Is Your Threat Intelligence Platform Just a Tool?
“If the only tool you have is a hammer, you tend to see every problem as a
nail.” Abraham Maslow
Throughout the enterprise there are security personnel using a variety of
processes and tools to conduct their incident response, network defense, and
threat and risk analysis. Security team efforts haven’t been integrated, or
if they are integrated, it is only through rudimentary technologies like
email, spreadsheets, a SharePoint portal, or a ticketing system. These
techniques, although better than nothing, do not scale as the team grows and
the number of malicious events and security processes increases. We saw this
same problem with other parts of the business, and platforms were created to
support them in their quest for automation, collaboration across use-cases,
and better management processes. For example, People... (more)
Twitter on Ulitzer
Last night Twitter.com was hacked by a group purportedly titled the Iranian
Cyber Army, at least that is what people think based on the fact that this
group advertised they were responsible by displaying a redirected web page
with an Iranian flag and text that takes credit, saying "This website has
been hacked by the Iranian Cyber Army". This morning another website
(mawjcamp.org), which appears to be a Iranian Reformist website based outside
of Iran was also found to have been hacked.
This event comes at a time when the United States Government is saying that ... (more)
I was part of a panel titled “Developing Security Strategies to
Successfully Combat Sophisticated Threats to your Network, while Protecting
Customer Privacy” at the TM Forum conference two weeks ago. Given the
topic, and the interesting conversation, I wanted to highlight some of the
ideas expressed around sophisticated threats.
Verizon’s Marc Spitler, and AT&T’s Brian Rexroad. Daniel O’Donnel from
Network Critical and Ajay Uggirala from NetScout, and Martin Huddleston from
United Kingdom (UK) Ministry of Defense (MoD) accompanied me on the panel.
In essence, cyber-attack is big... (more)
August 6, 2014
By: Joseph Marks
With help from David Perera, Tal Kopan and Shaun Waterman
MORE THAN 1 BILLION PASSWORDS STOLEN BY RUSSIAN HACKER GANG — Last
night’s New York Times scoop that a gang of criminal hackers deep in the
Russian hinterlands had amassed more than 1 billion usernames and passwords
linked to half-a-billion email addresses demonstrates both that the Web is
increasingly dangerous for consumers and that Russia remains a safe zone for
hacking networks, analysts told MC. “The untouchables of the internet have
developed a robust hacker economy of scale in Russia... (more)
Recently, Forrester analyst Rick Holland brought up the point of quality vs.
quantity when it comes to threat indicators. We agree, the focus should never
be on the quantity of data, it should be on the quality of data. So the
question becomes, where and how can you gather or make sense of this quality
As an industry, we need to work together to understand threat data better.
Everyone needs quality data to make decisions. Just like marketing
departments need quality data to determine who to market (and sell) to; the
SOC, IR, threat, and network defense team... (more)