SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Government, Liberty, and Cyber Security

By: Wedge Greene

The First Cyber War Recently it seemed likely that we were on the verge of the first, global cyber war. Large DDoS attacks that gradually escalated over the last 12 months gave rise, in mid-October, to a massive, prolonged, sophisticated, multi-front attack on Internet infrastructure. Now it appears this was malicious and not a state-supported attack. But this should not make us more relaxed. Before this fall, several years of successful and widespread state sponsored data hacking only resulted in squirreling away data for the attacker’s future advantage…

» read this article

Funding vulnerabilities through automated oppo

By: Tim Young

Fair warning: I’m about to make a reference to American electoral politics. But wait! Don’t click away! It’s not what you think. I’ll reference no candidate, successful or otherwise, by name, and this won’t be an article about Wikileaks or hacks by foreign governments or anything like that. So you can save all of those conversations for your uncomfortable Thanksgiving dinners. I’m talking about something else entirely. One bright spot about our overly long presidential campaigns is that they can teach those willing to learn about how the system works, warts and all…

» read this article

Countering Intelligent Malware: Neural Networks, AI, and Security

By: Wedge Greene, Trevor Hayes

Planners today are well acquainted with a positive feedback system. When coupled to a formal game scenario, one side’s advancing move becomes the baseline for the alternate players counter and then advance.  An arms race is a classic example. Cybersecurity is a classic arms race, but with many more opponents. Today’s cybersecurity game is far more complex than was the two player nuclear arms race. This cyber-arms race can become as deadly as any other when we consider that we are protecting computer-controlled infrastructure from serious disruption and failure…

» read this article

The Surprising and Dangerous Fifth Column Hiding Within the Internet of Things

By: Alan Zeichick

I can’t trust the Internet of Things. Neither can you. There are too many players and too many suppliers of the technology that can introduce vulnerabilities in our homes, our networks – or elsewhere. It’s dangerous, my friends. Quite dangerous. In fact, it can be thought of as a sort of Fifth Column, but not in the way many of us expected. Merriam-Webster defines a Fifth Column as “a group of secret sympathizers or supporters of an enemy that engage in espionage or sabotage within defense lines or national borders…

» read this article

Automating Cyber Security Incident Response: The Key to Stopping Breaches Before it is Too Late

By: Gabby Nizri

According to ongoing research conducted by the Breach Level Index, more than 3.5 million data records are lost or stolen every single day. Furthermore, the costs and ancillary damages stemming from security breaches also continue to rise. In fact, the 2016 Ponemon Cost of Data Breach report revealed that the average cost of just one security breach has risen to a whopping $4 million. Perhaps more noteworthy, however, was the study’s demonstration of a direct correlation between how quickly an organization can identify and contain data breach incidents, and their ability to mitigate subsequent financial consequences…

» read this article

Defending Against Ransomware with Cloud-Based Workspaces

By: Max Pruger

If you have been monitoring recent IT news events, you are probably aware of one of the most problematic threats impacting cybersecurity today - Ransomware. The growing concern over this potentially devastating malware targets victims by encrypting their computer files and demanding that they pay a financial ransom in order to receive a code that permits the recovery of their information. Recent research from security solution provider Kaspersky Labs noted that ransomware attacks have now surpassed advanced persistent network (APT) attacks as the premier threat to business IT infrastructure today…

» read this article

Harnessing the Game-Changing Potential of Internet of Things Starts with DDoS Security

By: Dave Larson

…

» read this article

Letter from the Editor - November 2016

By: Tim Young

“If you have built castles in the air, your work need not be lost; that is where they should be. Now put the foundations under them.” - Henry David Thoreau, Walden I know what Thoreau was getting at here. We should dream boldly and then work vigilantly to make those dreams a reality in order to avoid turning a worthy goal into a foolish, abstract pursuit. But on a different level, I love how this quote applies to security in a virtualized, cloud-based, IoT-loving, decentralized world. We have scattered our treasures into the wind, confident that they will be there when we want them…

» read this article

Telecom Industry News - November 2016

By: Jim Schakenbach

With all the talk of hacking, security, and fraud in the news this month, it seems fitting to start off with a review of some of the more notable news surrounding security issues and privacy. As robocalling quickly metastasized across the country this year, service providers found themselves inundated with consumer complaints. YouMail took a two-step approach to solving the problem, starting with a new application program interface (API) that enables telecom carriers, private branch exchange (PBX) providers, and third-party developers to programmatically determine whether a given phone number is an undesirable robocaller…

» read this article
FEATURED SPOTLIGHT

Latest Updates

Pipeline Memberships>




Subscribe to our YouTube Channel