Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Nathaniel Fick: Encourage Innovation to Secure Military Systems From...

View Article


Analysis: Three Observations About the Rise of the State in Shaping Cyberspace

by Andrea Little LimbagoLast month commemorated the 100th anniversary of the start of World War I. It was a time when states were so interdependent and borders so porous that some call it the first era...

View Article


Image may be NSFW.
Clik here to view.

Time Series Analysis for Network Security

by Phil RothLast week, I had the opportunity to attend a conference that had been on my radar for a long time. I’ve been using scientific Python tools for about 10 years, so it was with great...

View Article

Image may be NSFW.
Clik here to view.

Building Models for Time Series Analysis

by Phil RothIn my last post, I talked about the different Python projects I used to put together a pipeline for network security data. In this post, I’ll talk about how I used the scientific computing...

View Article

Report Analysis: A Data-Driven Approach to a Cyber Security Framework

by Andrea Little LimbagoOn Monday, I attended the rollout event for former Secretary of the Navy Richard Danzig’s most recent report: “Surviving on a Diet of Poisoned Fruit: Reducing the National...

View Article


Image may be NSFW.
Clik here to view.

Securing the eCampus: Ten Observations About Cyber Security in Academia

by Nate FickI recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my fifteen years of experience in the kinetic...

View Article

New Internet Hot Spots? Neighborhood Effects and Internet Censorship

by Andrea Little LimbagoDuring the 2011 London riots, the local government called for a ban on BlackBerry Messenger Service, a key form of communication during these events. Following the riots, Prime...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Decomposed: Perspectives from a Social Scientist

by Andrea Little LimbagoThis week I attended my first-ever Black Hat conference. As a social scientist, I was very intrigued to actually experience the culture of the conference, but anticipated being...

View Article


2014 Hottest DC Companies

View Article


Image may be NSFW.
Clik here to view.

Hack Week The Endgame Way

by Andrea Little Limbago, Principal Social ScientistSeveral Endgamers attended Black Hat in Las Vegas a couple of weeks ago. Some stayed and many more arrived for DEF CON. Keeping the theme alive, we...

View Article

Image may be NSFW.
Clik here to view.

How We Win Hack Week

by John Herren, Director of Product DesignWith outstretched arms and a voice just a tad too loud, I shout, “Welcome to Hack Week!” As a fitting coda to Black Hat and DEF CON wrapping up in the previous...

View Article

The More Things Change...Espionage in the Digital Age

by Andrea Little LimbagoLast week, Der Spiegelreported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while collecting...

View Article

Working Across the Aisle: The Need for More Tech-Policy Convergence

by Andrea Little LimbagoLast week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley, though...

View Article


Cyber Defense: Four Lessons from the Field

by Casey GatelyIn cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All? (Part 1)

by Andrea Little Limbago & John HerrenNATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration....

View Article


Article 5.0: A Cyber Attack on One is an Attack on All? (Part 2: Technical...

by Adam HarderMobile phone networks are prime targets for a cyber attack, and governments large and small are in a particularly powerful position to execute such an attack on another country. Given the...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All? (Part 3: Why Private...

by Andrea Little LimbagoIn the month since our first post on NATO, the Sandworm virus’ extent and reach has become increasingly publicized. Sandworm is believed to be a Russian cyber-espionage campaign...

View Article


Fixing America’s Strategic Analysis Gap Without Creating Another Institution

by Andrea Little LimbagoIn his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and...

View Article

Image may be NSFW.
Clik here to view.

Malware with a Personal Touch

by Casey GatelyOver the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a...

View Article

INSA Whitepaper: Operational Cyber Intelligence

by Andrea Little LimbagoEndgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber...

View Article
Browsing all 698 articles
Browse latest View live