Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Building Models for Time Series Analysis

Data Science In my last post, I talked about the different Python projects I used to put together a pipeline for network security data. In this post, I’ll talk about how I used the scientific computing...

View Article


Report Analysis: A Data-Driven Approach to Cybersecurity

National Security On Monday, I attended the rollout event for former Secretary of the Navy Richard Danzig’s most recent report: “Surviving on a Diet of Poisoned Fruit: Reducing the National Security...

View Article


Image may be NSFW.
Clik here to view.

Securing the e-Campus: Ten Observations About Cyber Security in Academia

Cyber WarriorsNational SecurityThreat Intelligence I recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my...

View Article

New Internet Hot Spots? Neighborhood Effects and Internet Censorship

National Security During the 2011 London riots, the local government called for a ban on BlackBerry Messenger Service, a key form of communication during these events. Following the riots, Prime...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Decomposed: Perspectives from a Social Scientist

Adversary IntelligenceNational SecurityThreat Intelligence This week I attended my first-ever Black Hat conference. As a social scientist, I was very intrigued to actually experience the culture of the...

View Article


Image may be NSFW.
Clik here to view.

How We Win Hack Week

Hack Week With outstretched arms and a voice just a tad too loud, I shout, “Welcome to Hack Week!” As a fitting coda to Black Hat and DEF CON wrapping up in the previous days, an enthusiastic group of...

View Article

Image may be NSFW.
Clik here to view.

Hack Week The Endgame Way

Hack Week Several Endgamers attended Black Hat in Las Vegas a couple of weeks ago. Some stayed and many more arrived for DEF CON. Keeping the theme alive, we just finished up this summer’s Vegas hack...

View Article

The More Things Change...Espionage in the Digital Age

Adversary IntelligenceNational Security Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while...

View Article


Working Across the Aisle: The Need for More Tech-Policy Convergence

Cyber WarriorsNational Security Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley,...

View Article


Cyber Defense: Four Lessons from the Field

Adversary Intelligence In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All (Part 1)

National Security NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All (Part 2): Technical...

Mobile Security Mobile phone networks are prime targets for a cyber attack, and governments large and small are in a particularly powerful position to execute such an attack on another country. Given...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All (Part 3): Why Private...

National Security In the month since our first post on NATO, the Sandworm virus’ extent and reach has become increasingly publicized. Sandworm is believed to be a Russian cyber-espionage campaign...

View Article


Fixing America’s Strategic Analysis Gap Without Creating Another Institution

National Security In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…”...

View Article

Image may be NSFW.
Clik here to view.

Malware with a Personal Touch

Malware Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or...

View Article


INSA Whitepaper: Operational Cyber Intelligence

Cyber Intelligence Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence....

View Article

Endgame Contributes Data and Analysis to "Operation SMN" Report

Data ScienceNational SecurityThreat Intelligence Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the...

View Article


Image may be NSFW.
Clik here to view.

Bestiary of Cyber Intelligence

Cyber IntelligenceMobile Security Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a...

View Article

To Forecast Global Cyber Alliances, Just Follow the Money (Part 2):...

Cyber AlliancesNational Security This latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is...

View Article

To Forecast Global Cyber Alliances, Just Follow the Money (Part 1):...

Cyber AlliancesNational Security Former Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber...

View Article
Browsing all 698 articles
Browse latest View live