George Seerden

George Seerden

George Seerden joined the military in 2003, where he learned Pascal, Visual Basic, COBOL, C#, SQL, and several other small disciplines. He worked as a programming team member, team lead, production lead, and SCRUM master. George attended a year long course in hacking, reverse engineering, forensics, and graduated top of his class from each course. While attending he obtained his GCFA (Advanced Memory Forensics). Shortly afterword George began working at Compass IT Compliance where he obtained his CISSP. For him it's all about the challenge. It's not about knowing what to do when you start doing it, it's about getting it done anyways.

Posts by George Seerden

How China's TikTok Spies On You & Your Kids

How China's TikTok Spies On You & Your Kids

I have recently joined the ranks of people that aren’t really on social media anymore. So, much like veganism or cross-fit I have a responsibility to champion my new cause. I can’t claim to be an early un-adopter of social media and I left it for largely the same reasons as everyone e …

Read Story

Nest Cameras – Basic Defense In Depth

camera-1219748_1920

I’m sure many of you have seen or heard of the recently released viral video showing a young girl being yelled at in her room via her internet connected Nest camera. Obviously, this was on a home network, but it occurred to me that a large amount of commercial entities also have inter …

Read Story

Network Defense - Look at Policies and Training First

network-4393368_1920

I live in two worlds. The first is with Compass IT Compliance where most of our clients are small to medium businesses that don’t have their own security teams in house. The second is with the US Air Force where my only job is to help secure the entire enterprise. I am always blown aw …

Read Story

Secure Programming: An Afterthought.

computer-2788918_960_720

I’ve been a professional programmer for nearly 16 years. I didn’t learn to program in college, the military taught me. It wasn’t until my seventh year that the security of the applications I was working on was taken seriously. That is seven years of code that was more than likely vuln …

Read Story

WanaCry Ransomware: A Survival Guide

hack-813290_1280.jpg

What is WannaCry Ransomware? WanaCrypt0r, WanaDecryt0r, and WannaCry are different names for essentially the same thing. Technically WanaCrypt0r is name of the executable, WanaDecrypt0r is the name of the decrypting utility, and WannaCry is what it makes people want to do. But, for mo …

Read Story

Subscribe by email