Richard Stiennon

Chief Research Analyst

IT-Harvest


What Will A Russia-Ukraine Cyberwar Look Like?

Posted on: 03 Mar 2014

Update March 4:  According to a Renysis Blog post from February 26 Ukraine has very resilient Internet connectivity not likely to be disrupted by a single event.  According to Reuters Tuesday Valentyn…

Cylance Enters End-Point Protection Space

Posted on: 20 Feb 2014

Cylance is a new vendor in the end point protection space. They caught my attention with a completely new way to discover malware on Windows devices. In addition to launching…

A Brief History of Cyber Attacks and the Olympics

Posted on: 03 Feb 2014

The first time I was exposed to the IT security concerns of the Olympics was in 2003 when a delegation from China visited the US to garner advice on protecting…

Ordinary Folk

Posted on: 29 Jan 2014

I have a pet peeve. It’s the use of the word “folks,” which has been popularized by the current administration. I know it makes the President appear avuncular and, well, folksy.…

New Reports that NSA Searches Angry Birds and Other Apps for Personal Data

Posted on: 27 Jan 2014

Late Monday three separate media outlets reported on how the NSA snoops on data transmitted from cell phone apps.  The New York Times, The Guardian, and ProPublica each covered how…

Schneier Predicts Ramping Up of Cyber Crime

Posted on: 27 Jan 2014

In an interview with the BBC well know security expert Bruce Schneier declaimed that intelligence agency attacks on Internet infrastructure have broken trust. “The fact that it has been subverted in ways…

The [Character] Assassination of Edward Snowden

Posted on: 25 Jan 2014

While crass and underhanded, it is not out of the norm for those losing a debate to resort to character assassination. The side that is on the defensive argues by…

Snowden Calls For Termination of Unwarranted Surveillance

Posted on: 23 Jan 2014

In a live chat hosted by The Courage Foundation Edward Snowden called on the US to stop the mass collection of telephone records by the NSA, authorized under section 215 of…

You Mad Bro? You Will Be, After Watching These Jacob Applebaum Videos

Posted on: 23 Jan 2014

The reactions to the depth and scope of the NSA’s surveillance apparatus has varied from ho-hum, “that’s their job,” to OMG “it’s the end of the world as we know…

Tech Bubble? Yes. Security Bubble? No.

Posted on: 21 Jan 2014

Bob Ackerman, a VC at Allegis Capital wrote what could be considered a self-serving piece on the security tech bubble published on VentureBeat. Of course an investor in security companies is…