Author
Cameron Camp
cameron_camp_crop
Cameron Camp
Malware Researcher
Go to latest posts

Education: CISSP, RHCSA

Highlights of your career? Reverse engineering human brain patterns.

What malware do you hate the most? Nation state sponsored low and slow.

Favorite activities? Building and flying airplanes.

What is your golden rule for cyberspace? Stupid hurts.

When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.

Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.

Interop: Getting a few more years out of your tech

Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.

The perimeter is everywhere (so where is your data really?)

It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET’s Cameron Camp looks explores the challenges of data security.

RSA: Will your next phone have quantum cryptographic 2FA?

Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be ‘yes’ says ESET’s Cameron Camp.

Security is ‘easy': Just ask someone at RSA

This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.

Managing agile virtual machine security across the enterprise: A closer look

It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET’s Cameron Camp.

RSA: Can crypto save your life?

Is there such a thing as security technology that is too good? ESET’s Cameron Camp, who is in attendance at RSA, discusses further.

Apple and ‘exceptional access’ to crypto protection

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.

Will your Swiss email account stay private (or can the govt take a look)?

A referendum is to be held on Switzerland’s proposed surveillance law, a decision lauded by supporters of privacy. ESET’s Cameron Camp discusses further.

CES 2016: Day 3 – the drones are back (but with augmented reality)

The final instalment in Cameron Camp’s security-focused coverage of CES 2016, looks at the future of drones. It’s all about augmented reality.

CES 2016: Day 2 – making smarter cars

Car security is rising to the fore here at CES 2016, which is not altogether surprising as 2015 was the year when car hacking really crossed over into the mainstream.

CES 2016: Day 1 – surviving the swarm

As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects of this year’s show, which, from what have seen so far, is a key focus for CES in 2016.

Virtual machine security – offloading the endpoint

If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET’s Cameron Camp.

VMworld: When IT grows up

Virtualization aims to totally change how we think of IT altogether. Against the backdrop of VMworld, we take a closer look at the key details.

VMworld: VM acceleration – how do we get there?

If you have a ton of VMs sprawling the globe, how do you make them all fast? That’s the subject floating around the show floor at VMworld in SFO this year.

VMworld: Got a ton of VMs? Now what?

This year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs

DEF CON – Upgrading your mom’s basement

If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.

Black Hat 2015 – Threats hit the road

This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.

How’s Black Hat in 2015? It grows up (and leaves mom’s basement)

Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.

5 Systems Admin relationship tips (so you’re on talking terms again)

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.

The big small business security challenge: mobile and BYOD

In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

Follow us

Copyright © 2016 ESET, All Rights Reserved.