Meet Endgame at RSA 2015
Active ResponseTurn the Map Around Endgame will be at RSA 2015! Stop by the South Hall, Booth #2127 to:Get a product demo. Learn more about how we help customers instantly detect and actively respond...
View ArticleGit Hubris? The Long-Term Implications of China’s Latest Censorship Campaign
National Security Last Friday, GitHub, the popular collaborative site for developers, experienced a series of distributed denial of service (DDoS) attacks. The attacks are the largest in the company’s...
View ArticleThe Endgame Guide to Informed Cocktail Party Conversations on Data Science...
Data Science The mathematician George Box famously noted that, “all models are wrong, but some are useful”. This is especially useful advice when looking at quantitatively driven analytics—a topic that...
View ArticleGeeks, Machines and Outsiders: How the Security Industry Fared at RSA
Data ScienceUser Experience Last week at RSA—the security industry’s largest conference—Andrew McAfee, co-author of “The Second Machine Age: Work, Progress and Prosperity in a Time of Brilliant...
View ArticleChange: Three Ways to Challenge Today’s Security (UX) Thinking
User Experience Last week, I was fortunate enough to spend three and a half days on the floor at RSA for its “Change: Challenge Today’s Security Thinking” inspired conference. I was simply observing...
View ArticleHow the Sino-Russian Cyber Pact Furthers the Geopolitical Digital Divide
Cyber AlliancesNational Security As I wrote at the end of last year, China and Russia have been in discussions to initiate a security agreement to tackle the various forms of digital behavior in...
View ArticleOpen-Sourcing Your Own Python Library 101
Data SciencePython has become an increasingly common language for data scientists, back-end engineers, and front-end engineers, providing a unifying platform for the range of disciplines found on an...
View ArticleHunting Your Adversaries with Endgame Enterprise: Meet Us at Gartner
Endgame will exhibit at the Gartner Security & Risk Management Summit in National Harbor, MD from June 8 to June 11. Visit our booth #1214 to learn more and receive a demo of Endgame Enterprise,...
View ArticleMuch Ado About Wassenaar: The Overlooked Strategic Challenges to the...
National SecurityVulnerability Research In the past couple of weeks, the US Bureau of Industry and Security (BIS), part of the US Chamber of Commerce, announced the potential implementation of the 2013...
View ArticleStop Saying Stegosploit Is An Exploit
Vulnerability Research Security researcher Saumil Shah recently presented “Stegosploit” (slides available here). His presentation received a lot of attention on several hacker news sites, including...
View ArticleOPM Breach: Corporate and National Security Adversaries Are One and the Same
National Security On June 5, 1989, images of a lone person standing ground in front of Chinese tanks in Tiananmen Square transfixed the world. On the same day twenty-six years later, the United States...
View ArticleThe Digital Domain’s Inconvenient Truth: Norms are Not the Answer
Cyber LegislationNational Security To say the last week has been a worrisome one for any current or former federal government employees is a vast understatement. Now, with this weekend’s revelations...
View ArticleData Science for Security: Using Passive DNS Query Data to Analyze Malware
Data ScienceMalware Most of the time, DNS services—which produce the human-friendly, easy-to-remember domain names that map to numerical IP addresses—are used for legitimate purposes. But they are also...
View ArticleMeet Endgame at Black Hat 2015
Endgame will be at Black Hat!Stop by Booth #1215 to:Get an Endgame Enterprise DemoSign up here for a private demo to learn how we help customers automate the hunt for cyber adversaries. Meet with...
View ArticleExamining Malware with Python
Data ScienceMalware Before I came to Endgame, I had participated in a couple of data science competitions hosted by Kaggle. I didn’t treat them as competitions so much as learning opportunities. Like...
View ArticleData Science for Security: Using Passive DNS Query Data to Analyze Malware
Data ScienceMalware Most of the time, DNS services—which produce the human-friendly, easy-to-remember domain names that map to numerical IP addresses—are used for legitimate purposes. But they are also...
View ArticleMeet Endgame at Black Hat 2015
Endgame will be at Black Hat!Stop by Booth #1215 to:Get an Endgame Enterprise DemoSign up here for a private demo to learn how we help customers automate the hunt for cyber adversaries. Meet with...
View ArticleExamining Malware with Python
Data ScienceMalware Before I came to Endgame, I had participated in a couple of data science competitions hosted by Kaggle. I didn’t treat them as competitions so much as learning opportunities. Like...
View ArticleWhy We Need More Cultural Entrepreneurs in Security & Tech
Recently, #RealDiversityNumbers provided another venue for those in the tech community to vent and commiserate over the widely publicized lack of diversity within the industry. The hashtag started...
View ArticleSprint Defaults and the Jeep Hack: Could Basic Network Settings Have...
Mobile SecurityVulnerability Research In mid-July, research into the security of a Jeep Cherokee was disclosed though a Wired article and subsequent Black Hat presentation. The researchers, Charlie...
View Article