The World of Cybersecurity

Should the U.S. intelligence community help U.S. companies?

If you haven’t been living under a rock, you know that many countries’ intelligence and military agencies spy on U.S. companies, stealing their intellectual property (IP) to help their own nations’ companies and their own economies. Probably billions of dollars worth of U.S. research and development is compromised and stolen every year from the U.S. …

Should the U.S. intelligence community help U.S. companies?Read More »

What do industry leaders have to say about cyber deception?

If you’ve been following this blog you’ll have noticed that we’re not shy and we love to talk about our industry and breaking trends. At the same time, we’re always on the lookout for industry confirmation for words of the wise to further boost our determination and quest for cybersecured organizations. We strongly believe in …

What do industry leaders have to say about cyber deception?Read More »

The recent US healthcare database breaches: a look at what's happening

Even cyber intelligence seems to be about sensationalism in the media today. Intelligence is about gathering info, processing it, and reaching conclusions. It is more than just one piece of data; information needs to be gathered and analyzed over time before accurate conclusions can be drawn. The recent (and ongoing) healthcare database breaches are a …

The recent US healthcare database breaches: a look at what's happeningRead More »

Where does cybersecurity fit within your organization?

Where within your organization does the cybersecurity function fall, and to whom do they report – the CEO, CIO, CTO, or Security Office? I have recommended for over 25 years that the cybersecurity function is a security responsibility, not a technical responsibility. Most cybersecurity professionals I’ve talked to over the years report to the CIO. I personally …

Where does cybersecurity fit within your organization?Read More »

Research: Cyber Deception Will Be Standard For Thousands Of Organizations By 2018

Today, almost all organizations have a defense grid of firewalls, IDS/IPS, and SIEMs. This baseline grid will soon include advanced cyber deception elements as well. A Gartner research study predicts that by 2018, 10% of enterprises will use cyber deception tools and tactics – and actively participate in deception operations against attackers. As we see it, there are …

Research: Cyber Deception Will Be Standard For Thousands Of Organizations By 2018Read More »

Crowdsourcing The Dark Web: A One-Stop Ransomware Shop

(Published originally on Dark Reading) Ransom attacks are at an all-time high; more and more criminals are using common tools to steal data and extort data owners. But this type of attack can be risky for the cybercriminal because, unlike stealthy advanced attacks, such operations require interaction with the victim. Furthermore, even if the victim …

Crowdsourcing The Dark Web: A One-Stop Ransomware ShopRead More »

Anonymous’ ‘Hack Israel Day’ Could Impact the Entire World

(Originally published on re/code) Israel was hit by a massive cyber offensive this week. But unlike other attacks (APTs, criminal campaigns, etc.) to hit the nation, this one has been announced in advance. It’s Anonymous’ annual OpIsrael attack, which has been taking place on April 7 every year since 2013. According to most Israeli researchers, the attack …

Anonymous’ ‘Hack Israel Day’ Could Impact the Entire WorldRead More »

APT attacks and false flag tactics: How can we spot the fakes?

The false flag tactic originated in naval combat in the days of yore. Flags were used to communicate between fleet assets before and during combat; a ship’s identity was important, especially when gun smoke filled the air. Flying the enemy’s banner during combat, along with flags displaying false messaging, could confuse and mislead the enemy. …

APT attacks and false flag tactics: How can we spot the fakes?Read More »

Scroll to Top