Guided Fuzzing with Driller

Guided Fuzzing with Driller

GRIMM
At GRIMM, we are always trying out new tools to build our capabilities in vulnerability research. We frequently use fuzzing to search for bugs in applications, but there are some bugs a fuzzer alone would not be able to find. So, we were excited to try out Driller, a tool written by Shellphish. Driller uses symbolic execution to find new parts of the code to fuzz, helping the fuzzer to find bugs that it might not have reached otherwise.
Making security decisions based on verifiable facts

Making security decisions based on verifiable facts

Adam Nichols

Security decisions should be based on verifiable data - facts - rather than opinions. I’ve seen the trend of CISOs and many security operators being impeded by the lack of transparency into security data, jaded by product features and marketing fluff and limited by their ability to glean high quality, data-driven insights to inform decision making. This is a problem that GRIMM is working to solve.

See you in San Francisco for RSAC!

See you in San Francisco for RSAC!

GRIMM & SCYTHE
GRIMM and SCYTHE are packing our bags and heading to the RSA Conference. We have a busy week planned and are excited to see new and familiar faces. We would be happy to connect one-on-one to talk about the ways your organization can benefit from CROSSBOW. Our teams will be in full force - here are a few places you will find us throughout the week: Mayhem at the Mint Join SCYTHE and Bugcrowd at the historic SF Mint for an evening of luxurious InfoSec networking and partying.
HAX goes International

HAX goes International

GRIMM

The eyes of the world were recently focused on PyeongChang, South Korea for the 2018 Winter Olympics. While we watched athletes curl, skate, ski and slide across the frozen South Korean landscape, we at GRIMM had our own South Korean experience!

Jennifer Tisdale joins GRIMM as a Cyber Advocate for Connected Mobility and Infrastructure

Jennifer Tisdale joins GRIMM as a Cyber Advocate for Connected Mobility and Infrastructure

Brian DeMuth
Connected Mobility and Infrastructure are taking Detroit by storm; timing is critical for adopting strong security practices at this nascent point in the technology and the industry. With her background in cybersecurity and autonomous vehicles, Jennifer Tisdale is the ideal leader to drive GRIMM’s engagement with automotive industry Original Equipment Manufacturers (OEMs), suppliers, and industry stakeholders to ensure that cybersecurity initiatives are integrated into the future of mobility and smart city infrastructure.
Understanding the Real Cost of Pen Testing, Red Teaming and Blue Teaming

Understanding the Real Cost of Pen Testing, Red Teaming and Blue Teaming

Bryson Bort
The void in the cybersecurity workforce is compounding the level of risk faced by enterprises. The global shortage of skilled security workers could reach 1.8 million in the next five years according to the Center for Cyber Safety and Education. Contrast this with plans to boost security teams hiring by at least 15 percent in the same time frame - the numbers don’t add up. This is exacerbated by the increasing volume, variety and veracity of widespread cyberattacks like WannaCry, NotPetya, Locky, and other blockbuster ransomware.
Practical advice for real world problems

Practical advice for real world problems

Adam Nichols
Introduction Have you ever been trying to solve a systemic problem, like users getting infected by malware, and the only advice you get is completely impractical, such as to instruct users to not click on links or open attachments? This seems to be one of the top security recommendations lately, as if the solution was so simple. The good news is that there are some practical solutions out there for nearly every organization.
The Launch of SCYTHE and CROSSBOW

The Launch of SCYTHE and CROSSBOW

Bryson Bort
When I started GRIMM, I had a vision to tackle the greatest cybersecurity challenges that face our clients, industry and the greater business and government communities. Five years later, we have grown into a dynamic and passionate team who strives to make a better, more secure world through the independent research and the services we provide to clients. GRIMM takes deep pride in its dedication to education, innovation and technical problem solving.
#BestTechWorkCulture

#BestTechWorkCulture

Bryson Bort
Last night, GRIMM attended the 3rd Annual DC Timmy Awards. The Timmy Awards recognize and celebrate the technology work culture that actively promote creativity, innovation, and learning in the DC area. GRIMM was named a finalist leading into the event and we’re thrilled to have been ultimately recognized as the First Runner-Up for Best Tech Work Culture! The evening was filled with energy and camaraderie as companies across the region came together to celebrate the innovative leadership embodied by the greater DC tech community.
HAX and GRIMM’s Internship Programs

HAX and GRIMM’s Internship Programs

Lisa Wiswell
One of the reasons I chose to come to GRIMM after leaving federal service earlier this year was because of one of the core principles held by the rest of the GRIMM Leadership team. That is the importance of educating the general public on the inherent cybersecurity risks in nearly everything touched on a daily basis, and of enabling future generations of cybersecurity experts, software developers, and computer engineers to solve these security challenges, as well as those of the future.