Catch the recent “Politics, Power, and Preventative Action” podcast interview with RTJ founder Mark Mateski.

Two-Minute Interview: Redteams.net

Our latest two-minute interview is with Redteams.net, our favorite go-to site for all things having to do with operational red teaming. We suspect that most RTJ readers are familiar with the site, but if not, definitely pay them a visit.

  • What do you view as the single biggest barrier to good security practice in the modern enterprise? The lack of understanding of what their actual security problems are. A lot of companies get the latest and best in “security products” without actually knowing if those will help them solve their security issues. Throwing money at buzzwords or buzz-technologies will only get you so far. You need to understand your threat surface, what your weak points are, and how they can affect your company on the short and long terms if you don’t remediate them. In my opinion, a good security practice should begin by understanding what the security issues are.
  • What’s the most exciting thing happening in the security field today? I’m happy to see money being invested in innovative technologies such behavior and pattern analysis. If this is done right, you could potentially begin to see an impending attack based on network and user activity. However, I think the most exciting thing as of late is the fact that people (corporate-level and home users alike) are beginning to realize that all the crapware called “security software” (antivirus, anti-malware, personal firewalls, etc.) is not the Holy Grail after all. These users are beginning to learn about security. Sure, it’s slow, but we are heading in the right direction.
  • What advice do you have for people looking to enter the field? Start figuring things on your own. Don’t rely so much on courses and degrees. Explore, test, try, and practice. Install your own “pentest lab” and attack it. Play with exploits and see what breaks when you run them. See what happens when you combine technologies that weren’t necessarily made to run together (something seen on large corporation networks and systems). In short, be a self-taught person. Read books and get in touch with like-minded individuals, learn, and pass the knowledge. I’d rather work with someone who is self-sufficient and has no degrees than someone with a PhD and no real-world or practical experience.

Our previous two-minute interview with Rook Security’s Chris Blow is available here.