Think In Graph!

Defcon is one of world’s largest hacker conference, often referred to as “hacker summer camp”. It is usually hosted in the summer time in Las Vegas, right after the Black Hat conference. This was my first Defcon attendance, so it was exciting to race between the villages and many talk tracks. There were so many…

Capital One Data Breach – What should we learn from it

A few days ago, a hacker breached and accessed the personal information of 106 million Capital One credit card holders or applicants across the US and Canada, in the latest massive data breach at a large company. Capital One Financial Corp., one of the nation’s largest issuers of credit cards, said that among the information…

Gartner Delivers Clarity and Guidance for Micro-Segmentation Technology

Micro-segmentation has been discussed in the Gartner Security Summits over the past several years, but this time, the topic has been placed in the spotlight during the Gartner Zone Theater. The presentation – Micro-segmentation Today: Deployment and Use Cases — has been scheduled multiple times over the course of the event. The theater has been…

Protecting Your Assets Against Invisible Stealth Attacks

Malware is becoming increasingly sophisticated in concealing itself, lurking in places in your network, servers and endpoints to deliberately avoid detection by traditional anti-virus tools and signature-based inspection. Stealth viruses can self-modify, or hide outside the OS, or in data, memory, partitions and bootsectors. They may hide quietly for months before launching an attack. This…

Wikileaks, Assange and Cyber Security

WikiLeaks founder Julian Assange was arrested at the Ecuadorian Embassy in London after Ecuador withdrew their asylum status after seven years. In response to the arrest, activist communities launched several attacks against the Ecuadorean government. Yesterday, Ecuador confirmed that over 40 million cyberattacks have hit public institutions in response to the arrest of Julian Assange….