Get In Touch
Tenable Network Security commissioned media pro David Spark to produce videos during RSA Conference and BSidesSF 2015. Along the way, he caught up with Akamai Security Advocate Dave Lewis and myself. Here's the resulting interview.
State of the Internet Security Podcast Host Bill Brenner catches up with Akamai security advocates Dave Lewis and Martin McKeay. Friends and industry colleagues, the trio dissects RSA 2015 from a security expert perspective. Over the last few years, the RSA conference been considered an insider event with a structured theme and coinciding messaging - Brenner and team discuss the expansion of RSA into a major event lacking central messaging.
Update: In an earlier version of this bulletin, we discussed how chaotic actors were exploiting Google services as part of their operations. Some have misconstrued it as Google backing a botnet. To be clear, Google has no part in this activity, and certainly does not condone such activity.DD4BC, a malicious group responsible for several Bitcoin extortion campaigns last year, is expanding its extortion and distributed denial of service (DDoS) campaigns
State of the Internet Security Podcast Host Bill Brenner catches up with an old friend: Tenable Network Security's Jack Daniel. The two have been friends and industry colleagues for the last decade, having spent many a security conference in the trenches together. For travel to and from one such event, they shared a cramped RV from Boston to Washington, DC three years in a row. Some things have changed in
The Q1 2015 State of the Internet - Security Report is due out next month, and we think the week of RSA Conference 2015 is a good time to start previewing sections.Yesterday we reviewed the continuing trend of website defacements and DNS Hijacking. The day before that we reviewed the potential security risks of widespread IPv6 adoption. Today, we look at the significance of a 100 GBPS attack.
In response to the vulnerability discussed in the Microsoft disclosure at https://technet.microsoft.com/library/security/MS15-034, Akamai has analyzed its production servers and has determined it is not running any version of the software that is susceptible to the vulnerability. Akamai has created a permanent rule for the Trustwave® ModSecurity® Core Rule Set (CRS) and Akamai® Kona Rule Set (KRS) rule to help protect customer servers from attacks that exploit this vulnerability. This rule (3000031)
In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145. (1) Akamai's State of the Internet Report for Security, Q4, 2014,
Andrew Hay, BSidesSF volunteer and research director at OpenDNS, talks to Bill Brenner about the major security issues being discussed at this year's two-day BSides event, as well as problems with attack attribution, potential fearmongering and what we might expect at RSA. Hear the entire episode here
The Q1 2015 State of the Internet - Security Report is due out next month, and we think the week of RSA Conference 2015 is a good time to start previewing sections. Yesterday we reviewed the potential security risks of widespread IPv6 adoption. Today, we look at the continuing trend of website defacements and DNS Hijacking.