1. Friday, October 16, 2015
    Driven in part by the onslaught of high-profile data breaches, such as Target, Sony, Anthem and Ashley Madison, the European Union (EU) is reforming its data protection legislation. The “General Data Protection Regulation (GDPR)” will replace the 1995 Data Protection Directive and is expected to go... READ MORE
  2. Thursday, October 15, 2015
    According to recent Interpol findings , cybercrime originating from Russia and Eastern Europe continues to increase, as attackers broaden their capabilities and gain technical sophistication. Recent headlines reveal the sophistication and stealth behind the global attacks to financial, government an... READ MORE
  3. Monday, October 12, 2015
    Experts predict that cyberattacks will intensify as cyber criminals accelerate their activities. To make matters worse, attackers have sharpened their skills and expanded their techniques over the last couple of years. Now, cybercrime has advanced to include cyber warfare and cyber terrorism as nati... READ MORE
  4. Friday, October 9, 2015
    Over the past three to five years, organizations have witnessed cyber attacks growing in scope, complexity, and severity. The nature of cyber attacks has evolved from the theft of financial data and intellectual property to include recent destructive attacks, causing cyber attacks to be seen as one... READ MORE
  5. Friday, September 25, 2015
    The prevailing opinion, amongst my comrades here at Fidelis Cybersecurity , and other notables in the cyberdefense community is that this agreement is flawed, and only a half measure. This will not stop or slow down the Chinese and their cyberspying campaigns. Here's my initial take on the agreement... READ MORE
  6. Friday, September 25, 2015
    Financial services organizations are especially attractive to attackers because they hold data that enables theft of money. And this is not only credit card numbers. In the past ten years, we have seen thieves target databases and point-of-sale terminals to collect mass quantities of credit card dat... READ MORE
  7. Thursday, September 24, 2015
    The bottom line is that, as the events of the past 12 months have demonstrated, healthcare information is an attractive target for attackers and the motivation will persist for the foreseeable future. While cyber attacks aren't unique to healthcare, this industry is highly targeted since companies a... READ MORE
  8. Tuesday, September 22, 2015
    With a weakening economy and Xi’s decision to build strategic military island bases in the South China Sea, China may not be in a position to turn off the information-spigot from the United States. Doing so could be political (and economic) suicide for Xi. READ MORE
  9. Friday, September 18, 2015
    Many malware campaigns use the same tools which all have built in configuration items that are either randomized or are free-form text fields created by the actor. Many of these fields can be used to correlate malware binaries to a specific likely actor. For example, one could use the password enter... READ MORE