Blog Posts Tagged with "Jeff Bardin"
RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...
Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...
The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?
What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...
January 04, 2012 Added by:Headlines
“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation. It ups the ante to a new level that may not be sustainable, especially when -- not if -- the code for the 'good' virus gets out...."
October 31, 2011 Added by:Headlines
The Jester had alluded to the fact that he may have actually been physically present at the conference by apparently hiding an encrypted message in one of the conference rooms, tweeting "left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what's there"...
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015