I'm a world-wide security evangelist, meaning I write and speak about hackers, cryptography, fraud, malware and all that interesting stuff.

I've spoken at over 30 conferences on all six developed continents. Some of my favorite engagements were speaking at RSA Europe in Amsterdam, InfoSec in London and Gartner Data Center in Las Vegas

I write a bi-weekly column at SecurityWeek, and have had the good fortune to write for DarkReading and SC Magazine and Network World.

They call me the "one-take wonder" in the studio, because I've done so many videos that I just do it in one take anymore.

I'm a fly-fisherman, a baseball fan and a craft beer enthusiast.

My Memoirs...


Nov. 27, 2016 

Vomit your way to a free Marriott Night

We burst into the Marriott Residence Inn room after a long, long night of drinking and carousing. I threw my suit jacket across the kitchen table and we tumbled into bed.

A frantic but hazy hour passed.

I lay back and turned to ask her if she wanted some water, but she was already snoozing. I turned off the bedside lamp and closed my eyes. Oh, no; the room was spinning. If t...

[ read more ] tags:  dating

Welcome to the Vanity Site of David William Holmes

May 5, 2014:  tags:  infosec hackers

See what IP Reputation has to say about your firewall traffic

As you would imagine, being a security and networking professional, I ran a pretty sophisticated home network. One time I plugged our partner Webroot's IP reputation tool in front of my home router to see what kind of malicious traffic it was flagging. Here are the results.


May 17, 2017:  tags:  infosec

The Intel AMT Vulnerability - Silent Bob

The Intel Active Management Technology (AMT) vulnerability (now referred to by many as “Silent Bob”) is one of those truly brutal, ugly ones that make you queasy to even think about. Like Heartbleed or Venom. Here's how to scan for it on your network. And what ports to block.


May 4, 2017:  tags:  security-week

Threat Modeling the Internet of Things

Here is Part 0 (or part 1) of a series on threat modeling the Internet of Things. Here I introduce these two topics: Internet of Things and Threat modeling and suggest that maybe we need to spend more time putting them together. I like the intro and extro for this piece :)


May 2, 2017:  tags:  hackers

Hacker Profile: The Real Sabu Part 2 of 2

The explosive second half of the profile of famed hacker Sabu.


April 18, 2017:  tags:  hackers

Hacker Profile: The Real Sabu Part 1 of 2

Sabu was such a rock star in his time. His character and his exploits were legendary at the time and his downfall even more so. I really enjoyed writing this one. I actually had more information on this but couldn't publish it to due privacy concerns. But buy me a beer sometime and ask me about it.


April 13, 2017:  tags:  in-the-news infosec

CSO Perspectives Interview with David Holmes

Here's a 7 minute interview that CSO's Anthony Caruana did with me at the CSO Perspectives roadshow; this one was in Sydney. He asks about the new National Mandatory Breach Notification law, the Internet of Things, and where did I get that awesome shirt? Belgium.


Announcements:

Task Completed
Fix the footer May 18, 2017
LifeStories create slug May 9, 2017
Add contact info to bio Sept. 20, 2016
Split Writing in to fiction, essays and more Sept. 16, 2016
Show associated tags in the content lists Sept. 16, 2016


Task List

Task Status
Hookup date selectors in fishing, writing, photos Medium
Secure this site with an AWS certificate Medium
Bring in fishing reports from Tumblr Low
Bring in fishing reports from flyfishsnoqualmie Medium
Add essay about medicine to writing page Low
Add Headshots gallery Medium
Put manila article on there Medium
Move changelog to nav bar Medium
Main page should show recent content High
Where is Bad Art in writing? High
Fix RSA2015 Low