Win A Free Trip To Suits and Spooks Paris!
For the next 48 hours, we will make ten tickets for Suits and Spooks DC (Feb 11-12, 2016) available for purchase at a huge discount- only $324. Our normal rate for October is $399 and effective Nov 1...
View ArticleHow “Hat-tribution” on China Has Harmed U.S. National Policymaking
Back in the early 2000’s, cybersecurity researchers blamed every financial services attack on Russian or Eastern European hackers and every non-financial services attack on China. Every attack...
View ArticleWho Has The Chinese Government Arrested For Hacking OPM? Possibly No One.
On December 1st, Attorney General Loretta E. Lynch and Department of Homeland Security Secretary Jeh Johnson, together with Chinese State Councilor Guo Shengkun, co-chaired the first U.S.-China...
View ArticleGet An Insider's Perspective On The Commercial Airline Threat Landscape...
This is a unique opportunity to hear Jim Vasatka (Director of Aviation Security at Boeing) discuss the overall cybersecurity threat space as it pertains to commercial aircraft in a NO PRESS, Chatham...
View Article7 Reasons Not To Miss Suits and Spooks DC This Year
SUITS AND SPOOKS | FEB 11-12, 2016 | NATIONAL PRESS CLUB - WASHINGTON, D.C.ONLY 30 SEATS REMAINING!Suits and Spooks DC is Taia Global's limited-attendance cyber security event, now in its 5th year. I...
View ArticleKung Fu Panda 3: A Collaboration Between Dreamworks and China's State Council
Kung Fu Panda 3 opens simultaneously in the U.S. and China on Jan 29th to high hopes by Dreamworks Animation and Oriental Dreamworks, which is a joint venture formed with China Media Capital and...
View ArticleTwo Rare Gifts For The Next 20 People Who Register for Suits and Spooks DC 2016
Suits and Spooks DC 2016 is now less than two weeks away and I'd like to make it our best attended event in the five years since I founded this security forum. To that end, I'm giving away two rare...
View ArticleAn Exclusive Opportunity To Look Inside China's Plan To Become A Tech Power
Whether we in the West like it or not, the People's Republic of China is continuing to achieve rapid technological growth in a growing number of areas thanks in part to its smart use of Five Year...
View ArticleDo Your High Value Assets Match Russia or China's?
If you want to know what the Chinese and Russian governments consider valuable, just follow the R&D money.Our linguist/researchers have been busy building the world's first and only commercial...
View ArticleAttend Our Counterterrorism Workshop on March 29 in Washington DC
ISIL, aka ISIS or The Daesh, has claimed responsibility for yesterdays suicide bomber attacks in Brussels which targeted transportation hubs. Government and corporate employees are invited to attend...
View ArticleCyber Espionage's Three-Legged Stool Dilemma
Cyber espionage is a worldwide multi-billion dollar problem for every technologically advanced nation; even the ones that the U.S. traditionally considers its adversaries (Russia and China). Think of...
View ArticleHow Common Is It To Underestimate Customer Acquisition Costs?
I'm not a marketing guy. I always figured that if you build a solution that solves a hard problem, the customers will come. Right now, every marketing guy reading this is falling down laughing, but I...
View ArticleThe Next Evolution of Suits and Spooks: Entertainment
Farnborough International Airshow 2014I founded Suits and Spooks in 2011 in an effort to make it easier for startup technology companies to engage with the Intelligence Community; a problem based...
View ArticleThe DNC Hack: Dangers of Playing the Nation State Blame Game
UPDATE: Someone claiming to be responsible for the DNC breach has released the Trump opposition file to Gawker and mocked CrowdStrike according to the Salted Hash blog:"The main part of the papers,...
View ArticleThe DNC Breach and the Hijacking of Common Sense
"When you need something to be true, you will look for patterns; you connect the dots like the stars of a constellation. Your brain abhors disorder. You see faces in clouds and demons in bonfires....
View ArticleFaith-Based Attribution
"Faith-Based Attribution" is my latest article on the challenges of attributing attacks to the person or entity responsible. Check it out at Medium.com.
View ArticleCrushing Force as a Change Agent (or The Bullshit Luxury of 10,000 Failed...
"I have not failed 10,000 times. I have successfully found 10,000 ways that will not work." - (Thomas Edison)I’m the founder of a failed cybersecurity startup. Or, to use Edison’s perspective, I’ve...
View ArticleWA State Has Now Killed 18 Wolves Because Of One Ranch - the Diamond M
Source: http://www.capitalpress.com/washington/20160611/a-family-tradition-of-efficiencyThe McIrvin family, owners of the Diamond M cattle ranch for five generations, have been running cattle in...
View ArticleChina's Ministry of State Security Uses TikTok To Identify and Profile U.S....
ByteDance ordered to improve its user portrait mining software in TikTok's 700 million user baseWhile this headline is for a fictional scenario at the Social Media Information Warfighter Exercise on...
View ArticleRussian Military Unit VCH 6762 Breached By Ukraine Military Cyber Forces
One of thousands of captured documents, passports, credit card accounts obtained from the accounting department of VCH 6762 Russian military unit VCH 6762 is part of the Ministry of Internal Affairs,...
View ArticleRussian Black Sea Fleet Servers Breached By Ukraine's Cyber Forces
Russian Cruiser "Moskva" - flagship of the Black Sea fleetUkraine's Cyber Forces are continuing to breach Russian Ministry of Defense targets and extract valuable data, apparently at will. This time...
View ArticleUkraine Cyber Troops Breach Rosatom State Nuclear Energy Corporation
Ukraine Cyber Troops, a division under the Ministry of Defense, has been conducting multiple successful computer network operations against Russian government targets since the start of the...
View ArticleFSB Special Operations Detachment Hacked By Ukraine Cyber Troops
Ukraine's Cyber Troops gained access to the computer network of an FSB special operations detachment (Unit 607) that has been operating in Ukraine as part of VCH 6762. They've downloaded personnel...
View ArticleRussia's Chief Missile Officer Sergei Gennadievich Buev's Mobil Phone Hacked...
Ukraine's Cyber Force has gained access to the mobile phone of Sergei Gennadievich Buev, the Chief Missile Officer for Russia's Ministry of Defense. That background image on Buev's mobile phone is...
View ArticleCaptured Documents Related to Russia's 30th Division of Surface Ships
Russian Defense Ministry photo taken from the Moskva on Feb 18, 2022Following up on an earlier report of the success of Ukraine's Cyber Forces in accessing the servers of Russia's Black Sea Fleet,...
View Article