Tag: Policy

Security Ledger Live: Interview with Lance James of Flashpoint

In-brief: in our inaugural Security Ledger Live, we speak with Lance James, the Chief Scientist at the firm Flashpoint about ransomware, the care and feeding of security talent and the news of the week. 

Cyber Attribution: What is It good for? | TrendLabs

In-brief: The folks at Trend Labs take apart the recent EyePyramid malware attacks on high profile targets in Italy to talk about the risk of doing cyber attribution badly, and whether its even worth while.

Republican bill aims to bolster U.S. attack attribution capabilities

The problems that surround cyber attribution came into sharp relief in recent weeks, as the Department of Homeland Security and FBI attempted to pin attribution for the hacking of Democratic party organizations on hackers affiliated with the government of Russia, with only mixed success. Attribution was again an issue after The Washington Post -citing the DHS and FBI report- said Russians had hacked their way into the U.S. electrical grid by way of a Vermont utility. That report was eventually walked back as more evidence emerged about the incident.  Pointing the finger of blame – it turns out – is easier said than done in matters of cyber espionage and cyber war. Now the folks over at Cyberscoop point to a new bill designed to boost the government’s ability to do cyber attribution and foster government-industry ties. New cybersecurity legislation aims to bolster the U.S. government’s attribution capabilities as well […]

Six Cyber-Physical Attacks the World Could Live Without

In-brief: cyber attacks that affect physical systems are still a small minority of all incidents. But they’re becoming more common. What are some of the attacks we’ve seen to date and what do they tell us about what’s to come? Check out this slide show for an answer to those questions. 

Podcast: Can We Make CES Secure Again?

In-brief: With CES going on in Las Vegas, The Security Ledger sat down with three experts from the firm Senrio to talk about the new generation of connected consumer electronics. How vulnerable are they to attack? What is the best way to address security and privacy concerns in them?