Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Meet Endgame at RSA 2015

Active ResponseTurn the Map Around Endgame will be at RSA 2015! Stop by the South Hall, Booth #2127 to:Get a product demo. Learn more about how we help customers instantly detect and actively respond...

View Article


Image may be NSFW.
Clik here to view.

Git Hubris? The Long-Term Implications of China’s Latest Censorship Campaign

National Security Last Friday, GitHub, the popular collaborative site for developers, experienced a series of distributed denial of service (DDoS) attacks. The attacks are the largest in the company’s...

View Article


The Endgame Guide to Informed Cocktail Party Conversations on Data Science...

Data Science The mathematician George Box famously noted that, “all models are wrong, but some are useful”. This is especially useful advice when looking at quantitatively driven analytics—a topic that...

View Article

Geeks, Machines and Outsiders: How the Security Industry Fared at RSA

Data ScienceUser Experience Last week at RSA—the security industry’s largest conference—Andrew McAfee, co-author of “The Second Machine Age: Work, Progress and Prosperity in a Time of Brilliant...

View Article

Image may be NSFW.
Clik here to view.

Change: Three Ways to Challenge Today’s Security (UX) Thinking

User Experience Last week, I was fortunate enough to spend three and a half days on the floor at RSA for its “Change: Challenge Today’s Security Thinking” inspired conference. I was simply observing...

View Article


How the Sino-Russian Cyber Pact Furthers the Geopolitical Digital Divide

Cyber AlliancesNational Security As I wrote at the end of last year, China and Russia have been in discussions to initiate a security agreement to tackle the various forms of digital behavior in...

View Article

Image may be NSFW.
Clik here to view.

Open-Sourcing Your Own Python Library 101

Data SciencePython has become an increasingly common language for data scientists, back-end engineers, and front-end engineers, providing a unifying platform for the range of disciplines found on an...

View Article

Hunting Your Adversaries with Endgame Enterprise: Meet Us at Gartner

Endgame will exhibit at the Gartner Security & Risk Management Summit in National Harbor, MD from June 8 to June 11. Visit our booth #1214 to learn more and receive a demo of Endgame Enterprise,...

View Article


Image may be NSFW.
Clik here to view.

Much Ado About Wassenaar: The Overlooked Strategic Challenges to the...

National SecurityVulnerability Research In the past couple of weeks, the US Bureau of Industry and Security (BIS), part of the US Chamber of Commerce, announced the potential implementation of the 2013...

View Article


Image may be NSFW.
Clik here to view.

Stop Saying Stegosploit Is An Exploit

Vulnerability Research Security researcher Saumil Shah recently presented “Stegosploit” (slides available here). His presentation received a lot of attention on several hacker news sites, including...

View Article

OPM Breach: Corporate and National Security Adversaries Are One and the Same

National Security On June 5, 1989, images of a lone person standing ground in front of Chinese tanks in Tiananmen Square transfixed the world. On the same day twenty-six years later, the United States...

View Article

The Digital Domain’s Inconvenient Truth: Norms are Not the Answer

Cyber LegislationNational Security To say the last week has been a worrisome one for any current or former federal government employees is a vast understatement. Now, with this weekend’s revelations...

View Article

Image may be NSFW.
Clik here to view.

Data Science for Security: Using Passive DNS Query Data to Analyze Malware

Data ScienceMalware Most of the time, DNS services—which produce the human-friendly, easy-to-remember domain names that map to numerical IP addresses—are used for legitimate purposes. But they are also...

View Article


Image may be NSFW.
Clik here to view.

Meet Endgame at Black Hat 2015

  Endgame will be at Black Hat!Stop by Booth #1215 to:Get an Endgame Enterprise DemoSign up here for a private demo to learn how we help customers automate the hunt for cyber adversaries. Meet with...

View Article

Image may be NSFW.
Clik here to view.

Examining Malware with Python

Data ScienceMalware Before I came to Endgame, I had participated in a couple of data science competitions hosted by Kaggle. I didn’t treat them as competitions so much as learning opportunities. Like...

View Article


Image may be NSFW.
Clik here to view.

Data Science for Security: Using Passive DNS Query Data to Analyze Malware

Data ScienceMalware Most of the time, DNS services—which produce the human-friendly, easy-to-remember domain names that map to numerical IP addresses—are used for legitimate purposes. But they are also...

View Article

Image may be NSFW.
Clik here to view.

Meet Endgame at Black Hat 2015

  Endgame will be at Black Hat!Stop by Booth #1215 to:Get an Endgame Enterprise DemoSign up here for a private demo to learn how we help customers automate the hunt for cyber adversaries. Meet with...

View Article


Image may be NSFW.
Clik here to view.

Examining Malware with Python

Data ScienceMalware Before I came to Endgame, I had participated in a couple of data science competitions hosted by Kaggle. I didn’t treat them as competitions so much as learning opportunities. Like...

View Article

Why We Need More Cultural Entrepreneurs in Security & Tech

Recently, #RealDiversityNumbers provided another venue for those in the tech community to vent and commiserate over the widely publicized lack of diversity within the industry. The hashtag started...

View Article

Image may be NSFW.
Clik here to view.

Sprint Defaults and the Jeep Hack: Could Basic Network Settings Have...

Mobile SecurityVulnerability Research In mid-July, research into the security of a Jeep Cherokee was disclosed though a Wired article and subsequent Black Hat presentation. The researchers, Charlie...

View Article
Browsing all 698 articles
Browse latest View live