As an Amazon Associate I earn from qualifying purchases from

Letter from Oslo: The NDC Safety 2022 Convention

When you end up on a enterprise journey and neglect the code to your company AmEx, you already know you haven’t been on the highway for some time. That is why I discovered myself making a frantic search via my on-line information whereas I used to be attempting to verify in on the resort for the superior NDC Safety Convention in Oslo:  I hadn’t been to a convention since Cisco Stay in Barcelona in 2020.  

NDC Safety was an effective way to get myself again into the convention configuration. I discovered rather a lot at this present. I additionally had a good time giving two talks myself. 

Keynote: An Abridged Historical past of Software Safety 

Earlier than I gave my talks, I sat in on the convention keynote from rockstar safety educator and creator Jim Manico. He took us via an fast historical past of utility safety, from earlier than the second world struggle, to the current day. He wove safety testing, HTTP/S, passwords, OWASP and XSS via his intertwined and engaging timeline. For me there have been two huge takeaways:  

First takeaway: Polish researchers laid the groundwork for the British cracking of Enigma. Previous to WWII, within the Russo-Polish struggle in 1920 the Polish cryptography expertise have been instrumental within the saving of Warsaw:  They have been capable of decode a telegram from Crimson Military navy commander Joseph Stalin, which indicated that an assault on Warsaw was imminent. They have been capable of jam the Russians’ radio communications and by doing so purchased sufficient time to safe and save town. Groundwork laid by Polish mathematicians paved the way in which for Alan Turing, who famously cracked Enigma. In my view these occasions have been the start of cyber safety warfare – a recreation of cat and mouse that reaches far again into the historical past of computing.

Second takeaway: Being a jerk on Twitter could make the world a safer place. Jim Manico likes to be a jerk on Twitter occasionally. He walked via a few instance Twitter threads, the place he identified sure flaws, like the shortage of CSP3 help in Apple’s native browser Safari.

Content Safety Coverage (CSP) is a software which builders can use to lock down their purposes in varied methods, mitigating the chance of content material injection vulnerabilities comparable to cross-site scripting, and lowering the privilege with which their purposes execute. When Manico referred to as out a flaw in public, different business consultants responded on this thread, which in the end led to Apple implementing CSP3 into WebKit for Safari 15.4. In response to Jim, this proves how being a jerk typically will help to make issues higher! 

Try his full session right here:

Breakout: Make Passwords Simpler 

One of the crucial helpful classes I attended was Per Thorsheim‘s session on creating higher passwords – each the passwords you create for your self and how one can make passwords creation simpler in your purposes. 

For instance, he argued you need to make passwords in sentences, since they’re each simpler to recollect and longer that single phrases or codes. He did emphasize that you need to have a special password sentence for every service. To recollect all of those, Per suggested to both use a digital password supervisor, or to jot down down passwords in a pocket book saved someplace protected in the home – particularly for the aged. A password supervisor is healthier, however Per believes the chance of pocket book theft is low sufficient. 

He additionally talked about that it is unnecessary to periodically change your password, except there is a sign that you simply password was compromised and stolen. Implementing common password adjustments is a nasty consumer expertise, and in the end makes every little thing much less safe, for the reason that worse the consumer expertise is, the upper the possibility somebody will attempt to circumvent it, or use a special utility as a substitute. In passwords, Per says, usability is every little thing.  

My first session: Frequent Python Vulnerabilities and How you can Repair Them 

After the keynote, I began to organize for my first session, about Python vulnerabilities. Python is extra standard than ever, rating as essentially the most used language as we speak. It’s searched much more usually than Kim Kardashian on Google:


It’s a robust language and it’s utilized by a variety of rookies – probably a harmful combine. My presentation targeted on fundamental newbie safety errors – that rather a lot skilled builders make, too. I coated the 5 frequent vulnerabilities seen in Python.

I wrote this matter up for a weblog publish: 5 Python Safety Traps to Keep away from.  Additionally try my code samples. 

Second session: Detecting Malware in Encrypted Site visitors 

My second session was about encryption protocols, malware hiding in them, and how one can clear up this drawback utilizing machine studying. I defined how TLS1.3 is on the rise and the way this new cryptographic protocol is used extensively in HTTPS, and is extra environment friendly and safe. It additionally instantly encrypts the visitors coming from the server (ServerHello), leaving legacy techniques that depend on decryption with a problem.  

Fortunately, two of my Cisco colleagues have created an open supply undertaking referred to as Mercury. It might fingerprint encrypted community visitors and seize and analyze the packet metadata, which is unencrypted. It makes use of two big information bases (one with protected visitors, and one with malicious visitors), in a machine studying mannequin that classifies visitors. Mercury has already been applied as beta characteristic in Cisco Safe Firewall, and I feel it is going to have broad utilization elsewhere, too.  

To clarify a bit extra concerning the machine studying, I coated among the statistics which can be behind the Weighted Naive Bayes algorithm that they used. This algorithm works by taking in contextual data when calculating chance. A well-known instance is the experiment the place and viewers is requested to determine of their fictional neighbor Steve is extra more likely to be a librarian or a farmer primarily based on the next description:

Steve could be very shy and withdrawn, invariably useful however with little or no curiosity in individuals or on the earth of actuality. A meek and tidy soul, he has a necessity for order and construction, and a ardour for element.”

Kahneman and Tversky found that most individuals would select librarian, despite the fact that there are lots of extra farmers than librarians within the whole inhabitants. Individuals neglect to take the overall probability that Steve is a librarian in to account, which could be very small.  

In Venture Mercury, an algorithm is used that’s primarily based on this normal precept, nevertheless it then permits for including weights to sure options. Mercury makes use of the TLS fingerprint, together with vacation spot context to determine whether or not the visitors is malicious or not — with out decryption! 

Go to Venture Mercury on GitHub. 

Airport Beers 

After a variety of studying and educating, it was time to fly house once more. To have fun every little thing that I discovered and the classes I gave, I had a traditional “airport beer”, a ritual  I undoubtedly had missed. Luckily I had my company Amex helpful. 

Try the whole NDC Safety convention for extra. 

What’s subsequent? I’ll be at KubeCon + CloudNativeCon Europe 2022 this Might within the lovely metropolis of Valencia, Spain. Come go to the Cisco sales space or be a part of us just about.  Study extra about Cisco at KubeCon.



We’d love to listen to what you assume. Ask a query or go away a remark beneath.
And keep linked with Cisco DevNet on social!

LinkedIn | Twitter @CiscoDevNet | Fb Developer Video Channel


We will be happy to hear your thoughts

Leave a reply

Enable registration in settings - general
Compare items
  • Total (0)
Shopping cart