Quantcast
Browsing all 219 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Call for Papers: Suits and Spooks Singapore: Dec 2-3, 2013

Suits and Spooks SingaporeThe Mandarin Oriental HotelDecember 2-3, 2013Call For PapersTaia Global's hit conference series Suits and Spooks will hold its first international conference in Singapore this...

View Article


China Operates the World's Most Successful HoneyPot

The Chinese government has been on a focused mission to increase its technological development for many years. One of the best and most efficient ways that it has of doing this is by making it...

View Article


Image may be NSFW.
Clik here to view.

Please take and share this "Hacker Deception Survey" (Now Updated with Results)

When it comes to blaming cyber attacks on any given nation state, many times the evidence given includes WHOIS registration data. There's been a surprising (at least to me) amount of credibility given...

View Article

Mandiant's APT1 "Mission" problem

Mandiant's APT1 report's table of proof listed six categories that Mandiant deduced tied APT1 to PLA Unit 61398. The first, which Mandiant called the Mission area, made the claim that PLA Unit 61398...

View Article

APT1, Shanghai Jiao Tong university, and Xenophobia

A few things have caught my attention recently which I'd like to share with you all in a somewhat abbreviated manner (meaning I'm swamped but this is important):A Security Engineer's Forensic Review of...

View Article


Rep. Wolf's Flawed Approach to Supply Chain Security

According to this article in today's Politico, Rep. Wolf has inserted language in a budget stopgap bill that is "meant to ensure Chinese companies certify their independence from official Beijing...

View Article

Image may be NSFW.
Clik here to view.

U.S. superiority in network-centric warfighting may be in jeopardy. Join the...

Network-centric Warfare has become the de facto standard for many nations, not just the U.S. Unfortunately, thanks to the exponential growth of global networks and the accompanying security...

View Article

Cyber Security Vendors Who May Benefit From Increased Gov Spending in 2013-14

According to Bloomberg, the following companies may see a piece of Obama's request to increase cyber security spending for the next fiscal year beginning Oct 1, 2013."The overall cybersecurity spending...

View Article


Closing the Loop: Part of an Assumption of Breach Security Paradigm

Tim O'Reilly gave a talk recently at Stanford University on the importance for startup companies to "close the loop" with their customers. Uber was used to demonstrate the concept. Both the Uber driver...

View Article


Image may be NSFW.
Clik here to view.

Syrian Electronic Army: Background, Operations, Gov't Affiliations

The Syrian Electronic Army (originally called Syrian Electronic Soldiers) was created in May 2011 by the Syrian Computer Society who registered the domain Syria-es.com and .org with Network Solutions....

View Article

Image may be NSFW.
Clik here to view.

Chimera: Know Your Targets

In today's digital landscape, threats are expanding and your intellectual property and trade secrets are their targets. You may not know the threat actor, but you can know what they're...

View Article

Image may be NSFW.
Clik here to view.

Challenges with Threat Intelligence, Attribution, and Active Defense are on...

We've got a tremendous speaker line-up including John Caruthers, the head of the FBI's National Security Cyber Program at the San Diego field office, while on intelligence matters, we have RADM Andy...

View Article

DOD Using Chinese satellites underscores the need to negotiate a cyber...

On March 15, 2013 I wrote an article for Slate magazine ("The U.S. response to Chinese cyberespionage is going to backfire") wherein I said:The anti-China sentiment on the Hill, in the Pentagon, and at...

View Article


Image may be NSFW.
Clik here to view.

Boston or New York for the next Suits and Spooks?

We try to host a Suits and Spooks event in different cities (other than Washington DC which remains a constant). Our Boston attendance was quite good last year, however I've been asked several times if...

View Article

Image may be NSFW.
Clik here to view.

The Focus Areas of 26 Chinese State Key Labs for Information Technology Research

This image is a tag cloud representing the Information Technology focus areas of 26 Chinese State Key Labs. It represents a fraction of the data that we're mining for our Chimera network defense...

View Article


Image may be NSFW.
Clik here to view.

High Visibility, Low Cost Sponsorship Opportunity for Suits and Spooks La Jolla

Whether you"re coming to Suits and Spooks La Jolla or not, you can become a "Friend of Suits and Spooks" and have your name or your company's name listed on the inside cover of our program. The listing...

View Article

Image may be NSFW.
Clik here to view.

New 007-inspired logo design for Suits and Spooks

3 weeks before our 6th Suits and Spooks conference (to be held in La Jolla), I'm pleased and proud to unveil our brand new logo created by gifted artist Angela Felan. Angela also created our Chimera...

View Article


Critique of IP Commission's Cyber Security Recommendations

The National Bureau of Asian Research published (and assisted in writing) "The IP Commission Report: The report of the Commission on the theft of American intellectual property" (.pdf). The Commission...

View Article

Open letter to President Obama on the eve of his Summit with President Xi

Dear President Obama,I've spent the last five years working exclusively in the identification and cataloging of threat actors in cyberspace. I've participated in incident response investigations for...

View Article

Image may be NSFW.
Clik here to view.

IBM Acquires SoftLayer - Who cares that it serves a shit-ton of malware?

The SoftLayer - StopGeorgia.ru Network (Source - Inside Cyber Warfare, p.107)During the Russia-Georgia war in August, 2008, Russian hackers created a forum called StopGeorgia.ru to conduct recruitment,...

View Article
Browsing all 219 articles
Browse latest View live