Endgame Contributes Data and Analysis to "Operation SMN" Report
Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the characteristics of a threat actor group believed to...
View ArticleEndgame Reports Record Growth for 2014; Adds Two New Executives
Endgame Reports Record Growth for 2014; Adds Two New ExecutivesArlington, VA– October 29, 2014 – Endgame, Inc., a leading provider of security intelligence and analytics solutions that give enterprises...
View ArticleBestiary of Cyber Intelligence
by Andrea Little Limbago, Illustrations by Anne HarperWelcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 3: Moving...
by Andrea Little LimbagoNext week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 2:...
by Andrea Little LimbagoThis latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is not as...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 1:...
by Andrea Little LimbagoFormer Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber attacks...
View ArticleBack to the Future: Leveraging the Delorean to Secure the Information...
by Andrea Little LimbagoIn the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how difficult it...
View ArticleChallenges in Data-Driven Security (Part 1)
by Phil RothDEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 3: Moving...
by Andrea Little LimbagoNext week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 2:...
by Andrea Little LimbagoThis latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is not as...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 1:...
by Andrea Little LimbagoFormer Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber attacks...
View ArticleBack to the Future: Leveraging the Delorean to Secure the Information...
by Andrea Little LimbagoIn the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how difficult it...
View ArticleChallenges in Data-Driven Security (Part 1)
by Phil RothDEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more...
View ArticleEndgame Raises $30 Million Series C Round to Accelerate Growth in Enterprise...
Endgame Raises $30 Million Series C Round to Accelerate Growth in Enterprise Security MarketArlington, VA– November 19, 2014 – Endgame, Inc., a leading provider of security intelligence and analytics...
View ArticleSoft Power is Hard: The World Internet Conference Behind the Great Firewall
by Andrea Little LimbagoFor three days, Chinese citizens are able to tweet at will and access Google, Facebook, and other forms of social media and traditionally censored content—but only if they are...
View Article