Jun 09, 2015 By Andrey Zhuk In Blog

Part 1: Solving the Honeypot Dilemma: Countering: Dormant Threats Inside Your Agency’s Networks

“I write to inform you that we have discovered that CareFirst has experienced a sophisticated cyber attack that potentially allowed attackers to gain access to a limited portion of your personal information.” Those are the opening lines of a letter I received just two days ago. CareFirst also informed me that the company learned on April...

Read More

May 27, 2015 By Jean-Paul Bergeaux In

The Evolution of an Attack: Moving Beyond Malware

Today’s most dangerous cyber threats are the cyber “snipers” who hide within the noise created by less advanced threats. Here’s how they work: Cyber attackers begin by funding and encouraging attacks by botnets, mass phishing Emails, morphing malware and other APTs in order to overwhelm their targets with threats.  Then when the bad...

Read More

May 22, 2015 By Jean-Paul Bergeaux In Blog

RSAC Recap: Two Sessions That Made Me Think

At the recent RSA Conference 2015, I attended some fascinating meetings and sessions filled with valuable insights. Here are two of them whose presentation slides are available for PDF download: Hacking Exposed: Beyond the Malware No surprise here.  George Kurtz from CrowdStrike has become a staple of RSAC best sessions.  Joined by Dmitri...

Read More

May 19, 2015 By Andrey Zhuk In Blog

Security Operations Center (SOC) Automation: Why It Matters

Security is not a simple problem that can be easily solved by spending more money. The Target breach of 2013 is a great case in point. Target has a significant IT security budget and a wide range of controls in place. Yet the company still managed to get taken to the tune of 40 million credit card numbers and 70 million customer records. Most...

Read More

May 14, 2015 By Tom Gann In Blog

Shifting the Focus: Cybersecurity as an Enabler

For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches.  While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that...

Read More

May 07, 2015 By Jean-Paul Bergeaux In Blog

Increase Security, Not Complexity

Walking around the RSA Conference, I saw many innovative and powerful security tools that could help federal agencies.  However, two problems make it difficult to add any of them to the Security Operations Center (SOC):  Cost and Complexity. We all know there is no silver bullet, despite what many vendors will tell you about their products. ...

Read More

Apr 15, 2015 By Brian Reynolds In Blog

Insider data breaches: Whose responsibility is it? (Part 2)

In Part 1 of this blog, we discussed the critical nature of the insider data breach as well as its distinct origins.  We left it in a very scary place, a place where most corporations and agencies find themselves today.  Security teams and data teams don’t have the answers or the ownership to address this problem head on. So we return to...

Read More

Apr 02, 2015 By Brian Reynolds In Blog

Insider data breaches: Whose responsibility is it? (Part 1)

Insider data breaches have become a serious cyber threat that every member of the IT community should be paying attention to.  You don’t have to look very far to learn about these breaches and the damage they have caused.  It is all over the news. The harm to A company or agency name—or even to an entire industry—can be difficult to...

Read More

Mar 26, 2015 By Andrey Zhuk In

What are Advanced Evasion Techniques (AETs) and How to Defend Against Them? (Part 2)

In Part 1 of my blog on defending against AETs, we examined what constitutes an AET and how to test whether your network defenses are vulnerable to an attack utilizing AETs. In Part 2, we will look at ways to defend your information infrastructure from such exploits. To solve the AET conundrum, we need to start with implementing proper network...

Read More

Mar 11, 2015 By Andrey Zhuk In Blog

What are Advanced Evasion Techniques (AETs) and How to Defend Against Them? (Part 1)

Advanced Evasion Techniques, or AETs, are the way of the future when it comes to infiltrating networks of both government and commercial enterprises. Many government agencies and mid-to-large commercial organizations have a solid, defense-in-depth approach for securing their information technology (IT) resources. These security controls tend to...

Read More