About
With over two decades in cybersecurity, Nathan has contributed to the field as an author…
Articles by Nathan
Activity
-
I heard from a customer that CrowdStrike thought we were the Russians. Nope, just 150 security engineers, a bad ass platform, and AI.
I heard from a customer that CrowdStrike thought we were the Russians. Nope, just 150 security engineers, a bad ass platform, and AI.
Shared by Nathan Sportsman
-
Up-next Episode 4: Real Name Unknown aka Skyper
Up-next Episode 4: Real Name Unknown aka Skyper
Liked by Nathan Sportsman
Experience
Education
Publications
-
Hacking Exposed 7th Edition
McGraw-Hill Osborne Media
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment -
Hacking Exposed 6th Edition
McGraw-Hill Osborne Media
The world's bestselling computer security book--fully expanded and updated
Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.
Patents
-
Method and system for validating a vulnerability submitted by a tester in a crowdsourcing environment
Issued US 10,291,643
A method for validating a vulnerability submitted by a tester in a crowdsourcing environment. The method comprises identifying at least one vulnerability within at least one computer resource and receiving vulnerability data corresponding to the at least one vulnerability. The method further comprises pre-processing the vulnerability data to generate structured data and generating a replica of the vulnerability using the structured data and at least one validator. Further, the method comprises…
A method for validating a vulnerability submitted by a tester in a crowdsourcing environment. The method comprises identifying at least one vulnerability within at least one computer resource and receiving vulnerability data corresponding to the at least one vulnerability. The method further comprises pre-processing the vulnerability data to generate structured data and generating a replica of the vulnerability using the structured data and at least one validator. Further, the method comprises calculating a confidence score of the vulnerability using the replica of the vulnerability and a result of the at least one validator. The method executes at least one validating instruction based on the confidence score of the vulnerability.
-
Method and Apparatus for Identifying a Drift in a Quantized Signal
Issued US 7444268
One embodiment of the present invention provides a system that identifies a drift in a signal in a computer system. During operation, the system receives a sequence of quantized signal values of the signal. Next, the system generates a statistical distribution based on the sequence of quantized signal values, wherein the statistical distribution is generated using a set of counters, wherein each counter keeps track of the number of occurrences of an associated quantized signal value. The system…
One embodiment of the present invention provides a system that identifies a drift in a signal in a computer system. During operation, the system receives a sequence of quantized signal values of the signal. Next, the system generates a statistical distribution based on the sequence of quantized signal values, wherein the statistical distribution is generated using a set of counters, wherein each counter keeps track of the number of occurrences of an associated quantized signal value. The system periodically adjusts the counters by multiplying each counter by a compression factor if the system determines the sum of the set of counters is greater than or equal to a threshold. The system identifies the drift in the signal by comparing the statistical distribution with a reference distribution of the quantized signal values, wherein the reference distribution is associated with normal operation of the computer system.
Recommendations received
-
LinkedIn User
8 people have recommended Nathan
Join now to viewMore activity by Nathan
-
This underscores why offensive security technology demands offensive security experts in the loop. As software commoditizes, the only defensible…
This underscores why offensive security technology demands offensive security experts in the loop. As software commoditizes, the only defensible…
Shared by Nathan Sportsman
-
🚨 We have released an improved Nuclei template that more accurately detects the unauthenticated RCE vulnerability in Ingress NGINX Controller for…
🚨 We have released an improved Nuclei template that more accurately detects the unauthenticated RCE vulnerability in Ingress NGINX Controller for…
Liked by Nathan Sportsman
-
Praetorian Red Team Security Engineer, John Stawinski, recently discovered a vulnerability in GitHub's CodeQL where a token was exposed for just…
Praetorian Red Team Security Engineer, John Stawinski, recently discovered a vulnerability in GitHub's CodeQL where a token was exposed for just…
Liked by Nathan Sportsman
-
Today marks my last day at Praetorian where I've had the chance to work with two great technical teams. It goes without saying that I'm extremely…
Today marks my last day at Praetorian where I've had the chance to work with two great technical teams. It goes without saying that I'm extremely…
Liked by Nathan Sportsman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More