Richard Gold

Richard Gold
Richard Gold is a hands-on information security professional, who has over a decade’s worth of experience in understanding and securing computer networks. With his background as a Certified SCADA Security Architect and a Ph.D. in Computer Networking, Richard uses knowledge he’s gained from breaking into systems to better detect and protect networks, as well as build custom tooling. He regularly speaks on these topics at industry events, universities, and in the media.

Recent Posts by Richard Gold

Red Team Blues: A 10 step security program for Windows Active Directory environments

February 6, 2020

  A fun tweet crossed our path recently, the author asked, “Redteam operators: Which defensive settings have you encountered that …

read more

Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and the ASD Essential 8

January 7, 2020

  With the recent news of Qasem Soleimani on Friday 3rd January 2020, many organizations have been reviewing their security …

read more

WiFi Security: Dispelling myths of using public networks

October 23, 2019

We have all seen many articles, blogs, endless Twitter commentary, and so on about the risks of using public WiFi …

read more

ANU Breach Report: Mapping to Mitre ATT&CK Framework

October 11, 2019

Introduction This week, the Australian National University (ANU) published a report on an intrusion into their networks that occurred in …

read more

Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

September 25, 2019

Between 2012 to mid-2015, U.S. financial institutions, financial services corporations and financial news publishers fell victim to one of the …

read more

Recon Village: Panning for gold

August 1, 2019

Richard will be presenting ‘Asset Discovery: Making Sense of the Ocean of OSINT’ at 13.50 on 9th August 2019 in …

read more

Mapping Iran’s Rana Institute to MITRE Pre-ATT&CK™ and ATT&CK™

May 15, 2019

The internet has been aflame with discussions around three leaks of internal information from APT groups attributed with the Islamic …

read more

Cyber Talent Gap: How to Do More With Less

May 14, 2019

The challenge facing us today is twofold: not only is the digital footprint of the organizations we want to protect …

read more

SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

February 26, 2019

In our latest research report, A Tale of Epic Extortions, the Digital Shadows Photon Research Team highlight how cybercriminals abuse our …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more