The Rise and Rise of Bad Bots – Part 2 – Beyond Web-Scraping

Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite dating from the late 1950s, remain in widespread use. Although organizations are reliant on these applications they are often impossible to change as the original…

Details

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

In 1995 a small security reseller in Southfield, Michigan, introduced possibly the first “cloud” based firewall: Check Point FW1 running on Sun Netra boxes in their small data center. Netrex would configure T1 connections from their customers’ routers to their data center and manage all of the firewall policies for them. As they developed their…

Details

Approaching the Singularity in Situational Awareness

The gravity well of situational awareness has been pulling on us since the earliest days of information protection. The ever-increasing sophistication of threats and compounding complexity of our systems is accelerating us down that path and narrowing our options. As we approach this singularity the choice to continue flying blindly through cyberspace is rapidly becoming…

Details

2015 Continues to be Strong Year for Cybersecurity Venture Funding

As cyber threats loom larger, the number of security vendors continues to grow and venture capital continues to flow across the cybersecurity ecosystem. Three cybersecurity companies announced over the past week venture funding totaling some $94 million. Security analytics company RedSeal, Inc. announced on Monday that it had secured $17 million in a Series C…

Details

Insurance Companies Need to Eat Their Own Dog Food

Many insurance companies aspire to sell policies to their customers that will provide financial mitigation against cyber-attacks. That is all well and good, but they need to make sure their own houses are order first. A recent Quocirca research report, Room for improvement, Building confidence in data security, which was sponsored by Digital Guardian, showed…

Details

InfoSec World 2015 – Recap

InfoSec World 2015 just wrapped up from Disney’s Contemporary Resort in Orlando, Florida. With around 1200 attendees, over 75 speakers, and over 50 exhibitors, the event provided something for everyone. In addition, MIS Training ensured attendees had opportunity to attend workshops and hands-on training to provide a top-notch educational experience. Many attendees commented on how…

Details

The DHS SWAMP: What It Is and What It Means for Practitioners

I know it might sound sort of corny but whenever I think of the Department of Homeland Security (DHS) “SWAMP” program (the Software Assurance Marketplace) my mind immediately goes to The Empire Strikes Back. You probably know the part I mean.  When Luke lands on the swamp planet of Dagobah to receive his training from Yoda. What…

Details

Healthcare.gov Site Reportedly Sharing Personal Information of Visitors

The healthcare.gov site is sharing personal information about visitors to its site to third-party advertisers, according to a report by The Associated Press. The website for the federal healthcare exchange provides advertising networks with information such as the visitor’s age, annual income, zip code and state, whether he or she smokes, whether she is pregnant, and…

Details