Cloud Computing, Cyber Security, Security, Technology

Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above?

Researchers at Norse Corp. who say an ex-Sony employee may have had a hand in the epic breach of the entertainment company shared their intelligence on the finding with the FBI yesterday. But the FBI today still maintained its stance that North Korea is behind the massive cyber attack.

Norse found no link whatsoever with North Korea in the intelligence it gathered independently on the attacks, which evolved out of its interest prior to the breach in landing Sony as a security customer. But an FBI spokesperson — who declined to comment on the Norse research and briefing — today reiterated the agency’s unwavering position that North Korea was behind the attack: “Nothing has changed” in that assessment, the spokesperson told Dark Reading.

“There is no credible information to indicate that any other individual is responsible for this cyber incident,” according to a statement provided today by the FBI spokesperson.

Read More

Business, Cloud Computing, Cyber Security, Defense, Finance, IT Security, Security, Technology

2014 Cyber Security News Was Dominated By The Sony Hack Scandal And Retail Data Breaches

When looking back on the cyber security stories of 2014, there is one type of event that clearly stands out above all others: data breaches against major corporations, particularly retail operations. “While 2013 was a bad year for IT security, there’s no disputing that 2014 was the worst,” said Kevin Jones, senior IT security architect for Thycotic. “Whether it was insider threats, anonymous, or nation-state hackers, 2014 was a bad year for anyone whose job is to protect sensitive data from unsanctioned access.”

But, while data breaches against retailers may be the top story of 2014, there’s a lot that a “year in review” can tell us about the state of information security today … and what it may be like tomorrow.

Year of the Data Breach

Point of sale devices have come under a lot of fire in 2014 as they were the source for the breaches that hit companies like Home Depot, Dairy Queen, Goodwill, and countless other companies (Target marked the beginning of this trend, but that breach was revealed in 2013). According to SentinelOne Labs’Advanced Threat Intelligence Report, point of sale devices don’t have security built into the systems, and most rely on Windows XP as an operating system. It was a security failure waiting to happen.

Read More

Golden Networking's Cyber Security World Conference 2014 New York City
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Security, Technology

State Department Computers Hacked, Email Shut Down while Repairing Possible Damage from Suspected Hacker Attack

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.

A senior department official said Sunday that “activity of concern” was detected in the system around the same time as a previously reported incident that targeted the White House computer network.

That incident was made public in late October, but there was no indication then that the State Department had been affected. Since then, a number of agencies, including the U.S. Postal Service and the National Weather Service, have reported attacks.

Read more

Business, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Security, Technology

The Cable Cybersecurity Bill Gets New Life in Senate

It now appears as if senators will get the opportunity to vote on a presumed-dead cybersecurity bill before the lame-duck session ends, a key lawmaker and a congressional source said on Thursday.

After the Senate failed to move forward on a bill overhauling the National Security Agency’s authority last month, hope that senators would consider the National Cybersecurity and Critical Infrastructure Protection Act, which passed the House in July, faded. However, House Homeland Security Committee Chairman Michael McCaul (R-Texas) saidThursday he expects the Senate to move on the bill.

Read More

Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, IT Security, Security, Technology

Cyber security awareness still in its infancy, says Sans Institute

Cyber security awareness is still in its infancy in most organisations despite the quick returns it can deliver, says security training and certification body the Sans Institute.

Although the UK is among the leading countries in this regard in Europe, it still has a long way to go, according to training director for the Sans Securing The Human Program Lance Spitzner.

Read More

Edgar Perez, author of Knightmare on Wall Street and The Speed Traders
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, E commerce, Education, Finance, Government, IT Security, Security, Technology

US-China Cooperation on Cybersecurity to be Analyzed by The Speed Traders’ Edgar Perez at Golden Networking’s Cyber Security World Conference 2015

According to research firm Novetta Solutions, Axiom, a part of the Chinese Intelligence Apparatus, is main responsible for directing highly sophisticated cyber espionage operations against numerous Fortune 500 companies, journalists, environmental and pro-democracy groups, software companies, academic institutions, and government agencies worldwide for at least six years. Novetta’s coordinated effort performed the first ever-private sponsored interdiction against a sophisticated state sponsored advanced threat group. Their efforts detected and cleaned 43,000 separate installations of Axiom tools, including 180 of their top tier implants.

The organization responsible for directing Axiom, according to NewsFactor, appears targeting specific industries, including electronics and integrated circuit manufacturers, networking equipment manufacturers, Internet-based services companies, software vendors (particularly in the Asia-Pacific area), law firms with an international or M&A footprint, telecom companies, manufacturing conglomerates, venture capital firms, energy companies, meteorological services companies, cloud computing providers and pharmaceutical manufacturers. Yet, a spokesperson for the Chinese embassy dismissed the report’s claims as “fictitious.”

Amidst mounting distrust, Edgar Perez (, author of Knightmare on Wall Street, will discuss the state of the cybersecurity dialogue between the United States and China at Cyber Security World Conference 2015 New York City ( This forum will provide a platform for information security authorities and innovative service providers to distil their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

“There is a new day in trading and speed is the key. Edgar Perez is the poster child,” says Eugene Steele, Managing Partner, Trading Rooms World Wide. He has been engaged to present at the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), Quant Investment & HFT Summit APAC 2012 (Shanghai), U.S. Securities and Exchange Commission (Washington DC), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (London and Shanghai) and Pace University (New York), among other public and private institutions.

Mr. Perez is widely regarded as the preeminent global expert in technology and investing. He is the author of Knightmare on Wall Street and The Speed Traders and has been interviewed on CNN, CNBC, FOX BUSINESS, Bloomberg TV, CNN en Español, BNN, CCTV China,,, Leaderonomics, GPW Media, Channel NewsAsia’s Business Tonight and Cents & Sensibilities. Mr. Perez has been globally featured on FXFactor, Columbia Business, OpenMarkets, Sohu,, Yicai, eastmoney, Caijing,, 360doc, AH Radio,, CITICS Futures, Tongxin Securities,,, Caixin, Futures Daily, Xinhua, CBN Newswire, Chinese Financial News,, International Finance News,,,, The Korea Times, The Korea Herald, The Star, The Malaysian Insider, BMF 89.9, iMoney Hong Kong, CNBC, Bloomberg Hedge Fund Brief, The Wall Street Journal, The New York Times, Dallas Morning News, Valor Econômico, FIXGlobal Trading, TODAY Online, Oriental Daily News and Business Times.

Mr. Perez was a vice president at Citigroup, a senior consultant at IBM, and a strategy consultant at McKinsey & Co. in New York City. Mr. Perez has an undergraduate degree from Universidad Nacional de Ingeniería, Lima, Peru (1994), a Master of Administration from Universidad ESAN, Lima, Peru (1997) and a Master of Business Administration from Columbia Business School, New York, with a dual major in Finance and Management (2002). He belongs to the Beta Gamma Sigma honor society. Mr. Perez resides in the New York City area and is an accomplished salsa and hustle dancer.

About Cyber Security World Conference 2015

Cyber security is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyber attack in one of the most sweeping disclosed global breaches. The bank said the unknown attackers stole customers’ contact information, which included names, email addresses, phone numbers and addresses, affected an amount equivalent to two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2015 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies. Topics that Cyber Security World Conference 2015 will discuss include:

  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Cyber Security and its Role in the Overall Security of the United States
  • How Hackers Really Operate to Obtain Financial Data
  • Key Considerations about Security in the Internet of Things Age
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to

U.S. State Department
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, E commerce, Education, Finance, Government, IT Security, Security, Technology

Auditors: State Department has History of Poor Cybersecurity as Top Cyber Security Conference in New York City Approaches

The State Department, which shut down its unclassified email system and cut off Internet access over the weekend to deal with a suspected online attack, has a history of weak cybersecurity, and it grew worse over the last four years, according to auditors.

Officials at Foggy Bottom are giving few details about the “activity of concern” — first reported by the Associated Press Sunday, but auditors have long warned about poor cybersecurity measures there. More than 100 different systems at State have shown consistently similar problems since September 2009, auditors said in an October report. Ineffective cyber risk management is “undoubtedly systemic in nature, requiring global measures in attempt to remedy this deficiency,” they added.

Read more