STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) is a language for describing cyber threat information so that it can be analyzed and/or exchanged. STIX makes it possible to explicitly characterize a cyber adversary’s motivations, capabilities, and activities, and in doing so, determine how to best defend against them. TAXII (Trusted Automated Exchange of Indicator Information) defines … More Continue reading STIX and TAXII: Sharing cyber threat intelligence

InfoArmor: Actionable intelligence, comprehensive protection

The complex and evolving landscape of cybercrime introduces your business to new threats on a daily basis. Protecting your corporate assets against cyber attacks requires a combination of sophisticated technology, accurate threat intelligence data and expert strategy. In this podcast recorded at Black Hat USA 2017, Mike Kirschner, Senior Vice President of Advanced Threat Intelligence at InfoArmor, talks about how they offer operatively-sourced threat intelligence, specialized cyber security services and real-time, client-specific alerts to protect … More Continue reading InfoArmor: Actionable intelligence, comprehensive protection

Understanding your responsibility and security in the cloud

In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud. Here’s a transcript of the podcast for your convenience. I’m Christ Drake, founder and CEO of Armor. We are a cloud cybersecurity services company and I wanted to talk today about the things that I’m seeing in the industry and around public cloud, and some of the … More Continue reading Understanding your responsibility and security in the cloud

Automating the hunt for cyber attackers

In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of artificial intelligence to perform non-stop, automated threat hunting with always-learning behavioral models to find hidden and unknown attackers before they do damage. Here’s a transcript of the podcast for your convenience. Hi, this is Mike Banic with Vectra Networks, and I’m here with Chris Morales, Head … More Continue reading Automating the hunt for cyber attackers

Qualys CISO on making everything visibile and secure

In this podcast recorded at Black Hat USA 2017, Mark Butler, CISO at Qualys, talks about his role, streamlining security and compliance solutions, building security into digital transformation initiatives, end-to-end IT security, keeping your teams in sync, and compliance for all your assets. Here’s a transcript of the podcast for your convenience. Hi, my name is Mark Butler, I’m the Chief Information Security Officer at Qualys, and I want to tell you a little bit … More Continue reading Qualys CISO on making everything visibile and secure

Black Hat USA 2017 Recap

Missed Black Hat USA 2017? Here’s a little recap of the event and the Malwarebytes booth.
Categories:
Conferences
Security world
Tags: AIblack hatBlack Hat USABlack Hat USA 2017Endpoint ProtectionIncident Responsemachine learning

(Read more…)

Th… Continue reading Black Hat USA 2017 Recap

McAfee aims to strengthen human-machine defense teams

“Today’s security teams are facing 244 new cyber threats every minute, amid a serious talent shortage. Siloed security, without automation, managed by overwhelmed teams is not a sustainable defense strategy,” said Raja Patel, Vice President and General Manager, Corporate Security Products, McAfee. The newly released McAfee Advanced Threat Defense v4.0 software introduces an innovative deep learning technique to enhance detection and expands advanced analysis capabilities within email attachments, resulting in more comprehensive protection across the … More Continue reading McAfee aims to strengthen human-machine defense teams

Hackable smart car wash systems can hurt people

Two years after researchers Billi Rios and Terry McCorkle first flagged serious vulnerabilities in automatic, smart car wash systems by US manufacturer PDQ, the company is finally acknowledging the danger. What changed since the initial discovery? Rios, founder of Whitescope, and researcher Jonathan Butts, founder of QED Secure Solutions, have managed to finally prove that the vulnerabilities can be exploited in a live setting (in their case, a car wash facility in Washington), and that … More Continue reading Hackable smart car wash systems can hurt people

Lippizan: Sophisticated, targeted spyware on Google Play

Google has discovered targeted spyware on Google Play that is likely the work of Equus Technologies, an Israeli cyber surveillance technology dealer. The malware, dubbed Lipizzan, was also discovered on and removed from fewer than 100 Android devices through the use of the Google Play Protect security suite for Android devices. The spyware’s capabilities Aside from rooting the targeted device, Lippizan can: Record calls (even VoIP calls) Record sounds via the device’s microphone Take screenshots … More Continue reading Lippizan: Sophisticated, targeted spyware on Google Play