Welcome!

Security through Intelligence

Adam Vincent

Subscribe to Adam Vincent: eMailAlertsEmail Alerts
Get Adam Vincent via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Adam Vincent

Twitter on Ulitzer Last night Twitter.com was hacked by a group purportedly titled the Iranian Cyber Army, at least that is what people think based on the fact that this group advertised they were responsible by displaying a redirected web page with an Iranian flag and text that takes credit, saying "This website has been hacked by the Iranian Cyber Army". This morning another website (mawjcamp.org), which appears to be a Iranian Reformist website based outside of Iran was also found to have been hacked. This event comes at a time when the United States Government is saying that cyberspace is the next frontier for "organized" military/terrorist organizations to attack US critical infrastructure. Most probably don't think that Twitter is critical, however this does represent a formidable day in the cyber war as although there have been other organized attacks to date,... (more)

Creating Robust Net-Centric Services through Policy

Next Tuesday at TMForum Management World Americas conference in Orlando, I'll be presenting along with Sriram Chakrapani, (Chief, Integration Engineering Division, DISA) a presentation titled Policy Enabled Net-Centric Information Sharing. Due to this, and a whitepaper I'm putting the final touches on titled "Robust Net-Centric Services", I thought it would be an opportune time to write a post discussing the value of policy in defining robust net-centric services. As integration frameworks, Web Services and Restful applications adequately address how applications get exposed and ... (more)

Threat Intelligence Platform Just a Tool? By @AdamDVincent | @CloudExpo [#Cloud]

Is Your Threat Intelligence Platform Just a Tool? “If the only tool you have is a hammer, you tend to see every problem as a nail.” Abraham Maslow Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary technologies like email, spreadsheets, a SharePoint portal, or a ticketing system. These techniques, although better than nothing, do not scale as the team g... (more)

Context (& Quality) Is King with Threat Intelligence By @AdamDVincent [#Cloud]

Recently, Forrester analyst Rick Holland brought up the point of quality vs. quantity when it comes to threat indicators. We agree, the focus should never be on the quantity of data, it should be on the quality of data. So the question becomes, where and how can you gather or make sense of this quality threat intelligence? As an industry, we need to work together to understand threat data better. Everyone needs quality data to make decisions. Just like marketing departments need quality data to determine who to market (and sell) to; the SOC, IR, threat, and network defense team... (more)

Combating Sophisticated Cyber Threats

I was part of a panel titled “Developing Security Strategies to Successfully Combat Sophisticated Threats to your Network, while Protecting Customer Privacy” at the TM Forum conference two weeks ago.  Given the topic, and the interesting conversation, I wanted to highlight some of the ideas expressed around sophisticated threats. Verizon’s Marc Spitler, and AT&T’s Brian Rexroad. Daniel O’Donnel from Network Critical and Ajay Uggirala from NetScout, and Martin Huddleston from United Kingdom (UK) Ministry of Defense (MoD) accompanied me on the panel. In essence, cyber-attack is big... (more)