Welcome!

Security through Intelligence

Adam Vincent

Subscribe to Adam Vincent: eMailAlertsEmail Alerts
Get Adam Vincent via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Adam Vincent

Twitter on Ulitzer Last night Twitter.com was hacked by a group purportedly titled the Iranian Cyber Army, at least that is what people think based on the fact that this group advertised they were responsible by displaying a redirected web page with an Iranian flag and text that takes credit, saying "This website has been hacked by the Iranian Cyber Army". This morning another website (mawjcamp.org), which appears to be a Iranian Reformist website based outside of Iran was also found to have been hacked. This event comes at a time when the United States Government is saying that cyberspace is the next frontier for "organized" military/terrorist organizations to attack US critical infrastructure. Most probably don't think that Twitter is critical, however this does represent a formidable day in the cyber war as although there have been other organized attacks to date,... (more)

What is a Threat Intelligence Platform

Last week, Anton Chuvakin from Gartner wrote a blog about what he is calling an Intelligence Management Platform. He includes some thoughts by Facebook on how they are building their own platform.  He alludes to non-public sources and I’m sure ThreatConnect™ is one, so rather than keep you all in suspense, I thought this would be an opportune time for ThreatConnect to say what we think a Threat Intelligence Platform is. Rick Holland from Forrester said recently at a SANS conference that the threat intelligence platform is like the quarterback of your operations. The threat intel... (more)

Combating Sophisticated Cyber Threats

I was part of a panel titled “Developing Security Strategies to Successfully Combat Sophisticated Threats to your Network, while Protecting Customer Privacy” at the TM Forum conference two weeks ago.  Given the topic, and the interesting conversation, I wanted to highlight some of the ideas expressed around sophisticated threats. Verizon’s Marc Spitler, and AT&T’s Brian Rexroad. Daniel O’Donnel from Network Critical and Ajay Uggirala from NetScout, and Martin Huddleston from United Kingdom (UK) Ministry of Defense (MoD) accompanied me on the panel. In essence, cyber-attack is big... (more)

Bloomberg Takes Interest in Cyber Squared

Bloomberg ran a Cyber Espionage piece called, “Hackers Linked To China’s Army Seen from EU to D.C” on July 26 that featured information derived from Cyber Squared’s Project Enlightenment.  In response to the article, Bloomberg TV’s “First Up” program hosted a live interview with me that aired in Asia and Europe on Tuesday, July 31st.   (Once the video is made available, we’ll post it on Cyber2 TV.) I thought the questions posed by the interviewer, Susan Li, were probably on top of everyone’s mind, so I’ll replay a few highlights from the interview here. What kind of scale is Cy... (more)

RSA 2013 – The Year of Threat Intelligence

The RSA conference this year was abuzz with talk of threat intelligence and its usage in detecting and protecting against more advanced threats. There was re-branding of existing products and the entrance of new products, all of which claimed to support some type of “intelligence” capability.  As I walked around it struck me that usage of the term was not consistent. We need to have a detailed understanding of what it means to use intelligence to secure our enterprise from cyber attacks, and maintain business operations in the face of sophisticated threats. Defining Threat Inte... (more)