POS Malware and Other Hacks Plague the Hospitality Industry

The days of making “analog accommodations” at hotels — filling out a reservation slip, taking ownership of a door key and having only a telephone handset to communicate with the outside world— are long over. Today’s hotels are rife with digital trapdoors, metaphorical sinkholes that have the capacity to compromise your personal information and identity.…

Cybersecurity takes center stage in US Presidential Debate

In the first US Presidential debate, held on the evening of September 27, 2016, one of three topics on the agenda for the candidates was “Securing America.” Debate moderator Lester Holt lead off this portion of the program with the following: “We want to start with a 21st century war happening every day in this…

The Realm of Threat Intelligence – Journey from the past into an Advanced SOC

Using Intelligence to gather information on your adversary is not a new concept, Military and Government Agencies have been involved gathering information to use against their opponents since the days of Sun-Tzu and Chanakya. Cyber Intelligence has also been the domain for Government agencies like the UK’s GCHQ and the US’s NSA for many years;…

The Era of Proportional Ransomware Has Arrived

According to the FBI the incursion of ransomware has just gone from bad to worse. In a recent alert, the U.S. Federal Bureau of Investigation (FBI) warned that recent ransomware variants have targeted and compromised vulnerable business servers to identify and target hosts, thereby multiplying the number of potential infected servers and devices on a network. More…

Planning for a Breach Crisis

If your company doesn’t have a crisis communication function and doesn’t have a breach readiness plan, in the event of a public security incident it’s highly likely the marketing department will be the one everyone looks at when the CEO says ‘now what do we do?’ How do we manage the media? What do we tell customers,…

The Realm of Threat Intelligence – The Logs are dead; long live the Logs!

In the previous blog post we looked at Network Packets (PCAP’s) and how they can be utilized within a SOC environment. In this post we will build on this and take a look at Logs (which most of the security sales staff will now tell you that it is going to solve all your security…

Faster Threat Detection through Shared Intelligence: RSA NetWitness Endpoint Now Supports RSA Live Connect

In a previous life, I remember spending time at a company’s co-location facility where many organizations hosted their production and testing environments.  There was a shared workspace, and I remember having quite a few conversations with industry peers about various topics.  Not surprisingly, the one topic that came up more frequently than others was security…

The Gap of Grief

How bad is it? When a security incident occurs, how confident are you that you can explain the impact to the rest of the organization in language that they understand? Despite all the money we have invested in security, it’s still too difficult to put security details in business context fast enough. When you can’t,…

The Realm of Threat Intelligence – It’s all about the Packets, or is it?

Full Packet Capture (FPC), those three little words are enough to make most security analyst salivate at the prospect of finding and detecting attacks. Back in the days before anyone realized that you could build an Intrusion Prevention System to actually stop attacks, the Intrusion Detection System was king. If you were very lucky you…

Credential Checking Services Soar in Popularity on Dark Web

If you’ve ever needed another reason to not recycle your passwords, I give you Sentry MBA. Although the tool has been around for a couple of years, it has recently been soaring in popularity among those in the fraud community which is no surprise with more than 1.5 billion consumer credentials breached so far this year. The…