Malware Devil

Thursday, February 11, 2021

Game Over: Stopping DDoS Attacks Before They Start

Video games are poised for a revolution, but benefits will come to fruition only if the industry can guarantee consistent performance and availability.

The post Game Over: Stopping DDoS Attacks Before They Start appeared first on Malware Devil.



https://malwaredevil.com/2021/02/11/game-over-stopping-ddos-attacks-before-they-start-2/?utm_source=rss&utm_medium=rss&utm_campaign=game-over-stopping-ddos-attacks-before-they-start-2

Game Over: Stopping DDoS Attacks Before They Start

Video games are poised for a revolution, but benefits will come to fruition only if the industry can guarantee consistent performance and availability.

At one point or another, all online gamers have suffered from a sudden time lag or lost Wi-Fi connection at a crucial moment. Most players find these issues frustrating, but in some cases, they aren’t accidents or technical problems; they are distributed denial-of-service (DDoS) attacks that can impact an entire game, or at least one’s experience of it.

The latest NETSCOUT Threat Intelligence Report found that “the COVID-19 pandemic drove a mass movement to virtualized work and play, giving adversaries a much larger playground of opportunity.” And play they did. With cafes, bars, and most other venues closed, people turned to gaming as an alternative to hang out and interact with friends.

Video games are now immersive and engaging worlds and communities that offer a sought-after escape from the current reality. As a result, the gaming industry has become a prime target for hackers since lockdowns first went into effect.

Gaming as a DDoS Target
Gaming studios have weathered DDoS attacks on their platforms for well over a decade. The hacks come in two varieties: aggression directed at an individual player or the whole company’s servers. When a single player is the target, that participant alone is unable to play or experiences a significant slowdown. The latter issue, though less frequent, typically renders the whole game unavailable to all participants.

While most games conceal a user’s IP address, making it more challenging to target individuals, players using private servers sometimes have their information visible to administrators or other gamers. The third-party chat platforms that teams use to communicate can further leak IP data.

Botnet-for-hire services, known as booters or stressers, are also widespread because owners can rent them out to anyone with a credit card or Bitcoin account. They launch attacks quickly and inexpensively, with no technical skills required and a 10-minute hack costing as little as 35 cents. DDoS attacks on gaming affect user experience, allowing the hacker to gain a competitive advantage. That issue has undoubtedly gotten worse this year.

The High Price of Gaming Industry Success
On April 4, 2020, Steam reported 24 million players online. Platform usage statistics show steady increases in gamer interaction and consistent playtimes since the onset of pandemic-induced lockdowns. Electronic Arts also had the best quarter in its 38-year history, as people spent more money on games than ever before. All major companies in the sector reported similar success, which illustrates the scale of gaming today.

Unfortunately, more players translate directly into more attacks against individuals and companies alike. One firm that produces several high-profile series has been hit by four significant DDoS attacks since the beginning of the pandemic.

The latest trend is toward complex but fast-moving multivector hacks, resulting in less time to respond and keep platforms available. Narrowing the mitigation response window is also more difficult now that security staff work from home and people, processes, and technologies cannot spring into action as quickly.

Preparing Gaming Pros
Defending gaming platforms is only one side of the coin, however. With traditional sports events postponed, e-sports competitions and live tournaments have also become very lucrative for professional gamers. They often offer seven-figure prize pools, with finalists eyeing record payouts of up to $6 million.

But the allure of these prizes also lends itself to ransomware, and most e-sports players can’t defend themselves during an attack. Luckily, some service providers are now considering automated DDoS protections for their gaming subscribers that cost only a few dollars more per month.

That is a wise decision, as reflected in NETSCOUT’s list of the top 10 industries targeted by DDoS attacks. Telecommunications took the top spot, with just under half a million attacks during the first half of 2020. Broadband consumers bore the brunt of these hacks, which were usually gaming-related. Those trends will continue in 2021.

Video games are poised for a revolution, with cloud and 5G services enabling new benefits. But they will only come to fruition if the industry can guarantee consistent performance and availability. Low latency is crucial in multiplayer arenas, where a slow connection can put players at a competitive disadvantage and open them up to DDoS attacks. Dealing with these issues is not a game, however; the right solutions for both businesses and individuals are essential to future success.

Philippe Alcoy currently serves as APAC security technologist for NETSCOUT, where he works across the research, strategy, and presales of DDoS threat detection, investigation, and mitigation solutions for service providers and enterprises in the Asia Pacific region. Alcoy has … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Game Over: Stopping DDoS Attacks Before They Start appeared first on Malware Devil.



https://malwaredevil.com/2021/02/11/game-over-stopping-ddos-attacks-before-they-start/?utm_source=rss&utm_medium=rss&utm_campaign=game-over-stopping-ddos-attacks-before-they-start

XKCD ‘Project Orion’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Project Orion’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Project Orion’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/11/xkcd-project-orion/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-project-orion

Wednesday, February 10, 2021

Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite

A version of this blog was originally posted to the Fuse blog on January 31, 2021. Fuse is the global community of 15K+ Fortinet users.

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Security Boulevard.

Read More

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite-4/?utm_source=rss&utm_medium=rss&utm_campaign=increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite-4

Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite

A version of this blog was originally posted to the Fuse blog on January 31, 2021. Fuse is the global community of 15K+ Fortinet users.

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Security Boulevard.

Read More

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite-3/?utm_source=rss&utm_medium=rss&utm_campaign=increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite-3

Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite

A version of this blog was originally posted to the Fuse blog on January 31, 2021. Fuse is the global community of 15K+ Fortinet users.

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Security Boulevard.

Read More

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite-2/?utm_source=rss&utm_medium=rss&utm_campaign=increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite-2

Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite

A version of this blog was originally posted to the Fuse blog on January 31, 2021. Fuse is the global community of 15K+ Fortinet users.

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Security Boulevard.

Read More

The post Increase Efficiency of Network and Security Professionals with Visibility and Automation of Fortinet infrastructure from Tufin Orchestration Suite appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite/?utm_source=rss&utm_medium=rss&utm_campaign=increase-efficiency-of-network-and-security-professionals-with-visibility-and-automation-of-fortinet-infrastructure-from-tufin-orchestration-suite

SOC Threat Coverage Analysis — Why/How?

SOC Threat Coverage Analysis — Why/How?

As I mentioned in Detection Coverage and Detection-in-Depth, the topic of threat detection coverage has long fascinated me. Back in my analyst days, we looked at it as a part of a security use case lifecycle process. For example, we focused on things like number and quality of alerts per SIEM use case, false/useless alert (“false positive”) numbers and ratios (to useful alerts), escalations to incident response, tuning, etc.

But what about a more comprehensive look at detection coverage inside each tool? Is there a way to assess the net threat coverage represented by the aggregate detection coverage inside each tool and then all tools? What about coverage analysis down to the rules presence, performance and quality?

A recent SIEM data analysis released by CardinalOps, a startup in the threat coverage space, suggests that the detection coverage gap is large at many organizations. Log source configuration errors, broken log collectors, insufficient breadth of rules, rule errors, noisy rules, and other factors contribute to poor coverage in the average organization. This got me thinking about this detection-in-depth and detection coverage again.

To an extent, some Breach and Attack Simulation (BAS) vendors try to go there. But ultimately this is NOT a job for a BAS that needs to retain its judge or arbiter role, rather than live deep inside the security operations machinery. Here we need something a lot more operational and a lot more plugged into the SOC tools and processes.

Also to an extent, MITRE ATT&CK (and especially CAR) would be helpful for this, but it is a framework, not a tool or even a methodology. You can MITRE content to map some of the threats to detections, but there are more things involved in obtaining and, especially, keeping your detection coverage map current.

So, how would I approach systematically looking at detection coverage in my SOC?

  1. Do I know what threats I want to detect? Threat assessment process will answer that.
  2. Do I know what detection content (rules, algorithms, models, etc) I need for this? Detection engineering or use case management process will lead to the right content here.
  3. Do I know what data I need to run the detection content on? Some form of log/data source optimization process helps.
  4. Am I collecting this data? A checklist can help here.
  5. Is the data being collected in the right format, being parsed correctly (if needed) to drive the detection content in question?
  6. Is the rule actually working in real life? Test automation process will reveal that.

A few of these needs to be run in a loop (“Is this working? Is this working after some system changes were made?”). This is a clear security engineering challenge and opportunity.

(P.S.: Related to this topic, I want to announce that I joined the Advisory Board of CardinalOps; they call this area Threat Coverage Optimization; they have a research report out)

Related blog posts:


SOC Threat Coverage Analysis — Why/How? was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post SOC Threat Coverage Analysis — Why/How? appeared first on Security Boulevard.

Read More

The post SOC Threat Coverage Analysis — Why/How? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/soc-threat-coverage-analysis%e2%80%8a-%e2%80%8awhy-how-3/?utm_source=rss&utm_medium=rss&utm_campaign=soc-threat-coverage-analysis%25e2%2580%258a-%25e2%2580%258awhy-how-3

SOC Threat Coverage Analysis — Why/How?

SOC Threat Coverage Analysis — Why/How?

As I mentioned in Detection Coverage and Detection-in-Depth, the topic of threat detection coverage has long fascinated me. Back in my analyst days, we looked at it as a part of a security use case lifecycle process. For example, we focused on things like number and quality of alerts per SIEM use case, false/useless alert (“false positive”) numbers and ratios (to useful alerts), escalations to incident response, tuning, etc.

But what about a more comprehensive look at detection coverage inside each tool? Is there a way to assess the net threat coverage represented by the aggregate detection coverage inside each tool and then all tools? What about coverage analysis down to the rules presence, performance and quality?

A recent SIEM data analysis released by CardinalOps, a startup in the threat coverage space, suggests that the detection coverage gap is large at many organizations. Log source configuration errors, broken log collectors, insufficient breadth of rules, rule errors, noisy rules, and other factors contribute to poor coverage in the average organization. This got me thinking about this detection-in-depth and detection coverage again.

To an extent, some Breach and Attack Simulation (BAS) vendors try to go there. But ultimately this is NOT a job for a BAS that needs to retain its judge or arbiter role, rather than live deep inside the security operations machinery. Here we need something a lot more operational and a lot more plugged into the SOC tools and processes.

Also to an extent, MITRE ATT&CK (and especially CAR) would be helpful for this, but it is a framework, not a tool or even a methodology. You can MITRE content to map some of the threats to detections, but there are more things involved in obtaining and, especially, keeping your detection coverage map current.

So, how would I approach systematically looking at detection coverage in my SOC?

  1. Do I know what threats I want to detect? Threat assessment process will answer that.
  2. Do I know what detection content (rules, algorithms, models, etc) I need for this? Detection engineering or use case management process will lead to the right content here.
  3. Do I know what data I need to run the detection content on? Some form of log/data source optimization process helps.
  4. Am I collecting this data? A checklist can help here.
  5. Is the data being collected in the right format, being parsed correctly (if needed) to drive the detection content in question?
  6. Is the rule actually working in real life? Test automation process will reveal that.

A few of these needs to be run in a loop (“Is this working? Is this working after some system changes were made?”). This is a clear security engineering challenge and opportunity.

(P.S.: Related to this topic, I want to announce that I joined the Advisory Board of CardinalOps; they call this area Threat Coverage Optimization; they have a research report out)

Related blog posts:


SOC Threat Coverage Analysis — Why/How? was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post SOC Threat Coverage Analysis — Why/How? appeared first on Security Boulevard.

Read More

The post SOC Threat Coverage Analysis — Why/How? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/soc-threat-coverage-analysis%e2%80%8a-%e2%80%8awhy-how-2/?utm_source=rss&utm_medium=rss&utm_campaign=soc-threat-coverage-analysis%25e2%2580%258a-%25e2%2580%258awhy-how-2

SOC Threat Coverage Analysis — Why/How?

SOC Threat Coverage Analysis — Why/How?

As I mentioned in Detection Coverage and Detection-in-Depth, the topic of threat detection coverage has long fascinated me. Back in my analyst days, we looked at it as a part of a security use case lifecycle process. For example, we focused on things like number and quality of alerts per SIEM use case, false/useless alert (“false positive”) numbers and ratios (to useful alerts), escalations to incident response, tuning, etc.

But what about a more comprehensive look at detection coverage inside each tool? Is there a way to assess the net threat coverage represented by the aggregate detection coverage inside each tool and then all tools? What about coverage analysis down to the rules presence, performance and quality?

A recent SIEM data analysis released by CardinalOps, a startup in the threat coverage space, suggests that the detection coverage gap is large at many organizations. Log source configuration errors, broken log collectors, insufficient breadth of rules, rule errors, noisy rules, and other factors contribute to poor coverage in the average organization. This got me thinking about this detection-in-depth and detection coverage again.

To an extent, some Breach and Attack Simulation (BAS) vendors try to go there. But ultimately this is NOT a job for a BAS that needs to retain its judge or arbiter role, rather than live deep inside the security operations machinery. Here we need something a lot more operational and a lot more plugged into the SOC tools and processes.

Also to an extent, MITRE ATT&CK (and especially CAR) would be helpful for this, but it is a framework, not a tool or even a methodology. You can MITRE content to map some of the threats to detections, but there are more things involved in obtaining and, especially, keeping your detection coverage map current.

So, how would I approach systematically looking at detection coverage in my SOC?

  1. Do I know what threats I want to detect? Threat assessment process will answer that.
  2. Do I know what detection content (rules, algorithms, models, etc) I need for this? Detection engineering or use case management process will lead to the right content here.
  3. Do I know what data I need to run the detection content on? Some form of log/data source optimization process helps.
  4. Am I collecting this data? A checklist can help here.
  5. Is the data being collected in the right format, being parsed correctly (if needed) to drive the detection content in question?
  6. Is the rule actually working in real life? Test automation process will reveal that.

A few of these needs to be run in a loop (“Is this working? Is this working after some system changes were made?”). This is a clear security engineering challenge and opportunity.

(P.S.: Related to this topic, I want to announce that I joined the Advisory Board of CardinalOps; they call this area Threat Coverage Optimization; they have a research report out)

Related blog posts:


SOC Threat Coverage Analysis — Why/How? was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post SOC Threat Coverage Analysis — Why/How? appeared first on Security Boulevard.

Read More

The post SOC Threat Coverage Analysis — Why/How? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/soc-threat-coverage-analysis%e2%80%8a-%e2%80%8awhy-how/?utm_source=rss&utm_medium=rss&utm_campaign=soc-threat-coverage-analysis%25e2%2580%258a-%25e2%2580%258awhy-how

Community Defense and Data Security

DATA SECURITY PODCAST

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP & Chief Evangelist at CIS. , discuss the latest views on data security, and the importance of system integrity monitoring and best practices for businesses regarding file integrity monitoring.   The podcast can be listened to in it’s entirety below.

 

The post Community Defense and Data Security appeared first on Security Boulevard.

Read More

The post Community Defense and Data Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/community-defense-and-data-security-6/?utm_source=rss&utm_medium=rss&utm_campaign=community-defense-and-data-security-6

BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-6/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-6

BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-5/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-5

Community Defense and Data Security

DATA SECURITY PODCAST

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP & Chief Evangelist at CIS. , discuss the latest views on data security, and the importance of system integrity monitoring and best practices for businesses regarding file integrity monitoring.   The podcast can be listened to in it’s entirety below.

 

The post Community Defense and Data Security appeared first on Security Boulevard.

Read More

The post Community Defense and Data Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/community-defense-and-data-security-5/?utm_source=rss&utm_medium=rss&utm_campaign=community-defense-and-data-security-5

BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-4/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-4

Community Defense and Data Security

DATA SECURITY PODCAST

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP & Chief Evangelist at CIS. , discuss the latest views on data security, and the importance of system integrity monitoring and best practices for businesses regarding file integrity monitoring.   The podcast can be listened to in it’s entirety below.

 

The post Community Defense and Data Security appeared first on Security Boulevard.

Read More

The post Community Defense and Data Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/community-defense-and-data-security-4/?utm_source=rss&utm_medium=rss&utm_campaign=community-defense-and-data-security-4

Community Defense and Data Security

DATA SECURITY PODCAST

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP & Chief Evangelist at CIS. , discuss the latest views on data security, and the importance of system integrity monitoring and best practices for businesses regarding file integrity monitoring.   The podcast can be listened to in it’s entirety below.

 

The post Community Defense and Data Security appeared first on Security Boulevard.

Read More

The post Community Defense and Data Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/community-defense-and-data-security-3/?utm_source=rss&utm_medium=rss&utm_campaign=community-defense-and-data-security-3

BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-3/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-3

Community Defense and Data Security

DATA SECURITY PODCAST

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP & Chief Evangelist at CIS. , discuss the latest views on data security, and the importance of system integrity monitoring and best practices for businesses regarding file integrity monitoring.   The podcast can be listened to in it’s entirety below.

 

The post Community Defense and Data Security appeared first on Security Boulevard.

Read More

The post Community Defense and Data Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/community-defense-and-data-security-2/?utm_source=rss&utm_medium=rss&utm_campaign=community-defense-and-data-security-2

BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Clint Gibler’s, Zane Lackey’s, Astha Singhal’s, Justine Osborne’s, Doug DePerry’s ‘Panel: Lessons Learned from the DevSecOps Trenches’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-2/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-doug-deperrys-panel-lessons-learned-from-the-devsecops-tre-2

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...