Cybersecurity- Insiders

Battling the Botnet Armies

Marie Hattar  wrote an interesting post about Battling the Botnet Armies that I would like to share. "Botnet armies have become bigger, more active and more...
Cybersecurity- Insiders

Dyre Authors Apparently Working on New Banking Trojan

Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share. "At least one of the...
Cybersecurity- Insiders

Researchers Build Configuration Extractor for Locky Ransomware

Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share. "Researchers from Cisco Talos have created a new tool...
Cybersecurity- Insiders

Breaking the OODA Loop!

Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share. "The OODA loop is a well established concept often...
Cybersecurity- Insiders

A Spell Check Equivalent for Building Security In

Jim Ivers  wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share. "I can honestly say that spell...
Cybersecurity- Insiders

Want Better Security? Be a Pragmatist.

Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share. "I’ve always considered myself a pragmatist.  Perhaps not...
Cybersecurity- Insiders

Using Apache Hadoop to Meet Cybersecurity Challenges

Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share. "Apache Hadoop turned 10 this year. What...
Cybersecurity- Insiders

Malware Increasingly Abusing WMI for Evasion

Ionut Arghire  wrote an interesting post about Malware Increasingly Abusing WMI for Evasion that I would like to share. "Malware is increasingly using Windows Management Instrumentation...
Cybersecurity- Insiders

How to Make Threat Intelligence Practical for Your Organization

Adam Meyer wrote an interesting post about How to Make Threat Intelligence Practical for Your Organization that I would like to share. "f there is a...
Cybersecurity- Insiders

The Cyber Risk of Mixing Business with Pleasure

 Alastair Paterson wrote an interesting post aboutThe Cyber Risk of Mixing Business with Pleasure that I would like to share. "Technical and Process Controls for the...