Cybersecurity

23 01, 2017

5 Security Management Trends to Watch in 2017

By |2017-10-04T10:13:37-07:00January 23rd, 2017|Cybersecurity|Comments Off on 5 Security Management Trends to Watch in 2017

This article was originally published on Help Net Security. 1. Cybercrime recognized as a dark industry Over the last several years, cybercrime has evolved from separate efforts of threat actors to a full-blown industry. While security professionals have observed this gradual “corporatization” of cybercrime, 2017 will be the year non-security folks begin to recognize this [...]

19 10, 2016

Game of Thrones: Exploit Kit Edition

By |2017-11-14T11:24:07-07:00October 19th, 2016|Cybersecurity|Comments Off on Game of Thrones: Exploit Kit Edition

In the last few months, the exploit kit market experienced a major shake-up: the three major leading kits “died,” some in tragic circumstances (for their operators). This is big news, as exploit kits were responsible for most of the web-based cyberattacks in the last few years. Exploit Kits Origin Story Exploit kits are malicious software [...]

22 08, 2016

The NSA Hack and New Zero-Day Vulnerabilities: How Skybox Can Help

By |2017-11-14T11:37:31-07:00August 22nd, 2016|Cybersecurity|Comments Off on The NSA Hack and New Zero-Day Vulnerabilities: How Skybox Can Help

‘Auction’ of NSA Tools Sends Security Companies Scrambling – New York Times, August 18, 2016 Recent news headlines described how zero-day vulnerabilities in network security equipment discovered by the NSA have been released by a hacker group. As if that wasn’t bad enough, here have been reports that this group plans to auction off the [...]

27 06, 2016

Ponemon Data Breach Study: Who has an extra $4M laying around?

By |2017-10-03T15:40:59-07:00June 27th, 2016|Cybersecurity|Comments Off on Ponemon Data Breach Study: Who has an extra $4M laying around?

According to the 2016 Cost of Data Breach Study put out by the Ponemon Institute (and in conjunction with IBM), the average cost of an enterprise data breach jumped up to $4 million. That’s a five percent bump over 2015, though the cost of data breaches hasn’t varied much since the study began in 2005. [...]

23 03, 2016

Gartner Defines New Technology Class for Security Operations, Analytics and Reporting

By |2017-10-12T11:18:30-07:00March 23rd, 2016|Cybersecurity|Comments Off on Gartner Defines New Technology Class for Security Operations, Analytics and Reporting

As the attack surface has grown; so have the technologies built to tackle it. Unfortunately, the multitude of point solutions have in some ways complicated matters for security practitioners, creating segmented data that requires a great deal of time and resources to unite. And with networks and risks constantly in flux, all this work amounts [...]

12 02, 2016

Fostering a Security Ecosystem

By |2017-10-10T15:20:43-07:00February 12th, 2016|Cybersecurity|Comments Off on Fostering a Security Ecosystem

In a recent blog post Throwing Down the Gauntlet for the Cyber Security Sector, BT Security’s General Manager Hugh Tatton-Brown urged industry leaders and BT partners to show how they’re answering the call for an “ecosystem” approach to cybersecurity challenges. Gauntlet: accepted. “While innovation is all around us … the problem is that they’ve been [...]

5 11, 2015

TalkTalk Hackers: The Young Face of Cyber Crime

By |2017-11-14T11:36:40-07:00November 5th, 2015|Cybersecurity|Comments Off on TalkTalk Hackers: The Young Face of Cyber Crime

Oh to be young. The teen years are filled with so many rites of passage—learning to drive, going to prom, braces: off, college search: on. But if sitting at your computer and testing the limits of the cyber world are more your style, seriously messing with an enterprise business or government organization is your golden [...]

20 10, 2015

Digital Disintegration: The end of the Internet as we know it

By |2017-11-13T16:03:24-07:00October 20th, 2015|Cybersecurity|Comments Off on Digital Disintegration: The end of the Internet as we know it

October marks cyber security awareness month. To the average citizen, that might mean updating those hastily created passwords (e.g., “password1”), updating their antivirus software, and not replying to Nigerian-prince related emails. But a broader understanding of cyber security and the inner workings of the digital world remain elusive to the general public. While high-profile breaches [...]

10 09, 2015

Bug Bounties and Ransomed Security

By |2017-10-05T14:33:34-07:00September 10th, 2015|Cybersecurity|Comments Off on Bug Bounties and Ransomed Security

On September 6, amid the doldrums of Labor Day weekend, security researcher Kristian Hermansen was hard at work, disclosing a zero-day vulnerability in FireEye’s Mandiant security software. The bug, which could give unauthorized users remote root access to the file system, is merely one of “many handfuls of FireEye/Mandiant 0day” Hermansen has “been sitting on,” [...]

18 08, 2015

Life after Breach: 5 steps to recover from a cyber attack

By |2017-10-05T14:50:12-07:00August 18th, 2015|Cybersecurity|Comments Off on Life after Breach: 5 steps to recover from a cyber attack

It seems only fitting to have a post-Black Hat reflection on post-attack recovery. In her presentation How to Implement Security after a Cyber Security Meltdown, Christina Kubecka outlined the recovery efforts she helped implement after the 2012 cyber attack on Saudi Aramco. Chicken Little! Chicken Little! Your network just got pwned! For those unfamiliar with [...]