Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Data-Driven Strategic Warnings: The Case of Yemeni ISPs

In 2007, a flurry of denial of service attacks targeted Estonian government websites as well as commercial sites, including banks. Many of these Russian-backed attacks were hosted on servers located in...

View Article


Image may be NSFW.
Clik here to view.

Meet Endgame at RSA 2015

Endgame will be at RSA 2015!Stop by the South Hall, Booth #2127 to:Get a product demo. Learn more about how we help customers instantly detect and actively respond to adversaries.Learn from our...

View Article


Image may be NSFW.
Clik here to view.

Git Hubris? The Long-Term Implications of China’s Latest Censorship Campaign

Last Friday, GitHub, the popular collaborative site for developers, experienced a series of distributed denial of service (DDoS) attacks. The attacks are the largest in the company’s history, and...

View Article

The Endgame Guide to Informed Cocktail Party Conversations on Data Science...

The mathematician George Box famously noted that, “all models are wrong, but some are useful”. This is especially useful advice when looking at quantitatively driven analytics—a topic that is...

View Article

Geeks, Machines and Outsiders: How the Security Industry Fared at RSA

Last week at RSA—the security industry’s largest conference—Andrew McAfee, co-author of “The Second Machine Age: Work, Progress and Prosperity in a Time of Brilliant Technologies”, introduced the...

View Article


Change: Three Ways to Challenge Today’s Security (UX) Thinking

Last week, I was fortunate enough to spend three and a half days on the floor at RSA for its “Change: Challenge Today’s Security Thinking” inspired conference. I was simply observing and absorbing the...

View Article

How the Sino-Russian Cyber Pact Furthers the Geopolitical Digital Divide

As I wrote at the end of last year, China and Russia have been in discussions to initiate a security agreement to tackle the various forms of digital behavior in cyberspace. Last Friday, Xi Jinping and...

View Article

Image may be NSFW.
Clik here to view.

Open-Sourcing Your Own Python Library 101

Python has become an increasingly common language for data scientists, back-end engineers, and front-end engineers, providing a unifying platform for the range of disciplines found on an engineering...

View Article


Image may be NSFW.
Clik here to view.

Stop Saying Stegosploit Is An Exploit

Security researcher Saumil Shah recently presented “Stegosploit” (slides available here). His presentation received a lot of attention on several hacker news sites, including Security Affairs, Hacker...

View Article


Much Ado About Wassenaar: The Overlooked Strategic Challenges to the...

In the past couple of weeks, the US Bureau of Industry and Security (BIS), part of the US Chamber of Commerce, announced the potential implementation of the 2013 changes to the Wassenaar Arrangement...

View Article

OPM Breach: Corporate and National Security Adversaries Are One and the Same

On June 5, 1989, images of a lone person standing ground in front of Chinese tanks in Tiananmen Square transfixed the world. On the same day twenty-six years later, the United States government...

View Article

The Digital Domain’s Inconvenient Truth: Norms are Not the Answer

To say the last week has been a worrisome one for any current or former federal government employees is a vast understatement. Now, with this weekend’s revelations that the data stolen in the OPM...

View Article

Image may be NSFW.
Clik here to view.

Data Science for Security: Using Passive DNS Query Data to Analyze Malware

Most of the time, DNS services—which produce the human-friendly, easy-to-remember domain names that map to numerical IP addresses—are used for legitimate purposes. But they are also heavily used by...

View Article


Image may be NSFW.
Clik here to view.

Meet Endgame at Black Hat 2015

 Endgame will be at Black Hat!Stop by Booth #1215 to: GET AN ENDGAME ENTERPRISE DEMOSign up here for a private demo to learn how we help customers automate the hunt for cyber adversaries. MEET WITH...

View Article

Image may be NSFW.
Clik here to view.

Examining Malware with Python

Before I came to Endgame, I had participated in a couple of data science competitions hosted by Kaggle. I didn’t treat them as competitions so much as learning opportunities. Like most things in the...

View Article


Why We Need More Cultural Entrepreneurs in Security & Tech

Recently, #RealDiversityNumbers provided another venue for those in the tech community to vent and commiserate over the widely publicized lack of diversity within the industry. The hashtag started...

View Article

Image may be NSFW.
Clik here to view.

Sprint Defaults and the Jeep Hack: Could Basic Network Settings Have...

In mid-July, research into the security of a Jeep Cherokee was disclosed though a Wired article and subsequent Black Hat presentation. The researchers, Charlie Miller and Chris Valasek, found an...

View Article


Black Hat 2015 Analysis: An Island in the Desert

This year’s Black Hat broke records yet again with the highest levels of attendance, including highest number of countries represented and, based on the size of the business hall, companies represented...

View Article

Image may be NSFW.
Clik here to view.

NLP for Security: Malicious Language Processing

Natural Language Processing (NLP) is a diverse field in computer science dedicated to automatically parsing and processing human language. NLP has been used to perform authorship attribution and...

View Article

Image may be NSFW.
Clik here to view.

Hunting for Honeypot Attackers: A Data Scientist’s Adventure

The U.S. Office of Personnel Management (known as OPM) won the “Most Epic Fail” award at the 2015 Black Hat Conference for the worst known data breach in U.S. government history, with more than 22...

View Article
Browsing all 698 articles
Browse latest View live