Blog Posts Tagged with "Jeff Bardin"

0ff0a77035f9569943049ed3e980bb0d

On Hacking Humans at the RSA Conference

March 06, 2012 Added by:

RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...

Comments  (2)

0ff0a77035f9569943049ed3e980bb0d

Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence

January 30, 2012 Added by:

Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Roadmap to Exploitation: The OIG Imperative to Publish or Perish

January 23, 2012 Added by:

The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?

Comments  (9)

0ff0a77035f9569943049ed3e980bb0d

The Proliferation of Cyber Janitors

January 20, 2012 Added by:

What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Experts Warn Against Developing Cyber Weapons

January 04, 2012 Added by:Headlines

“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation. It ups the ante to a new level that may not be sustainable, especially when -- not if -- the code for the 'good' virus gets out...."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivist "The Jester" Draws Crowd at Hacker Halted

October 31, 2011 Added by:Headlines

The Jester had alluded to the fact that he may have actually been physically present at the conference by apparently hiding an encrypted message in one of the conference rooms, tweeting "left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what's there"...

Comments  (0)