I'm a world-wide security evangelist, meaning I write and speak about hackers, cryptography, fraud, malware and all that interesting stuff.

I've spoken at over 30 conferences on all six developed continents. Some of my favorite engagements were speaking at RSA Europe in Amsterdam, InfoSec in London and Gartner Data Center in Las Vegas

I write a bi-weekly column at SecurityWeek, and have had the good fortune to write for DarkReading and SC Magazine and Network World.

They call me the "one-take wonder" in the studio, because I've done so many videos that I just do it in one take anymore.

I'm a fly-fisherman, a baseball fan and a craft beer enthusiast.

My Memoirs...


Nov. 27, 2016 

Vomit your way to a free Marriott Night

We burst into the Marriott Residence Inn room after a long, long night of drinking and carousing. I threw my suit jacket across the kitchen table and we tumbled into bed.

A frantic but hazy hour passed.

I lay back and turned to ask her if she wanted some water, but she was already snoozing. I turned off the bedside lamp and closed my eyes. Oh, no; the room was spinning. If t...

[ read more ] tags:  dating

Welcome to the Vanity Site of David William Holmes

June 1, 2015:  tags:  ddos

F5 DDoS Protection Volume 2 - Recommended Practices

This may be the most significant document I've ever written. Customers used to ask me if we a a Best Practices document around DDoS and I got tired of telling them we didn't. So I wrote it. It took my close to 9 months to birth this baby. It documents every single kind of DDoS we've ever seen and how to combat them. My magnum opens for DDoS.


June 12, 2017:  tags:  ddos in-the-news

Ten steps for combating DDoS in real time

Hey look, IT News Africa reprinted my ten-step guide to combating DDoS in real time. This is basically a shortened, texty version of the DDoS playbook.


June 12, 2017:  tags:  infosec security-week

Threat Modeling the Internet of Things Part 2: Three Steps to Pizza

My series on Threat Modeling the Internet of Things continues. This piece explains the process of threat modeling and provides some tips on how to work with your team to get it right.


May 17, 2017:  tags:  infosec

The Intel AMT Vulnerability - Silent Bob

The Intel Active Management Technology (AMT) vulnerability (now referred to by many as “Silent Bob”) is one of those truly brutal, ugly ones that make you queasy to even think about. Like Heartbleed or Venom. Here's how to scan for it on your network. And what ports to block.


May 4, 2017:  tags:  security-week

Threat Modeling the Internet of Things

Here is Part 0 (or part 1) of a series on threat modeling the Internet of Things. Here I introduce these two topics: Internet of Things and Threat modeling and suggest that maybe we need to spend more time putting them together. I like the intro and extro for this piece :)


May 2, 2017:  tags:  hackers

Hacker Profile: The Real Sabu Part 2 of 2

The explosive second half of the profile of famed hacker Sabu.


Announcements:

Task Completed
Fix the footer May 18, 2017
LifeStories create slug May 9, 2017
Add contact info to bio Sept. 20, 2016
Split Writing in to fiction, essays and more Sept. 16, 2016
Show associated tags in the content lists Sept. 16, 2016


Task List

Task Status
Hookup date selectors in fishing, writing, photos Medium
Secure this site with an AWS certificate Medium
Bring in fishing reports from Tumblr Low
Bring in fishing reports from flyfishsnoqualmie Medium
Add essay about medicine to writing page Low
Add Headshots gallery Medium
Put manila article on there Medium
Move changelog to nav bar Medium
Main page should show recent content High
Where is Bad Art in writing? High
Fix RSA2015 Low