dcid.me
Open in
urlscan Pro
45.32.155.191
Public Scan
URL:
https://dcid.me/
Submission: On August 10 via api from US — Scanned from DE
Submission: On August 10 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
dcid.me Menu * About me * Blog * Projects * Contact FANCY ABOUT. I love building and breaking things. Daniel B. Cid is the founder of CleanBrowsing , focused on helping parents, schools and businesses protect kids from adult content online. He is also the original founder of the open source OSSEC HIDS, founder/CTO of Sucuri , NOC.org, Trunc and former VP of Engineering for the security products division at GoDaddy. He is passionated about intrusion detection , log analysis, malware research and web/online security. He is an active member of the open source and security community, specially known for creating the OSSEC HIDS (Intrusion detection system) and founding Sucuri & CleanBrowsing. He is also the co-writer of the Host-Based Intrusion Detection book. In the past, he worked at Trend Micro, Q1Labs (now IBM), Sourcefire (now Cisco) and on his own ventures. On June 2008, he sold his open source project OSSEC to Trend Micro, and joined Trend as the lead of OSSEC development. On April 2017, he sold Sucuri to GoDaddy and joined the company as a VP of Engineering. On 2020, he left GoDaddy and went back to his roots building interesting products - for fun and some profit. Often no profit. Mammoth hot springs. Coding for fun and profit. Often fun and little profit. CONNECT WITH ME I am not the most social person, but I am on Twitter, Mastodon (noc.social) and a few more places. @DANIELCID For work-related tweets, you can follow my Twitter account: @danielcid. DCID@NOC.SOCIAL I am the most active on Mastodon, on the noc.social instance that I manage. You can engage with me there: https://noc.social/@dcid /IN/DANIELCID Nobody really uses linkedin anymore, but I am there as well: http://ca.linkedin.com/in/danielcid ACTIVE PROJECTS After leaving a big corporation (GoDaddy), I decided to go back to what I love and just build things and solve problems. That led to 3 main products that are keeping me busy all the time. CleanBrowsing, a DNS based content filter; NOC.org, a CDN/WAF to protect and optimize web sites; and Trunc, a centralized log analysis and storage solution in the cloud. You can read more about other smaller projects that I am involved here: Daniel project's page. INTERVIEWS AND PAPERS Some interviews (mostly old) with me: * 2017, AlienVault - Interview with Daniel Cid, founder of OSSEC * 2016, Concise Courses - An Interview with Daniel Cid, Co-Founder of Sucuri and Creator of OSSEC HIDS * 2015, IncomeDiary - Daniel Cid Interview – Defending 250,000 Websites From Hackers Every Month * 2015, Heimdal - 50+ Internet Security Tips & Tricks from Top Experts * 2014, WFH.io - Company Showcase - Sucuri - Remote Work * 2013, SANS - SANS Security Thought Leader * 2012, Use This - The Setup - Daniel Cid * 2010, Network World – Being acquired is the best thing for a FOSS project * 2009, Net Security – OSSEC, the open source host-based intrusion detection system * 2009, Linux Magazine – Commercial open source (hobby seguro) - Portuguese Old Conferences and papers * 2011 – Quebec, QC - OSSEC Workshop on Hackfest * 2010 – SANS, DC – SANS log management and incident response summit * 2009 – Ottsec, Canada – OSSEC HIDS for Ottsec * 2008 – PST Canada – Open Source Host-based Intrusion Detection with OSSEC * 2007 – PST, Canada – Enterprise Log Management with Q1 Labs QRadar and OSSEC * 2007 – AusCERT, Australia – Log-Based intrusion detection * 2007 – CONFidence, Poland – Log-Based intrusion detection Old OSSEC Proud moments * 2011 - OSSEC voted #2 best IDS tool by the sectools.org survey (again) * 2010 – OSSEC Award Daemon * 2009 – OSSEC book as Best Book Bejtlich Read in 2008 * 2007 – OSSEC was chosen #1 open source security tools in the enterprise by LinuxWorld * 2006 – OSSEC voted #2 best IDS tool by the sectools.org survey Mentions * 2017, GoDaddy, Sucuri and GoDaddy team up to protect more websites * 2017, Threat Post, Attackers Capitalizing on Unpatched WordPress Sites * 2016, BBC, Wordpress blogs defaced in hack attacks * 2015, PC World, Webmasters have only hours to deploy patches, Joomla incident shows * 2015, ArsTechnica, Active malware campaign uses thousands of WordPress sites to infect visitors * 2015, SC Magazine Zero-day bug identified in popular FancyBox WordPress plugin * 2014, PC World, Over 160,000 WordPress sites used as DDoS zombies * 2014, Help Net, Over 162,000 WordPress sites exploited in DDoS attack * 2014, ArsTechnica, Attackers trick 162,000 WordPress sites into launching DDoS attack * 2014, InfoWorld, Joomla receives patches for zero-day SQL injection vulnerability * 2013, ArsTechnica, Google crawler tricked into performing SQL injection attacks using decade-old technique * 2013, InfoWorld, Google’s dangerous bots put the whole Web on edge * 2013, ArsTechnica, Backdoor in popular ad-serving software opens websites to remote hijacking * 2013, CSO - Attackers embedding backdoors into image files * 2013, eSecurity - Malicious WordPress Plugin Discovered * 2013, Information Week - Darkleech Attacks Hit 20,000 Websites * 2013, ArsTechnica - Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites * 2013, CIO - Web Server Hackers Install Rogue Apache Modules and SSH Backdoors, Researchers Say * 2012, Information Week - Apache Server Setting Mistakes Can Aid Hackers * 2012, InfoWorld - Many Apache Web servers put popular websites at risk * 2012, ArsTechnica - Misconfigured Apache sites expose user passwords * 2012, Yahoo - AlienVault Launches Technical Advisory Board * 2012, PC World – PHP patches actively exploited CGI vulnerability * 2012, SC Mag – 50,000 sites compromised in sustained attack * 2012, Krebs on security – Plesk 0Day For Sale As Thousands of Sites Hacked * 2012, TechCrunch – Yahoo Confirms, Apologizes For The Email Hack, Says Still Fixing * 2010, Network World – Being acquired is the best thing for a FOSS project * 2009, Net Security – OSSEC, the open source host-based intrusion detection system USEFUL LINKS About me Contact Projects Research Blog Priscila Cid Snowboarding Priscila Snowboarding Youtube Priscila Snowboarding Insta MY COMPANIES & PROJECTS CleanBrowsing NOC.org Trunc DNS Repo IP Reputation CONTACT ME twitter: @danielcid Mastodon: dcid@noc.social email: dcid@noc.org email: dcid@dcid.me © 2023 Copyright: Daniel B. Cid