Conferences

Dell Embracing Security and IoT as Private Firm – PC is ‘Strategic’

A year ago, Michael Dell spent $25 billion to buy the PC company he founded back from shareholders and turn it into what he called “the world’s largest start-up.” How’s that going for him? If the CEOs’ talk at last week’s DellWorld 2014 is any indication: great.  As this piece notes, Dell argues that going private has accomplished much more than getting Carl Icahn off his back. It has allowed the tech giant to draw its attention away from profit margins into R&D. No longer burdened by the need to meet Wall Street’s numbers each and every quarter, Dell can experiment and take chances. Experiment how and on what? Dell said that Internet of Things and security are two areas the company is investing in in a big way. “As we look at our business we can now ask what are the opportunities and the unmet challenges. These are in infrastructure, […]

FBI Seizes Dozens of Online ‘Dark Markets’

The news yesterday was that the FBI arrested a 26 year-old San Francisco man responsible for operating Silk Road 2.0 – an anonymous, online marketplace for illicit goods. The news on Friday is that Silk Road was just the tip of the iceberg. On Friday, the FBI and announced that it has seized dozens of other so-called “dark market” websites offering a range of illegal goods and services for sale on the “Tor” network. The coordinated take downs are the “largest law enforcement action to date against criminal websites operating on the ‘Tor’ network,” the FBI said in a statement. “We shut down the original Silk Road website and now we have shut down its replacement, as well as multiple other ‘dark market’ sites allegedly offering all manner of illicit goods and services, from firearms to computer hacking,” said  Manhattan U.S. Attorney Preet Bharara The take-downs were part of a coordinated law enforcement action […]

Supply Chain Risk Escapes Notice At Many Firms

Online attacks that come by way of suppliers and other third party business partners are one of the biggest threats that modern organizations face. But too few firms are giving supply chain security the attention it deserves, a panel of legal and information security experts told attendees at a cyber security forum in Boston on Wednesday. Companies need to protect their exposure through third parties better, according to the panel: beefing up auditing of internal- and partner assets and including contractual protections that will indemnify them in the event that a breach at a supplier or business partner exposes data that materially affects their firm. The panel, “Fortifying the Supply Chain,” was part of a day long event at The Federal Reserve in Boston and sponsored by the Advanced Cyber Security Center, a technology industry consortium. It brought together top legal and information security experts, including FireEye researcher Alex Lanstein and Jim Halpert, the […]

The Security of Things: Video Available

We held our first ever security and Internet of Things event back in May. The Security of Things Forum took place in Cambridge, MA (“Our Fair City”) on May 7 and brought together about 100 thought leaders and entrepreneurs for a day of discussion and debate about how best to prepare for the explosion of connected devices in the enterprise, the home, the public sector and public spaces. Since then we’ve made a couple of these sessions public: the keynote presentation by In-Q-Tel CISO Dan Geer, and a panel on enterprise risk and IoT, chaired by INEX Advisors’ founder Chris Rezendes. Attendees have had access to all the sessions, as well. But now we’re throwing the doors open to the public and making all the conference sessions available to the public, as well as some 1:1 interviews with our speakers. We invite you all to head on over and check […]

Dusting For Malware’s Bloody Prints

Malicious software is nothing new. Computer viruses and worms have been around for decades, as have most other families of malware like remote access tools (RATs) and key loggers. But all our experience with malware hasn’t made the job of knowing when our organization has been hit by it any easier. In fact, recent news stories about breaches at Home Depot, Target, Staples and other organizations makes it clear that even sophisticated and wealthy corporations can easily overlook both the initial compromise and endemic malware infections – and at great cost. That may be why phrases like “dwell time” or “time to discovery” seem to pop up again and again in discussions of breach response. There’s no longer any shame in getting “popped.” The shame is in not knowing that it happened. Greg Hoglund says he has a fix for that latter problem. His new company, Outlier Security, isn’t “next generation […]