Asynchronous Warfare, Part 4: OODA-Loop 2.0 and the Four Golden Rules
Dr. Bjoern Dennis Prange | | Andy Norton, Blog, Cyber compliance, Dr. Dennis Prange, OODA Loop, Sophisticated cybersecurity technology
By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 4 of a 4-part series on Asynchronous Warfare. In part 1 of this blog series, we described the roots ...
Network Security Challenges Create a Commercial Imperative for AI
Giovanni Vigna | | AI-powered security tool, Blog, Giovanni Vigna, Network perimeter, network traffic analysis, Rule-based intrusion detection, signature-based detection
It won’t come as a surprise when I say that digital security has changed over the past few years. Remember when digital security used to be all about signature-based detection? It doesn’t ...
Information Security Professionals – Today’s Unsung Heroes
Security teams work tirelessly every day to protect us from some very skilled cybercriminals. They face a very accomplished and persistent enemy that is bent on stealing our money, personal information, and ...
I don’t like dogs; I need a dog.
John DiLullo | | Blog, Detect lateral movement, IoT vulnerabilities, John DiLullo, Least hospitable target, perimeter security, polymorphic malware, signature-based detection, social engineering, spear-phishing
This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will Rogers summed it up best. He said, “If there are no dogs ...
Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare
Dr. Bjoern Dennis Prange | | Asynchronous warfare, Blog, Cyberwarfare center of gravity, digital infrastructure, Social disinformation, Social Media Subversion
By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 3 of a 4-part series on Asynchronous Warfare. In part 1 of this blog series, we described the roots ...
Five High-Profile Watering Hole Attacks Highlight Importance of Network Security
Andy Norton | | Blog, Digital criminal, Havex RAT, ICS/SCADA systems, LuckyMouse group, phishing emails, sophisticated malware
Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is watering hole attacks. The name is derived from how predatory animals tend ...
My Best Hires had 30% of “The Wrong Stuff”
For companies large and small, employees are the driving force behind every success. As managers, it should come as no surprise that who we select for our critical roles and assignments are ...
Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security
It’s possible: Smart lighting could be the most dangerous element in your company’s network. By 2025, there will be 75 million IoT devices in use. Smart devices are now found throughout most ...
Asynchronous Warfare, Part 2: Strategy and Phases
Dr. Bjoern Dennis Prange | | Andy Norton, Asymmetric warfare, Asynchronous warfare, Blog, Dr. Dennis Prange, OODA Loop, Operational military strategy, Political Trust, Tactical military strategy
By Dr. Dennis Prange, edited by Andy Norton NOTE: This is part 2 of a 4-part series on Asynchronous Warfare. Please watch for other segments over the next several weeks. In part ...
Paranoia Reigns Among Security Pros
John DiLullo | | Blog, Cybersecurity threat to U.S., John DiLullo, Public Wi-Fi networks, RSA Security Conference, Survey of security professionals
Technology, machines, software, UFOs, spontaneous combustion, and crop circles don’t scare me. I’m an engineer, a code writer, a builder, a closeted mathematician and part-Vulcan some might say. I’m also someone who’s ...