Sam Bocetta

Contributor

Sam Bocetta is a former security analyst for the DoD, having spent 30-plus years bolstering Cyber defenses for the Navy. He is now semi-retired, and educates the public about security and privacy technology.

Much of his work involved penetration testing of Navy ballistic systems. He analyzed networks looking for entry points, then created security-vulnerability assessments based on his findings. Further, heI helped plan, manage, and execute sophisticated "ethical" hacking exercises to identify vulnerabilities and reduce the risk posture of enterprise systems used by the Navy (both on land and at sea). The bulk of his work focused on identifying and preventing application and network threats, lowering attack vector areas, removing vulnerabilities and general reporting. Based on his work, he was able to identify weak points and create new strategies which bolstered the networks against a range of cyber threats.

He worked in close partnership with architects and developers to identify mitigating controls for vulnerabilities identified across applications and performed security assessments to emulate the tactics, techniques, and procedures of a variety of threats.

He works proficiency with C/C++/Python, Linux/Kali Linux, Bash, Metasploit, Armitage, Fuzzer/Fuzzing Framework, vulnerability detection and exploit crafting, virtual machines, reverse engineering principles, strong familiarity with TCP/IP/packet capture, Nessues/ACAS, and NMAP.

Australia is unprepared for cyber war

How the Australian government is helping you fight data breaches

How the Australian government is helping you fight data breaches

To help battle hackers, it has developed the Notifiable Data Breaches (NDB) scheme, is revising its cyber security strategy, and funding security education in universities.

5G security gaps in Australia: What CSOs can do

5G security gaps in Australia: What CSOs can do

The security of 5G networks now being rolled out is a mess, and could be a vector for new forms of cyber attacks. But there is a radical solution.

How a small business should respond to a hack

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack.

Are you being tracked through a Bluetooth security vulnerability?

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.

What are the security implications of Elon Musk's Neuralink?

What are the security implications of Elon Musk's Neuralink?

Wacky science fiction has come to life with Elon Musk’s latest idea: chips implanted in human heads that talk to smart devices. What could possibly go wrong?

Is AI fundamental to the future of cybersecurity?

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.

Federal cybersecurity agency on the way?

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

Huawei and Apple smartphones are both made in China – why is only one banned in Australia?

Huawei and Apple smartphones are both made in China – why is only one banned in Australia?

While Chinese smartphone manufacturer Huawei has been banned from the Australian 5G network rollout, Apple was welcomed with open arms despite also using China to produce phones. So, what’s the difference?

Australia and Huawei: Why the ban?

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

China owns half of all VPN services

China owns half of all VPN services

With VPN use on the rise, a surprising study reveals that half of these services are owned by China, not exactly lauded as a protector of personal privacy.

The federal privacy bill: Intel gets the ball rolling

The federal privacy bill: Intel gets the ball rolling

As momentum builds to pass a federal privacy bill, corporate behemoth Intel has drafted a bill palatable to tech giants. But will politicians take the bait?

Load More