StealthWatch Labs Blog
POSTED BY Tom Cross on 09.17.2014
One of the concerns that has been raised about the Heartbleed vulnerability is that it was introduced into the OpenSSL code base several years ago, and it’s possible that some attackers were aware of it and launching attacks before it was publicly disclosed this week. Unfortunately, the attack,...
POSTED BY Tom Cross on 09.05.2014
In the last several installments of this blog post series, we spent some time talking about 1) the different types of insider threats, 2) how to combat each one, and 3) how network logs can play a vital role in thwarting all of the various insider threat actors. Below is a Top 10 List recapping...
CATEGORIES: 
POSTED BY Tom Cross on 08.21.2014
In Part 2 of this blog series, we discussed various security tools that can be used to detect and subvert the different classes of insider threats. While each type of insider threat requires different security measures, one technique that can help tremendously across the board is the monitoring of...
POSTED BY Tom Cross on 08.05.2014
Last year Edward Snowden revealed that the NSA is collecting the telephony metadata of millions of Americans. This revelation has sparked a debate about the power of metadata. Supporters of the program have attempted to reassure the public that their privacy is not being violated because the...
POSTED BY Tom Cross on 08.04.2014
Part 1 of this blog post series explained the various types of insider threats lurking on enterprise networks. Due to their variant characteristics, each type requires a separate set of security controls. In this post we outline the different defensive measures that can be put into place to address...
POSTED BY Tom Cross on 07.28.2014
In a recent survey conducted by Lancope , the insider threat was a major concern for respondents, with 40 percent citing it as a top risk to their organization. Recent news events such as the WikiLeaks disclosures have also brought the insider threat into focus. But what do people really mean when...
POSTED BY on 06.12.2014
Earlier this month, the U.S. Department of Justice issued a press release announcing a criminal complaint against “a leader of a tightly knit gang of cyber criminals based in Russia and Ukraine that is responsible for the development and operation of both the Gameover Zeus and CryptoLocker schemes...
POSTED BY on 04.28.2014
Malware comes in all sorts of shapes and sizes with new types constantly being discovered. Many times these newly discovered malware families stay out of the public eye, however that’s certainly not the case for Cryptolocker. Lancope is helping to protect our customers by incorporating Cryptolocker...
POSTED BY Tom Cross on 04.10.2014
Monday night marked the disclosure of the biggest software vulnerability so far this year, known as the “Heartbleed” bug, which affects the OpenSSL cryptographic software library. Unfortunately for businesses and end users, OpenSSL is used practically universally across the Internet as a standard...
POSTED BY Charles Herring on 03.17.2014
The Challenges of Trust Traitors have been making history throughout the ages. Some traitors are regarded as revolutionaries. Some are infamously despised. Regardless of how history regards an individual that betrays his current allegiance, it is categorically devastating for the betrayed...

Pages