Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Industry Reactions to Devastating Sony Hack

View Article


Is This the Beginning of the End of “Duel”-track Foreign Policy?

by Andrea Little LimbagoThe Iranian nuclear negotiations occupy a persistent spot in the foreign policy news cycle. The Associated Press recently reported that Iran has agreed to a list of nuclear...

View Article


Blurred Lines: Dispelling the False Dichotomy between National & Corporate...

by Andrea Little Limbago and Cody PierceSeveral US government agencies have experienced targeted cyber attacks over the last few months. Many believe China is responsible for cyber attacks on the...

View Article

Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 1)

by John MunroA couple of years ago, in an effort to better understand technology trends, we initiated a project to identify typical web site characteristics for various geographic regions. We wanted to...

View Article

20 Startups to Watch in 2015

View Article


The Fog of (Cyber) War: The Attribution Problem and Jus ad Bellum

by Andrea Little LimbagoThe Sony Pictures Classics film The Fog of War is a comprehensive and seemingly unfiltered examination of former Secretary of Defense Robert McNamara, highlighting the key...

View Article

Is there more to Washington's economy than government? Investors think so.

View Article

Image may be NSFW.
Clik here to view.

The Year Ahead in Cyber: Endgame Perspectives on 2015

From the first CEO of a major corporation resigning in the wake of a cyber attack, to NATO incorporating the cyber realm into Article 5, to the still fresh-in-our-minds Sony attack, 2014 was certainly...

View Article


Could a Hollywood Breach and Some Tweets Be the Tipping Point for New Cyber...

by Andrea Little LimbagoTwo months ago, near-peer cyber competitors breached numerous government systems. During this same time, China debuted its new J-31 stealth fighter jet, which has components...

View Article


Obama's cyber bill faces tough questions from experts

View Article

Is Barack Obama a Cybersecurity Leader?

View Article

State of the Union address disappoints security experts

View Article

Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 2)

by Richard XieEffective analysis of cyber security data requires understanding the composition of networks and the ability to profile the hosts within them according to the large variety of features...

View Article


Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 3)

by Richard XieIn Understanding Crawl Data at Scale (Part 2), I demonstrated using SOM to visualize a high-dimensional dataset and use the technique to help reduce the dimensionality. As you may...

View Article

A Martian's Take on Cyber in the National Security Strategy

by Andrea Little LimbagoIn the recent New York Times bestselling book, The Martian, Andy Weir depicts a future world where space travel to Mars is feasible. Through an unfortunate string of events, the...

View Article


Five Thoughts from the White House Summit on Cybersecurity and Consumer...

by Nate FickThe Obama Administration deserves credit for putting together the first-ever White House summit on cybersecurity on Friday and – contrary to what some media coverage may lead you to believe...

View Article

Streaming Data Processing with PySpark Streaming

by Rich SeymourStreaming data processing has existed in our computing lexicon for at least 50 years. The ideas Doug McIlroy presented in 1964 regarding what would become UNIX pipes have been revisited,...

View Article


Repression Technology: An Authoritarian Whole of Government Approach to...

by Andrea Little LimbagoLast week, as discussions of striped dresses and llamas dominated the headlines, academia and policy coalesced in a way that rarely happens. On February 25th, Director of...

View Article

Hacking the Glass Ceiling

Niloofar Razi HoweAs we approach International Women’s Day this week and edge closer to the 100th anniversary of women’s suffrage (okay, four years to go, but still, a remarkable moment), and as news...

View Article

Endgame Lands FireEye Chief Architect to Head Research Team

Endgame Lands FireEye Chief Architect to Head Research TeamA pioneer in adversary intelligence, James Butler brings unparalleled experience and innovation to Endgame’s cyber threat detection and...

View Article
Browsing all 698 articles
Browse latest View live