Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

The Great Divide: Closing the Gap in Cyber Analysis

In 2010, General Michael Flynn co-authored a report entitled Fixing Intel critiquing the threat-centric emphasis within counterinsurgency intelligence analysis. The report, which made waves in the...

View Article


Analysis: Three Observations About the Rise of the State in Shaping Cyberspace

Last month commemorated the 100th anniversary of the start of World War I. It was a time when states were so interdependent and borders so porous that some call it the first era of globalization. In...

View Article


Image may be NSFW.
Clik here to view.

Time Series Analysis for Network Security

Last week, I had the opportunity to attend a conference that had been on my radar for a long time. I’ve been using scientific Python tools for about 10 years, so it was with great excitement that I...

View Article

Image may be NSFW.
Clik here to view.

Building Models for Time Series Analysis

In my last post, I talked about the different Python projects I used to put together a pipeline for network security data. In this post, I’ll talk about how I used the scientific computing software...

View Article

Report Analysis: A Data-Driven Approach to Cybersecurity

On Monday, I attended the rollout event for former Secretary of the Navy Richard Danzig’s most recent report: “Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s...

View Article


Securing the e-Campus: Ten Observations About Cyber Security in Academia

I recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my fifteen years of experience in the kinetic security...

View Article

New Internet Hot Spots? Neighborhood Effects and Internet Censorship

During the 2011 London riots, the local government called for a ban on BlackBerry Messenger Service, a key form of communication during these events. Following the riots, Prime Minister David Cameron...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Decomposed: Perspectives from a Social Scientist

This week I attended my first-ever Black Hat conference. As a social scientist, I was very intrigued to actually experience the culture of the conference, but anticipated being overwhelmed by the...

View Article


Image may be NSFW.
Clik here to view.

Hack Week The Endgame Way

Several Endgamers attended Black Hat in Las Vegas a couple of weeks ago. Some stayed and many more arrived for DEF CON. Keeping the theme alive, we just finished up this summer’s Vegas hack week, where...

View Article


How We Win Hack Week

With outstretched arms and a voice just a tad too loud, I shout, “Welcome to Hack Week!” As a fitting coda to Black Hat and DEF CON wrapping up in the previous days, an enthusiastic group of Endgame...

View Article

The More Things Change...Espionage in the Digital Age

Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while collecting intelligence on Turkey. For many,...

View Article

Working Across the Aisle: The Need for More Tech-Policy Convergence

Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley, though he’ll remain connected to...

View Article

Cyber Defense: Four Lessons from the Field

In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better understanding of the...

View Article


Article 5.0: A Cyber Attack on One is an Attack on All (Part 1)

NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the summit of an...

View Article

Fixing America’s Strategic Analysis Gap Without Creating Another Institution

In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…” to help policy...

View Article


Image may be NSFW.
Clik here to view.

Malware with a Personal Touch

Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or a user...

View Article

INSA Whitepaper: Operational Cyber Intelligence

Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence. The paper is part...

View Article


Endgame Contributes Data and Analysis to "Operation SMN" Report

Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the characteristics of a threat actor group believed to...

View Article

Image may be NSFW.
Clik here to view.

Bestiary of Cyber Intelligence

Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a Bestiary of Cyber Intelligence 2014: Top...

View Article

To Forecast Global Cyber Alliances, Just Follow the Money (Part 3): Moving...

Next week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic trends carry over, it’s...

View Article
Browsing all 698 articles
Browse latest View live