Richard Stiennon

Chief Research Analyst

IT-Harvest


Cylance Enters End-Point Protection Space

Posted on: 20 Feb 2014

Cylance is a new vendor in the end point protection space. They caught my attention with a completely new way to discover malware on Windows devices. In addition to launching their CylancePROTECT product this week they just announced a $20 million funding round from Blackstone, Khosla Ventures, Fairhaven Capital and private investors. There are now four ways to identify malware. The…

A Brief History of Cyber Attacks and the Olympics

Posted on: 03 Feb 2014

The first time I was exposed to the IT security concerns of the Olympics was in 2003 when a delegation from China visited the US to garner advice on protecting the 2008 Summer Olympics in Beijing. Their concern was primarily with protecting the results data from each event as it was recorded onsite and transmitted…

Ordinary Folk

Posted on: 29 Jan 2014

I have a pet peeve. It’s the use of the word “folks,” which has been popularized by the current administration. I know it makes the President appear avuncular and, well, folksy. “Folk” is all encompassing, it’s you, it’s me. He used the word four times in last night’s State of the Union address. We are all…

New Reports that NSA Searches Angry Birds and Other Apps for Personal Data

Posted on: 27 Jan 2014

Late Monday three separate media outlets reported on how the NSA snoops on data transmitted from cell phone apps.  The New York Times, The Guardian, and ProPublica each covered how apps like Angry Birds, report geo-location, buddy lists, and URLs visited, obviously in clear text, to be hoovered up by the NSA’s taps on global…

Schneier Predicts Ramping Up of Cyber Crime

Posted on: 27 Jan 2014

In an interview with the BBC well know security expert Bruce Schneier declaimed that intelligence agency attacks on Internet infrastructure have broken trust. “The fact that it has been subverted in ways we don’t understand… we don’t know what to trust. And that is an enormous blow to the global promise of the Internet.” In the short…

The [Character] Assassination of Edward Snowden

Posted on: 25 Jan 2014

While crass and underhanded, it is not out of the norm for those losing a debate to resort to character assassination. The side that is on the defensive argues by ad hominem attack. As certain members of Congress, the President, and members of the media find it harder and harder to defend the surveillance state…

Snowden Calls For Termination of Unwarranted Surveillance

Posted on: 23 Jan 2014

In a live chat hosted by The Courage Foundation Edward Snowden called on the US to stop the mass collection of telephone records by the NSA, authorized under section 215 of the Patriot Act. The Courage Foundation is a trust, audited by accountants Derek Rothera & Company in the UK, for the purpose of providing legal defence and…

You Mad Bro? You Will Be, After Watching These Jacob Applebaum Videos

Posted on: 23 Jan 2014

The reactions to the depth and scope of the NSA’s surveillance apparatus has varied from ho-hum, “that’s their job,” to OMG “it’s the end of the world as we know it!” Somewhere in the middle is the slow-boil rage that is going to transform the IT industry. If you are of the ho-hum mindset that…

Tech Bubble? Yes. Security Bubble? No.

Posted on: 21 Jan 2014

Bob Ackerman, a VC at Allegis Capital wrote what could be considered a self-serving piece on the security tech bubble published on VentureBeat. Of course an investor in security companies is going to stoke the flames of exuberance, especially in light of the ridiculous valuation of FireEye at IPO of $6 billion ($FEYE has a market…

What is Really Needed to Reform the NSA

Posted on: 17 Jan 2014

Here is how it is going to play out. Starting with the lackluster reforms that President Obama introduced today, reducing meta data based surveillance to two instead of three links, beefing up requirements for looking at that data, with more FISA court review, clarifying NSA spying on foreign heads of state, and making national Security…