Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Report Analysis: A Data-Driven Approach to Cybersecurity

On Monday, I attended the rollout event for former Secretary of the Navy Richard Danzig’s most recent report: “Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s...

View Article


Securing the e-Campus: Ten Observations About Cyber Security in Academia

I recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my fifteen years of experience in the kinetic security...

View Article


New Internet Hot Spots? Neighborhood Effects and Internet Censorship

During the 2011 London riots, the local government called for a ban on BlackBerry Messenger Service, a key form of communication during these events. Following the riots, Prime Minister David Cameron...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security and International Relations: A Black Hat Recap

This week I attended my first-ever Black Hat conference. As a social scientist, I was very intrigued to actually experience the culture of the conference, but anticipated being overwhelmed by the...

View Article

Image may be NSFW.
Clik here to view.

Hack Week The Endgame Way

Several Endgamers attended Black Hat in Las Vegas a couple of weeks ago. Some stayed and many more arrived for DEF CON. Keeping the theme alive, we just finished up this summer’s Vegas hack week, where...

View Article


How We Win Hack Week

With outstretched arms and a voice just a tad too loud, I shout, “Welcome to Hack Week!” As a fitting coda to Black Hat and DEF CON wrapping up in the previous days, an enthusiastic group of Endgame...

View Article

The More Things Change...Espionage in the Digital Age

Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while collecting intelligence on Turkey. For many,...

View Article

Working Across the Aisle: The Need for More Tech-Policy Convergence

Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley, though he’ll remain connected to...

View Article


Cyber Defense: Four Lessons from the Field

In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better understanding of the...

View Article


NATO Article 5: A Cyber Attack on One is an Attack on All

NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the summit of an...

View Article

Fixing America’s Strategic Analysis Gap Without Creating Another Institution

In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…” to help policy...

View Article

Image may be NSFW.
Clik here to view.

Malware with a Personal Touch

Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or a user...

View Article

INSA Whitepaper: Operational Cyber Intelligence

Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence. The paper is part...

View Article


Endgame Contributes Data and Analysis to "Operation SMN" Report

Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the characteristics of a threat actor group believed to...

View Article

Image may be NSFW.
Clik here to view.

Bestiary of Cyber Intelligence: 10 Overused Terms

Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a Bestiary of Cyber Intelligence 2014: Top...

View Article


To Forecast Global Cyber Alliances, Just Follow the Money (Part 2):...

This latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is not as comprehensive as the...

View Article

To Forecast Global Cyber Alliances, Just Follow the Money (Part 1):...

Former Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber attacks grow more prevalent and...

View Article


To Forecast Global Cyber Alliances, Just Follow the Money (Part 3): Moving...

Next week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic trends carry over, it’s...

View Article

Back to the Future: Leveraging a Delorean to Predict the Future of Cyber...

In the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how difficult it is to forecast the future...

View Article

Challenges in Data-Driven Security

DEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more and more...

View Article
Browsing all 698 articles
Browse latest View live