Cloud Computing, Cyber Security, IT Security, Security, Technology

How I Learned to Start Worrying and Fear the Commoditization of Threat Intelligence

As any film adaptation of a Pynchon book is apt to be, it came across as noisy, otherworldly confusing, intermittently meaningful and more like some kind of aimless Ludovico technique than a movie. And that’s not a bad thing. It’s really all you can ultimately achieve when you try to make a movie out of one of his novels.

Good try, Paul Thomas Anderson. Good try.

As I sat there watching, thoughts from my day job kept nagging at me as if the movie had actually stirred up something in my subconscious.

Specifically, I kept thinking about the trend lately around so much cyber threat intelligence from so many solutions providers delivering feeds from so many similar sources. And, altogether more bothersome, how so many of the providers lately are partnering up with one another to offer access to so many of each others’ threat intelligence feeds inside their own platforms. In my head, I kept seeing one of those photos of a person with the same photo of the same exact person dressed the same exact way hanging on the wall behind them and another photo….well, you get it.

Suddenly the movie started making more sense to me than the threat intelligence market. Then it hit me.

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

Advertisements
Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

Vice President Biden Visits Norfolk, Va., Talks Cybersecurity

Vice President Joe Biden visited Norfolk State University on Thursday to highlight a program that will give historically black colleges and universities millions of dollars to train students for jobs in cybersecurity.

NSU will be the lead campus in a new consortium that will includes 12 other historically black colleges, two national research labs and a school division in South Carolina, Biden announced during the visit. He was joined by Gov. Terry McAuliffe, U.S. Rep. Bobby Scott, Energy Secretary Ernest Moniz and other officials.

The Department of Energy will supply the national cybersecurity consortium with $25 million in grants over the next five years, part of the Obama administration’s effort to train more workers for jobs protecting the nation’s computer networks from attacks.

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

 

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

Lawmakers, former officials debate next move in cyberspace

The conversation in Washington has moved from North Korea’s alleged complicity in the hack of Sony Pictures Entertainment to whether the Obama administration has responded effectively to the hack, and whether it needs more tools from Congress to do so.

President Barack Obama’s vow of a “proportional” response to Pyongyang’s alleged cyber siege on Sony Pictures raises the possibility of the United States carrying out its own cyberattack, a scenario the administration has planned for via the four year-old Cyber Command.

“This is a whole new day in cyberspace for a host of reasons,” said former House Intelligence Committee Chairman Mike Rogers, referring to the Sony Pictures hack, which wiped out a huge amount of data from the movie studio’s hard drives and reportedly could cost the studio millions of dollars. “Now the United States is going to have to show that it will not tolerate it because everyone’s watching. Iran is watching, Russia is watching, China is watching,” added Rogers, who spoke Jan. 15 at a panel discussion hosted by the Bipartisan Policy Center.

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

 

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

SE7EN: NetAlert™ Enables Continuous Monitoring of Physical Network Infrastructure

Telos® Corporation today announced the general availability of SE7EN: NetAlert, an interactive, Web-based network infrastructure monitoring tool to protect the physical security of fiber optic and copper cable networks.

“SE7EN: NetAlert maps important information assets together into a single view,” said Telos’ Vice President COD (Cyber Operations and Defense) Development Jeff Schneider, “so the operator quickly knows the what, where, and when of a physical intrusion. Having all that information accessible through a dashboard, together with automated standard operating procedures, enables immediate and critical decision making.”

SE7EN: NetAlert is built upon Telos SE7EN, a collaborative, touch-optimized visualization platform, to provide an interactive visual representation of a network’s infrastructure for rapid inspection of all physical intrusion attempts. Through integrated geospatial data views, users can zoom into a geographic location, view floor plans and images, and review real-time camera feeds.

 

Standard
Business, Cloud Computing, Cyber Security, Data Breach, Defense, Finance, IT Security, Security, Technology

North Korea boosts cyber army to 6,000 troops to cause ‘physical and psychological paralysis’

North Korea has boosted its “cyber army” in a bid to cause “physical and psychological paralysis” in the South.

According to the South Korean Defence Ministry’s latest white paper, the hermit state’s military unit, which is dedicated to cyber activities, is now double that of South Korea’s.

“North Korea is currently running its 6,000 (member) workforce for cyber warfare and performing cyberattacks for physical and psychological paralysis inside South Korea such as causing troubles formilitary operations and national infrastructures,” said the South Korean Defence Ministry.

In 2013, South Korea blamed Pyongyang for the raft of crippling cyber attacks on its banks and broadcasters.

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Data Breach, Defense, Finance, Government, IT Security, Security, Technology

SONY HACK SIGNALS ‘NEW NORMAL’ IN CYBERSECURITY

The Sony hack copied a multinational company’s financial documents, its employees’ personally identifiable information and years’ worth ofembarrassing – and poorly written, it must be said – emails from high-level executives and released them all for the world to see.

But for many cybersecurity observers, the real eye opener was how the hack illustrates today’s cyber landscape: It’s likely to get worse before it gets better.

A growing collection of high-level computer security experts believe evidence points to aninsider-orchestrated attack, while the U.S. government quickly blamed and sanctioned North Korea, whose leader, Kim Jong-un, is portrayed in an unflattering fashion in the Sony-backed film, The Interview.

Meanwhile, as Sony’s image continues to tarnish with each leaked, scandalous revelation, the company experienced an added layer of suffering other data-breached companies — Target, Neiman Marcus and Home Depot — had avoided.

Read More

Standard
Business, Cloud Computing, Cyber Security, Data Breach, Defense, Finance, Government, IT Security, Security, Technology

Trend Micro Supports Cybersecurity Curriculum with Educational Grant

DALLAS, Jan. 7, 2015 /PRNewswire/ — Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, has announced a $10,000 donation to the Mission College Center for Innovation and Technology (MC²IT). The grant will provide resources and expertise to advise and help enhance cybersecurity course curriculum. As the security and privacy industry continues to expand and evolve, Trend Micro is committed to encouraging students to enter the cybersecurity field while empowering them with the core competency to do so.

“As part of our responsibility to help keep the world safe for exchanging digital information, Trend Micro is helping MC²IT rebuild existing curriculums while recommending relevant courses,” said Raimund Genes, CTO, Trend Micro. “The addition of these types of courses will help students to become future experts and next generation leaders in cyber security.”

As a member of the MC²IT advisory board, Trend Micro and other security and privacy leaders recognize the challenges presented by a lack of skilled cybersecurity professionals. With the advent of new technology, experts and professionals will need training on how to investigate and manage corresponding threats.

“With the expertise and knowledge that Trend Micro and the security advisory board bring to MC²IT, we can bridge the gap between technology and education,” said Daniel Peck, president, Mission College. “We have the right people collaborating, bringing their passion to the security profession to motivate students and others interested in learning more about technology careers.”

Read More

Standard