The Security Startup Speed Lunch: Something to Chew On
In the course of running Suits and Spooks, I've had numerous requests from executives of various-sized companies regarding whether I've seen any exciting new security startups that look promising. I do...
View ArticleCan You Spot The Fake SWIFT Transaction Document?
We've been working our way through almost 1GB of documents that were part of the Russian Industrial Investment Fund leak last month by Russian Cyber Command (@Rucyborg on Twitter). Most of the...
View ArticleDan Geer's Nightmare Scenario: An Interent Killer That Can't Be Fixed
Dan Geer is a friend and mentor whose writings have continually inspired my work in the area of data-driven security (versus network-driven security) since 2009. He has recently shared with me his...
View ArticleWhat's the SIGINT value of your hotel to GCHQ and other FIS?
A "007" hotel - Couples Sans Souci hotel (Ocho Rios)Taia Global's first service offering from 2010-2012 was executive cyber security protective services for corporate VPs and C-types who traveled...
View ArticleChina's Cyber Security Strategy with the EU is an opportunity for the U.S.
China has released a policy paper on how it intends to work together with the EU in a number of ways for mutually beneficial interests; including in the area of cyber security:Strengthen cybersecurity...
View ArticleCyber Security's Mass Delusion Effect
Cyber Security's mass delusion effect says that we can protect our data and critical infrastructure from attack as long as we buy the right product, spend the right amount of money, hire the right...
View Article6 Minutes That Can Change Your Security Start-up's Life
On May 19th the Suits and Spooks Security Start-up Speed Lunch will give each founder of up to 20 cyber security start-ups an opportunity to spend 6 minutes with Dan Geer, the CISO of In-Q-Tel, 6...
View ArticleSupport the Wounded Warriors Project and Play Some Golf
SecurityWeek has organized a pretty cool event - the 2014 SecurityWeek Golf Classic. It'll be held at the world-class Ocean Course on Half Moon Bay and it will feature an auction whose proceeds will...
View ArticleCall For Papers: New York Suits and Spooks Jun 20-21, 2014
Dream Downtown Hotel Meatpacking District NYCSuits and Spooks New York is coming up in two months and you now have an opportunity to submit a proposal for a talk or a panel. Talks should be...
View ArticleAccelerate Your Startup's Trajectory or Find Your Next M&A in Cyber Security
Hopefully you've heard the good news that Wired Business Media (SecurityWeek.com) has acquired Suits and Spooks. I will still be involved in curating the events, and one of the innovations that I...
View ArticleNew York Suits and Spooks: The High Stakes of Securing Financial, Industrial,...
The first SecurityWeek-branded Suits and Spooks event will happen in New York City on June 20-21. We have a packed agenda of cutting-edge topics presented by speakers who have direct experience in...
View ArticleAnalysis of the Victim Companies in the PLA Indictment
Newly appointed U.S. Attorney David Hickton convinced a Western Pennsylvania grand jury that "five officers in Unit 61398 of the Third Department of the Peoples Liberation Army hacked or attempted to...
View ArticleThe Comment Crew/APT1 Genealogy Project. Your Help Is Requested.
This is an open request for assistance in a project that I've taken on. The threat actor known as Comment Crew (aka Comment Panda, APT1, Soy Sauce, B... C..., ShadyRat, WebC2, GIF89a, and who knows how...
View ArticleSecurity Startup Founders: Take This Lunch Meeting in Washington DC with Andy...
On July 22 in an exclusive Washington DC restaurant, about 50 people will meet 1:1 with the former Dir. of Capabilities Tailored Access Operations (NSA), the CSO of Huawei USA, a Director/GM from...
View ArticleInternational Investigation Conducted Jointly By FBI And China's MPS Results...
One well-known definition of insanity is to repeat the same action and expect a different result. The Administration's repeated attempts to force China to slow or stop its cyber espionage activities...
View ArticleFormer Classified Presidential Directive to anticipate foreign cyber and tech...
On January 9, 2008, President Bush signed National Security Presidential Directive (NSPD) 54 / Homeland Security Presidential Directive (HSPD) 23 which back then was classified TOP SECRET. That...
View ArticleCrowdstrike, PLA 61486, and the Secret Hacker Language that wasn't.
According to George Kurtz's introduction to Crowdstrike's Putter Panda report, his company has revealed the activities of PLA unit 61486, the identity of one of its employees' Chen Ping aka cpyy, and...
View ArticleCrowdstrike's PLA 61486 Report - Using Photoshopped Pictures? No. (Updated...
This post has been updated from the original thanks to some criticism that I received on Twitter for suggesting that Chen's photos were either photoshopped by Chen or taken from somewhere other than...
View ArticleHank Crumpton on Wolfowitz: "What was he smoking?"
I read Hank Crumpton's book "The Art of Intelligence: Lessons from a Life in the CIA's Clandestine Service" in about six hours spread over two flights between NY and Seattle. It's a great book which I...
View ArticleHave Lunch on K Street with Execs from Microsoft, BAE, Cognizant, Huawei USA,...
If you're a cyber security startup, chances are good that you may have a product or service of interest to the U.S. government but do you know the complexities that come with that? If you attend our...
View Article