Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these thing
All Posts (5852)
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no
Social media is a conduit for thieves to get personal data (they can use it, for instance, to open up a credit line in the victim’s name). Though many people are concerned their personal information will get in the wrong hands, the funny thing is that they continue posting personal information—way too personal.
The FBI’s Internet Crime Complaint Center says that social media is a fertile area for criminals to scam people.
Phishing
You are lured to a phony website that masquerades as your bank or so
So someone comes up to you in a restaurant—a complete stranger—and asks to look at your driver’s license. What do you do? Show it to that person? You’d have to be one loony tune to do that.
However, this same blindness to security occurs all the time when a person is tricked by a “phishing” e-mail into typing in the password and username for their bank, or it may be the login credentials for their PayPal account or health plan carrier.
Phishing e-mails are a favorite scam of cyber criminals. THEY
When you write covered calls, you produce greater profits by writing six two-month covered calls per year, than you will realize writing one 12-month covered call per year. Time decay for further-out options is quite slow, so writing options more than few months away is equal to lost time. Based solely on option profits, focusing on short-term ATM or OTM contracts produces annualized double-digit returns.
An example of the covered call and how to identify profit, loss and breakeven points: You pu
Recently I got a puppy for my child. We decided to name the puppy 4wgu23x5#9. My wife,8yysH3m, thought we should name the dog 0x2%#b5. But I’m sure she’ll get over it. Meanwhile, I’m helping my older child with setting up a few social media accounts, and I suggested the two passwords: Rover and Spot.
Is there something wrong with this picture?
Of course! But this picture replays itself millions of times over all the time, as people name their passwords after their pets, family members or favorite
At least one woman is happy that her driver drove like a drunk. That’s because his erratic driving caught the attention of troopers who pulled him over. They then heard a woman calling for help—from the backseat. She was bound and gagged with a bag over her head.
The 41-year-old man had posted an ad on Craigslist; he wanted a submissive partner. His phony profile attracted the 22-year-old woman (who I must wonder, why would she be interested in a man who wants a submissive partner? Doesn’t this s
The absolute must for air travel is aviation safety. Proof of the seriousness in addressing the issue of aviation safety is the fact that the US has been taking steps to bring standards to improve aviation safety from almost the very beginning of commercialization of air travel. Aviation being the kind of activity that it is; aviation safety has to be so comprehensive that it should take into consideration all the possible factors that could contribute to a lack of it. This makes aviation safety
A core aspect of hygiene in any healthcare setting is the aspect pertaining to environmental cleaning. A proper environmental cleaning program should consist of a plan in which the healthcare unit ensures that the possibility of risk of infection is minimized. Prevention of infection is the main purpose of environmental cleaning. This is because hospitals are a very likely source of infections, given that people with almost all kinds of contagious diseases visit or stay in them. Since hospitals
I have completed a two-year study of a trading system, in which 578 trades were executed. 91.6% of these were profitable, resulting in an average annual return of 35%.
The system I used is that of relative correlation, which refers to the attributes of price movement and signals. These attributes, when all found together, create a powerful system for signal and confirmation.
This is based on the use of candlestick signals and other technical signals (including gaps, triangles, and wedges, f
I was reading an article by Ross Gittins in the Sydney Morning Herald the other day. He was discussing how the media is driving us to believe the world is in much worse shape than it actually is. As he explained, we are programmed to check for threats to our well-being and hence the news we are most drawn to is the bad news. Consequently, the media has found the easiest way to keep their distribution and website statistics up is to feed us plenty of bad news stories. Hence the “fear factor” heav
The King of Atlantis! The Protector of the Seas and Oceans! A beloved member of the Justice League! It’s none other than Aquaman! While he is most well-known for his ability to control marine animals and breathing underwater, he is also the superhero who poses the biggest threat to you online, according to Intel Security’s list of Most Toxic Superheroes.
Superhero movies and television shows are booming like never before. They have been resurrected and reinvented with the new and improved costume
Enrique Suarez Presenting:
WikiLeaks Email Release Reveals Hacking by Governments Worldwide
WikiLeaks last week published more than one million emails from the Italian surveillance malware vendor Hacking Team, shedding further light on the extent of the spying being conducted by governments around the world against their populations.
Emails in the searchable database disclose the company’s negotiations with intelligence and polic
ERM Software in Action
As discussed in part 1 of this blog series, many businesses do not formally recognize their critical risk networks. Without proper acknowledgment, fundamental risks remain essentially invisible. That being said, it’s vital to create conditions that enable a useful risk management network to be formed and used across the enterprise. So, how does this “right” network of problem solvers form?
Relatively routine problems can be solved by rapidly created, temporary teams that are
I have completed a two-year study of a trading system, in which 578 trades were executed. 91.6% of these were profitable, resulting in an average annual return of 35%.
The system I used is that of relative correlation, which refers to the attributes of price movement and signals. These attributes, when all found together, create a powerful system for signal and confirmation.
This is based on the use of candlestick signals and other technical signals (including gaps, triangles, and wedges, for exam
Benefits of the covered call include generation of income without added market risk. The comparison between the covered call and simply owning shares of stock demonstrates that added covered call income discounts the basis in stock, thus reducing market risk.
There are two criticisms of the covered call. First, if the underlying price declines below the discounted basis in stock (stock reduced by option premium), the overall position loses. However, if you own shares prior to opening the covered
In next couple of years there will be sweeping changes to existing Basel III Accord what will pave way for a new game changing regime called Basel 4. In obvious intent, the new Accord will raise risk-based capital ratio, revise risk weighting and move away from too much emphasis on model-based approach. One of key measures will be leverage Ratio.
It will stay ahead of 3% ratio as a front-stop measure. Another key measure will be balancing risk sensitivity with simplicity in the new regime. The Ba
When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
- Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but “Jaycina McArthur” just might. What comes up?
- See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every legitimate person is into the social media thing.
Here are
Talk about getting taken to the cleaners: Imagine you spot a great summer rental property advertised online. Looks wonderful. The deal sounds too good to be true, but the owner tells you (via e-mail or even phone) that the fee is correct. You apply for the rent and send in the required upfront payment.
Then you head down there for the first time to see an empty lot. It then dawns on you that the owner was really a crook who used some photo he found online and advertised it for rent. And if losing
Risks are known far in advance by at least one employee – and typically by several – on the front lines of every business. However, problems arise when managers lack mechanisms to escalate and connect their risks with the concerns shared by colleagues in other parts of the organization.
When critical business interdependencies are not formally recognized, they remain invisible, and the cumulative impact of these concerns is rarely addressed. Without the ability to identify connections between ris