Cybersecurity

12 02, 2016

Fostering a Security Ecosystem

By | February 12th, 2016|Cybersecurity|Comments Off on Fostering a Security Ecosystem on Fostering a Security Ecosystem

Skybox partner BT Security challenges cybersecurity leaders to prove how they’re helping create an industry where cooperation between security controls, intelligence and people is the new standard.
5 11, 2015

TalkTalk Hackers: The Young Face of Cyber Crime

By | November 5th, 2015|Cybersecurity|Comments Off on TalkTalk Hackers: The Young Face of Cyber Crime on TalkTalk Hackers: The Young Face of Cyber Crime

Four arrested in connection with the TalkTalk data breach all 20 and under. What the attackers’ ages says about TalkTalk’s security and how the Library of Congress is getting hip to the times.
20 10, 2015

Digital Disintegration: The end of the Internet as we know it

By | October 20th, 2015|Cybersecurity|Comments Off on Digital Disintegration: The end of the Internet as we know it on Digital Disintegration: The end of the Internet as we know it

Digital disintegration threatens to disrupt economic progress and end the Internet as we know it. In cyber security awareness month, we ask what is it and what can we do to stop it?
10 09, 2015

Bug Bounties and Ransomed Security

By | September 10th, 2015|Cybersecurity|Comments Off on Bug Bounties and Ransomed Security on Bug Bounties and Ransomed Security

Whether you view Kristian Hermansen, Luca Todesco, or the Miller/Valasek duo as rebels or heroes, their message is clear: respect the researcher.
2 09, 2015

Cyber Reality Check: Debunking the Myth of Silver Bullet Solutions

By | September 2nd, 2015|Cybersecurity|Comments Off on Cyber Reality Check: Debunking the Myth of Silver Bullet Solutions on Cyber Reality Check: Debunking the Myth of Silver Bullet Solutions

CISOs have longed for the illusive silver bullet of one-click cyber security. It’s time to put that notion to rest and start combining controls already in place for strategic security management.
21 08, 2015

Through the Looking Glass: Why security researchers are stirring up the industry

By | August 21st, 2015|Cybersecurity|Comments Off on Through the Looking Glass: Why security researchers are stirring up the industry on Through the Looking Glass: Why security researchers are stirring up the industry

What do the DOJ, Apple, and Oracle have in common? Confusion over what to do with independent security researchers.
18 08, 2015

Life after Breach: 5 steps to recover from a cyber attack

By | August 18th, 2015|Cybersecurity|Comments Off on Life after Breach: 5 steps to recover from a cyber attack on Life after Breach: 5 steps to recover from a cyber attack

Christina Kubecka’s Black Hat briefing on recovering from the Aramco cyber attack lays out a playbook for post-attack recovery and adaptive security teams.
11 08, 2015

Bringing Security into View: Visualization at Black Hat 2015

By | August 11th, 2015|Cybersecurity|Comments Off on Bringing Security into View: Visualization at Black Hat 2015 on Bringing Security into View: Visualization at Black Hat 2015

Visual models combining data science and machine learning are the future for rapid-response cyber security.
19 06, 2015

OPM Hack Exposes Bleak Reality of National IT Security and Advanced Threat It Faces

By | June 19th, 2015|Cybersecurity, Vulnerability & Threat Management|Comments Off on OPM Hack Exposes Bleak Reality of National IT Security and Advanced Threat It Faces on OPM Hack Exposes Bleak Reality of National IT Security and Advanced Threat It Faces

Accusations fly at China, but basic weaknesses in OPM security practices and shortcomings of DHS’s Einstein hold most of the blame for recent breach