From the Summer 2021 Issue

So, You Want to be a Threat Hunter?


Ray Espinoza, CISO, Cobalt

Threat Hunter

The general goal of threat hunting is to actively identify attackers who have made it past an organization’s cyber-defenses so those infiltrators can be halted before significant damage is done. You can think of threat hunters almost like detectives, on a race against time to catch cybercriminals as quickly as possible. As you can imagine, … Read more

From the Winter 2021 Issue

Threat Intelligence-Led Cybersecurity


Brian Contos, VP & CISO, Mandiant Security Validation , Mandiant

Threat Intelligence

Successfully predicting, preventing, detecting, responding, and recovering from cyber-attacks requires you to have in-depth knowledge of the attacker, their tactics, and their techniques. While most organizations operate with some level of threat intel, some still haven’t embraced automation as a way to operationalize intel for the validation of TTPs and IOCs against their security tools, … Read more

From the Fall 2020 Issue

Ransomware Data Leaks Timeline


David Balaban, Editor, Privacy PC


The cyber-extortion plague involving file-encrypting ransomware has hit some major roadblocks since it went pro in 2013. It survived a series of successful law enforcement operations, a sharp turn toward the enterprise as the primary target, and the cryptojacking boom that eclipsed ransomware in terms of potential profits. Having gone through a lot of trial … Read more

Threat Intelligence Basics to Prevent Cyberattacks


Zoe King, ,

threat intelligence concept, lock over laptop, data leak

Cybersecurity threats doubled due to the COVID-19 lockdown, with hackers targeting home-based businesses that have weaker security as a result of new security measures. With that in mind, protecting your organization from such attacks is essential. One effective way to do this is through the use of cyber threat intelligence. This is a crucial element in cybersecurity … Read more

App Access: Life Invasion


Josh Henry, ,

Guy in front off computer with app access

Life Invasion: Your Privacy A problem that has been occurring for years is finally generating concern. 77% of Americans own smart phones. Majority of those people make the mistake of allowing apps such as Facebook to gain access to their camera roll. It all seems innocent until your private photos start trending and get into … Read more

Facebook Terrorist Propaganda


Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

thumbs down facebook darknet terrorism terrorist propaganda

Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…

From the Summer 2015 Issue

A-ISAC Cooperating to Protect Our Skies


Faye Francy, Executive Director, Aviation Information Sharing and Analysis Center

The aviation sector plays such a critical role in the world economy that it has become an attractive target for a variety of malign actor groups. Each year, the air transportation system carries over 2.6 billion passengers and 48 million tons of freight, making it the world’s greatest source of international trade, tourism, and economic … Read more

From the Summer 2015 Issue

The Next Big Data Breach: Don’t Let It Be You!


Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Protection of information and data has always been one of the top priorities for organizations, governments, and businesses. For example, small restaurants have their “secret recipes” that set them apart from their competition. Larger organizations like Coca-Cola guard their product formulae and protect them like the Crown Jewels of England. On the government side, the … Read more

From the Summer 2015 Issue

Exploring Behavioral and Neuroscience Approaches to Cybersecurity: A Study of Phishing


Eric Reeves, Senior Manager, Lockheed Martin

The behavioral factors that contribute to users falling victim to phishing attacks include a lack of understanding of how computer systems work, lack of attention, and phishers’ increasingly sophisticated methods of visual deception.  Attacks on our computer systems continue to increase in frequency and sophistication. Organizations invest significant resources in the development of cyber protection … Read more