Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

The Fog of (Cyber) War: The Attribution Problem and Jus ad Bellum

The Sony Pictures Classics film The Fog of War is a comprehensive and seemingly unfiltered examination of former Secretary of Defense Robert McNamara, highlighting the key lessons he learned during his...

View Article


Image may be NSFW.
Clik here to view.

The Year Ahead in Cyber: Endgame Perspectives on 2015

From the first CEO of a major corporation resigning in the wake of a cyber attack, to NATO incorporating the cyber realm into Article 5, to the still fresh-in-our-minds Sony attack, 2014 was certainly...

View Article


Could a Hollywood Breach and Some Tweets Be the Tipping Point for New Cyber...

Two months ago, near-peer cyber competitors breached numerous government systems. During this same time, China debuted its new J-31 stealth fighter jet, which has components that bear a remarkable...

View Article

Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 2)

Effective analysis of cyber security data requires understanding the composition of networks and the ability to profile the hosts within them according to the large variety of features they possess....

View Article

Five Thoughts from the White House Summit on Cybersecurity and Consumer...

The Obama Administration deserves credit for putting together the first-ever White House summit on cybersecurity on Friday and – contrary to what some media coverage may lead you to believe – the U.S....

View Article


Streaming Data Processing with PySpark Streaming

Streaming data processing has existed in our computing lexicon for at least 50 years. The ideas Doug McIlroy presented in 1964 regarding what would become UNIX pipes have been revisited, reimagined and...

View Article

Repression Technology: An Authoritarian Whole of Government Approach to...

Last week, as discussions of striped dresses and llamas dominated the headlines, academia and policy coalesced in a way that rarely happens. On February 25th, Director of National Intelligence James...

View Article

Hacking the Glass Ceiling

As we approach International Women’s Day this week and edge closer to the 100th anniversary of women’s suffrage (okay, four years to go, but still, a remarkable moment), and as news and current events...

View Article


Image may be NSFW.
Clik here to view.

Beyond the Buzz: Integrating Big Data & User Experience for Improved Cyber...

Big Data and UX are much more than industry buzzwords—they are some of the most important solutions making sense of the ever-increasing complexity and dynamism of the international system. While big...

View Article


See Your Company Through the Eyes of a Hacker: Turning the Map Around On...

Today, Harvard Business Review published “See Your Company Through the Eyes of a Hacker: Turning the Map Around On Cybersecurity” by Endgame CEO Nate Fick. In this piece, Nate argues that in order for...

View Article

Image may be NSFW.
Clik here to view.

Data-Driven Strategic Warnings: The Case of Yemeni ISPs

In 2007, a flurry of denial of service attacks targeted Estonian government websites as well as commercial sites, including banks. Many of these Russian-backed attacks were hosted on servers located in...

View Article

Image may be NSFW.
Clik here to view.

Meet Endgame at RSA 2015

Endgame will be at RSA 2015!Stop by the South Hall, Booth #2127 to:Get a product demo. Learn more about how we help customers instantly detect and actively respond to adversaries.Learn from our...

View Article

Image may be NSFW.
Clik here to view.

Git Hubris? The Long-Term Implications of China’s Latest Censorship Campaign

Last Friday, GitHub, the popular collaborative site for developers, experienced a series of distributed denial of service (DDoS) attacks. The attacks are the largest in the company’s history, and...

View Article


The Endgame Guide to Informed Cocktail Party Conversations on Data Science...

The mathematician George Box famously noted that, “all models are wrong, but some are useful”. This is especially useful advice when looking at quantitatively driven analytics—a topic that is...

View Article

Geeks, Machines and Outsiders: How the Security Industry Fared at RSA

Last week at RSA—the security industry’s largest conference—Andrew McAfee, co-author of “The Second Machine Age: Work, Progress and Prosperity in a Time of Brilliant Technologies”, introduced the...

View Article


Image may be NSFW.
Clik here to view.

Change: Three Ways to Challenge Today’s Security (UX) Thinking

Last week, I was fortunate enough to spend three and a half days on the floor at RSA for its “Change: Challenge Today’s Security Thinking” inspired conference. I was simply observing and absorbing the...

View Article

How the Sino-Russian Cyber Pact Furthers the Geopolitical Digital Divide

As I wrote at the end of last year, China and Russia have been in discussions to initiate a security agreement to tackle the various forms of digital behavior in cyberspace. Last Friday, Xi Jinping and...

View Article


Image may be NSFW.
Clik here to view.

Open-Sourcing Your Own Python Library 101

Python has become an increasingly common language for data scientists, back-end engineers, and front-end engineers, providing a unifying platform for the range of disciplines found on an engineering...

View Article

Hunting Your Adversaries with Endgame Enterprise: Meet Us at Gartner

Stop by our booth (#1214) at the Gartner Security & Risk Management Summit next week to receive a demo of Endgame Enterprise, the industry's first endpoint detection and response platform to hunt,...

View Article

Image may be NSFW.
Clik here to view.

Much Ado About Wassenaar: The Overlooked Strategic Challenges to the...

In the past couple of weeks, the US Bureau of Industry and Security (BIS), part of the US Chamber of Commerce, announced the potential implementation of the 2013 changes to the Wassenaar Arrangement...

View Article
Browsing all 698 articles
Browse latest View live