
-
I am concerned with the progress we are making with AI and offensive security, but the answer won't be to blacklist offsec work on the major LLMs…
I am concerned with the progress we are making with AI and offensive security, but the answer won't be to blacklist offsec work on the major LLMs…
Posted by Nathan Sportsman
Experience
Education
Publications
-
Hacking Exposed 7th Edition
McGraw-Hill Osborne Media
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment -
Hacking Exposed 6th Edition
McGraw-Hill Osborne Media
The world's bestselling computer security book--fully expanded and updated
Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.
Patents
-
Method and system for validating a vulnerability submitted by a tester in a crowdsourcing environment
Issued US 10,291,643
A method for validating a vulnerability submitted by a tester in a crowdsourcing environment. The method comprises identifying at least one vulnerability within at least one computer resource and receiving vulnerability data corresponding to the at least one vulnerability. The method further comprises pre-processing the vulnerability data to generate structured data and generating a replica of the vulnerability using the structured data and at least one validator. Further, the method comprises…
A method for validating a vulnerability submitted by a tester in a crowdsourcing environment. The method comprises identifying at least one vulnerability within at least one computer resource and receiving vulnerability data corresponding to the at least one vulnerability. The method further comprises pre-processing the vulnerability data to generate structured data and generating a replica of the vulnerability using the structured data and at least one validator. Further, the method comprises calculating a confidence score of the vulnerability using the replica of the vulnerability and a result of the at least one validator. The method executes at least one validating instruction based on the confidence score of the vulnerability.
-
Method and Apparatus for Identifying a Drift in a Quantized Signal
Issued US 7444268
One embodiment of the present invention provides a system that identifies a drift in a signal in a computer system. During operation, the system receives a sequence of quantized signal values of the signal. Next, the system generates a statistical distribution based on the sequence of quantized signal values, wherein the statistical distribution is generated using a set of counters, wherein each counter keeps track of the number of occurrences of an associated quantized signal value. The system…
One embodiment of the present invention provides a system that identifies a drift in a signal in a computer system. During operation, the system receives a sequence of quantized signal values of the signal. Next, the system generates a statistical distribution based on the sequence of quantized signal values, wherein the statistical distribution is generated using a set of counters, wherein each counter keeps track of the number of occurrences of an associated quantized signal value. The system periodically adjusts the counters by multiplying each counter by a compression factor if the system determines the sum of the set of counters is greater than or equal to a threshold. The system identifies the drift in the signal by comparing the statistical distribution with a reference distribution of the quantized signal values, wherein the reference distribution is associated with normal operation of the computer system.
Recommendations received
-
LinkedIn User
8 people have recommended Nathan
Join now to viewMore activity by Nathan
-
Day two at FIRST's #VulnCon2025 in Raleigh has been fantastic! I presented Praetorian's 'Breaking the Bot' workshop, delving into LLM threat…
Day two at FIRST's #VulnCon2025 in Raleigh has been fantastic! I presented Praetorian's 'Breaking the Bot' workshop, delving into LLM threat…
Liked by Nathan Sportsman
-
Every cyber program should have detection and response monitoring through an EDR solution as well as continuous identification and prevention through…
Every cyber program should have detection and response monitoring through an EDR solution as well as continuous identification and prevention through…
Shared by Nathan Sportsman
-
In just 1.022 seconds, a token exposure created a seam that could have led to a large-scale supply chain attack - a la…
In just 1.022 seconds, a token exposure created a seam that could have led to a large-scale supply chain attack - a la…
Liked by Nathan Sportsman
-
"Don't talk. Don't brag. Don't go to conferences. Don't publish anything - certainly not under your name. Stay hidden. Stay under the…
"Don't talk. Don't brag. Don't go to conferences. Don't publish anything - certainly not under your name. Stay hidden. Stay under the…
Shared by Nathan Sportsman
-
We're pumped for next week's "Securing GenAI Applications" session at #VulnCon! We'll get our hands dirty breaking into a vulnerable GenAI app with…
We're pumped for next week's "Securing GenAI Applications" session at #VulnCon! We'll get our hands dirty breaking into a vulnerable GenAI app with…
Liked by Nathan Sportsman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More