Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

To Forecast Global Cyber Alliances, Just Follow the Money (Part 2):...

This latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is not as comprehensive as the...

View Article


To Forecast Global Cyber Alliances, Just Follow the Money (Part 1):...

Former Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber attacks grow more prevalent and...

View Article


Back to the Future: Leveraging the Delorean to Secure the Information...

In the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how difficult it is to forecast the future...

View Article

Challenges in Data-Driven Security

DEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more and more...

View Article

Soft Power is Hard: The World Internet Conference Behind the Great Firewall

For three days, Chinese citizens are able to tweet at will and access Google, Facebook, and other forms of social media and traditionally censored content—but only if they are in the historic town of...

View Article


Is This the Beginning of the End of “Duel”-track Foreign Policy?

The Iranian nuclear negotiations occupy a persistent spot in the foreign policy news cycle. The Associated Press recently reported that Iran has agreed to a list of nuclear concessions. Although still...

View Article

Blurred Lines: Dispelling the False Dichotomy between National &...

Several US government agencies have experienced targeted cyber attacks over the last few months. Many believe China is responsible for cyber attacks on the Office of Personnel Management, the US Postal...

View Article

Understanding Crawl Data at Scale (Part 1)

A couple of years ago, in an effort to better understand technology trends, we initiated a project to identify typical web site characteristics for various geographic regions. We wanted to build a...

View Article


The Fog of (Cyber) War: The Attribution Problem and Jus ad Bellum

The Sony Pictures Classics film The Fog of War is a comprehensive and seemingly unfiltered examination of former Secretary of Defense Robert McNamara, highlighting the key lessons he learned during his...

View Article


Image may be NSFW.
Clik here to view.

The Year Ahead in Cyber: Endgame Perspectives on 2015

From the first CEO of a major corporation resigning in the wake of a cyber attack, to NATO incorporating the cyber realm into Article 5, to the still fresh-in-our-minds Sony attack, 2014 was certainly...

View Article

Could a Hollywood Breach and Some Tweets Be the Tipping Point for New Cyber...

Two months ago, near-peer cyber competitors breached numerous government systems. During this same time, China debuted its new J-31 stealth fighter jet, which has components that bear a remarkable...

View Article

Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 2)

Effective analysis of cyber security data requires understanding the composition of networks and the ability to profile the hosts within them according to the large variety of features they possess....

View Article

Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 3)

In Understanding Crawl Data at Scale (Part 2), I demonstrated using SOM to visualize a high-dimensional dataset and use the technique to help reduce the dimensionality. As you may remember, this...

View Article


A Martian's Take on Cyber in the National Security Strategy

In the recent New York Times bestselling book, The Martian, Andy Weir depicts a future world where space travel to Mars is feasible. Through an unfortunate string of events, the book’s hero, Mark...

View Article

Five Thoughts from the White House Summit on Cybersecurity and Consumer...

The Obama Administration deserves credit for putting together the first-ever White House summit on cybersecurity on Friday and – contrary to what some media coverage may lead you to believe – the U.S....

View Article


Streaming Data Processing with PySpark Streaming

Streaming data processing has existed in our computing lexicon for at least 50 years. The ideas Doug McIlroy presented in 1964 regarding what would become UNIX pipes have been revisited, reimagined and...

View Article

Repression Technology: An Authoritarian Whole of Government Approach to...

Last week, as discussions of striped dresses and llamas dominated the headlines, academia and policy coalesced in a way that rarely happens. On February 25th, Director of National Intelligence James...

View Article


Hacking the Glass Ceiling

 As we approach International Women’s Day this week and edge closer to the 100th anniversary of women’s suffrage (okay, four years to go, but still, a remarkable moment), and as news and current events...

View Article

Beyond the Buzz: Integrating Big Data & User Experience for Improved...

Big Data and UX are much more than industry buzzwords—they are some of the most important solutions making sense of the ever-increasing complexity and dynamism of the international system. While big...

View Article

See Your Company Through the Eyes of a Hacker: Turning the Map Around On...

Today, Harvard Business Review published “See Your Company Through the Eyes of a Hacker: Turning the Map Around On Cybersecurity” by Endgame CEO Nate Fick. In this piece, Nate argues that in order for...

View Article
Browsing all 698 articles
Browse latest View live