Sources and Methods to the Madness

The term “sources and methods” brings passionate, sometimes pained reactions within the information security community. On the one hand, there are those engaged in traditional intelligence operations for whom “sources and methods” are vital resources, to be maintained and preserved at almost any cost to ensure continuous collection. Contrary to Read more

Nations, Nationalism, and Network Security

Rather significant news broke out on 13 June with the EU taking initial steps toward a potential ban on Kaspersky software on EU-controlled networks. The specific language used, as translated by The Register: Calls on the EU to perform a comprehensive review of software, IT and communications equipment and infrastructure Read more

Indicators and ICS Network Defense

A previous post on indicators and network defense generated quite a bit of attention, as well as some requests for follow-up items. One item in particular was very interesting to me: comparing an actionable, effective threat intelligence report not relying on indicators with a “bad” example. I think this idea Read more

The Disappearing IT-IoT Divide

Note: This originally appeared as part of ISACA GWDC’s IoT Security Conference in April, 2018. Original link to content here. Executive Summary Nominally IT-focused threats such as the recent series of wormable, disruptive malware variants from WannaCry through OlympicDestroyer will increasingly impact Internet-of-Things environments. The combination of rapid, automated propagation Read more

Indicators and Network Defense

When I led incident response operations at Los Alamos National Laboratory, we subscribed to several ‘threat intelligence’ feeds: big commercial providers, secret-squirrel (theoretically) government only information, and other miscellaneous items. Almost without exception, if the feed did not provide reports that detailed how an attack or intrusion took place and Read more

Cyber Nationalism in the Age of Commercial Defense

Patrick Howell O’Neill and Chris Bing recently dropped a very interesting report on yet another possible action against Kaspersky by the US government. In this specific case, possible sanctions are oriented around larger actions against Russia, home of Kaspersky, but stands as yet another public blow to the security company Read more

The Art and Science of Threat Profiling

This year I facilitated a discussion – formally, a ‘Peer-to-Peer Session’ – at RSA focused on threat profiling. The concept of ‘threat profiling’ is usually new to infosec practitioners, who are typically used to ‘threat intelligence’, ‘risk management’, and similar terms. Threat profiling as a concept and practice refers to Read more