Sam Bocetta

Contributor

Sam Bocetta is a former security analyst for the DoD, having spent 30-plus years bolstering Cyber defenses for the Navy. He is now semi-retired, and educates the public about security and privacy technology.

Much of his work involved penetration testing of Navy ballistic systems. He analyzed networks looking for entry points, then created security-vulnerability assessments based on his findings. Further, heI helped plan, manage, and execute sophisticated "ethical" hacking exercises to identify vulnerabilities and reduce the risk posture of enterprise systems used by the Navy (both on land and at sea). The bulk of his work focused on identifying and preventing application and network threats, lowering attack vector areas, removing vulnerabilities and general reporting. Based on his work, he was able to identify weak points and create new strategies which bolstered the networks against a range of cyber threats.

He worked in close partnership with architects and developers to identify mitigating controls for vulnerabilities identified across applications and performed security assessments to emulate the tactics, techniques, and procedures of a variety of threats.

He works proficiency with C/C++/Python, Linux/Kali Linux, Bash, Metasploit, Armitage, Fuzzer/Fuzzing Framework, vulnerability detection and exploit crafting, virtual machines, reverse engineering principles, strong familiarity with TCP/IP/packet capture, Nessues/ACAS, and NMAP.

How the Australian government is helping you fight data breaches

5G security gaps in Australia: What CSOs can do

5G security gaps in Australia: What CSOs can do

The security of 5G networks now being rolled out is a mess, and could be a vector for new forms of cyber attacks. But there is a radical solution.

Aviation security: Playing with fire

Aviation security: Playing with fire

Aviation is one of the busiest and most advanced industries in the world, which is why it’s also poised to be vulnerable to cyber threats. Many airport systems are highly interconnected, resulting in an ultimately fragile network...

10 Most Urgent Cybersecurity Issues in 2019

10 Most Urgent Cybersecurity Issues in 2019

Cybersecurity is a daily concern in our personal and professional lives.

How a small business should respond to a hack

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack.

Are you being tracked through a Bluetooth security vulnerability?

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.

What are the security implications of Elon Musk's Neuralink?

What are the security implications of Elon Musk's Neuralink?

Wacky science fiction has come to life with Elon Musk’s latest idea: chips implanted in human heads that talk to smart devices. What could possibly go wrong?

Can the Security Industry Keep Up with 5G?

The upcoming roll-out of 5G across Australia presents many opportunities for the tech industry, but it also presents risks that will need to be faced and managed.

Is AI fundamental to the future of cybersecurity?

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.

3 most dangerous email attachments To avoid

By now, almost anyone who uses email on a regular basis is aware some messages contain malicious links or social engineering attempts. But, what are the most dangerous types of email attachments? Would you know how to spot them, or...

Federal cybersecurity agency on the way?

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

Is it a data leak if you give consent?

Facebook is under scrutiny again, this time for its ethically questionable "research project" that involved releasing a data mining app to consumers that was intended for internal corporate use under Apple's licensing agreement.

Load More