Cybersecurity New Year’s Resolutions from the Information Security Forum

It’s that time of year again. Time for every one of us to reminisce on the past year and make resolutions for how we can do better in the year ahead–particularly in the area of cybersecurity. Right up to the end of the year, massive cyber-a… Continue reading Cybersecurity New Year’s Resolutions from the Information Security Forum

Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a cyber response?… Continue reading Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a cyber response?… Continue reading Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle to ke… Continue reading Using Machine Learning to Reduce False Positives

Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

…and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of Threat Intelligence at Cylance, to talk about some interesting research and tr… Continue reading Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Hackathon Uses Machine Learning to Improve Cybersecurity

Machine learning (ML) and artificial intelligence (AI) are hot technologies with significant promise for shaping the future, but it isn’t enough to understand ML or AI theory. Sure, you can gain a lot of knowledge and information from reading and… Continue reading Hackathon Uses Machine Learning to Improve Cybersecurity

6 Best Computer Forensic Analysis Tools

Computer forensics is of much relevance in today’s world. Though forensic analysis refers to searching and analyzing information to aid the process of finding evidence for a trial, computer forensic analysis is specially focussed on detecting mal… Continue reading 6 Best Computer Forensic Analysis Tools

Cylance Report Reveals Malware and Tactics of OceanLotus Group and Weakness of Traditional AV

Exploits and attackers come in various forms. Just like crime in real life, there are vandals and people just trying to wreak havoc, there are petty thieves and lone wolf criminals, and there is organized crime—crime families that make a career o… Continue reading Cylance Report Reveals Malware and Tactics of OceanLotus Group and Weakness of Traditional AV

Inner Circle Podcast: Episode 005 – Chad Skipper Talks about Anti-Malware Testing

Chad Skipper, VP of Competitive Intelligence and Product Testing at Cylance, is my guest for this episode of the Inner Circle podcast. We talk about the importance of anti-malware testing, and how and why you should do the testing yourself. Does your a… Continue reading Inner Circle Podcast: Episode 005 – Chad Skipper Talks about Anti-Malware Testing