The computers on your network are protected from malware right? If you are operating an environment based largely on Windows based PCs you likely have some kind of anti-virus installed and centrally managed. If you have purchased a more complete desktop protection suite, you probably even have a Host Based IDS/IPS protecting your machine from …Read More
Since launching ThreatConnect.com, Cyber Squared’s Intelligence Support Team has become more effective in managing, analyzing and sharing our Threat Intelligence. While understanding the threat remains one of our core requirements, we have also begun to fill a key gap that, we feel, many within the industry are failing to address.
Providing effective Threat Intelligence …Read More
When you get the opportunity to attend a security conference located in Budapest, you jump on top of it. Hacktivity 2012 provided that opportunity for me this year, and what an excellent conference it was. If you are saying to yourself, “But I don’t speak or understand any Hungarian, so why would I go to …Read More
Ok, ok, I know the title is a tad dramatic but hear me out on this one.
A well-known computer security professional and former NSA research scientist wrote an editorial back in July 2012 stating, “Money spent on security awareness training, is money wasted.” Dave Aitel …Read More
It has been almost a week now since DeepIntel 2012, a conference focused on Security Intelligence, has wrapped up and I cannot help but think; “Why is this the first conference of its kind?”
DeepIntel, a conference covering Security Intelligence using several different approaches, managed to effectively deliver the information both in its speakers and in …Read More
Bloomberg ran a Cyber Espionage piece called, “Hackers Linked To China’s Army Seen from EU to D.C” on July 26 that featured information derived from Cyber Squared’s Project Enlightenment. In response to the article, Bloomberg TV’s “First Up” program hosted a live interview with me …Read More
In blogs past, we have discussed the importance of Cyber Security, and how it is one of the most important pieces of the Information Assurance puzzle. One of the greatest problems that we continue to face as Network Defenders and Information Assurance professionals is human error. We spend millions …Read More
On 17 July 2012, researchers at Kaspersky Labs and Seculert identified over 800 victims of a new cyber espionage campaign dubbed “Mahdi”. As I researched the information that was presented, I began to wonder if this was actually evidence of an Iranian sponsored or sanctioned cyber espionage event. I know, it’s an “out there” …Read More
Malware analysis can be a time consuming process, especially when dealing with a sample from skilled attackers with time and money on their side . There is no doubt that fully reversing malware and finding out how it works is the most effective way to learn how to defend against it, but most businesses don’t …Read More