Ambient Cloud News: Skype protocol has been reverse engineered
This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...
View ArticleThe State of Cloud and Virtualization Security
For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to...
View ArticleWhat Are the True Dangers of the Cloud?
We often hear that security and privacy concerns are the main inhibitors to cloud adoption. But what are the true threats? Is the cloud really more dangerous than your on-site data center? I would...
View ArticleDo You Encrypt Your Data? A Plea to Businesses from an Identity Theft Victim
Recently I became a victim of identity theft. Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number. I’ve spent the last...
View ArticleHow to Thwart the Digital Insider: an Advanced Persistent Response to...
One of the oft-repeated themes in media reporting of cyber security events is that the “threat landscape is constantly evolving,” that attacks are becoming increasingly sophisticated and targeted and...
View ArticleTweetChat: Advanced Persistent Threats
Ready to join the conversation? We’re hosting a LIVE TweetChat on October 9, 2012, at 9am PDT, to discuss Advanced Persistent Threats, the development of these sophisticated attacks, and how companies...
View ArticleOperation Ghostclick: Cracking down on Cyber Criminals
Rove Digital was a company formed by a criminal organization in Estonia with two business models: one to portray itself as a legitimate business on the surface, but the second and main purpose was to...
View ArticleChanging Seasons in Security bring APTs to Forefront
Birds are beginning to leave their nests and fly south as winter slowly encroaches. The migration of our feathered friends ushers in the new season. As the seasons change so to have the targeted...
View ArticleThe Knight Fork: Defining Cyber Defense in 2013
“A knight’s fork: an attack by one chess piece (as a knight) on two pieces simultaneously.” - Merriam-Webster Dictionary When was the last time you played chess? If you are responsible for...
View ArticleSpear Phishing and Advanced Targeted Attacks
As the saying goes, everything old is new again. Spear phishing may be a timeworn technique, but it continues to be effective even in today’s Web 2.0 landscape. In modern hacking, the practice is...
View Article
More Pages to Explore .....