Get In Touch
BSides Boston 2015 takes place Saturday, May 9 at Microsoft, and organizers have issued their call for papers. WHAT: Security BSides Boston 2015 Call for Presentations/Papers WHO: Your awesome 45 minute presentation on a security/tech/hacking topic. Marketing/advertising presentations will be rejected. WHEN: Deadline for submissions: March 1st midnight EST WHERE: 1 Cambridge Center, Cambridge, Massachusetts HOW (Format): Talk Title (under 10 words)200ish words abstract with links to any pertinent backup
In two weeks I'll give a presentation and participate in a panel discussion at SecureWorld Boston 2015. The event takes place March 4-5 at the Hynes Convention Center. Akamai is a gold sponsor. My talk, March 4 from 8:30-9:15 a.m., is called "Attack Techniques and Defenses." I'll explain how the bad guys are targeting companies and how to fight back based on threat research and remediation techniques used by Akamai
A look at security news from around the Web. The Great Bank Heist, or Death by 1,000 Cuts? (KrebsonSecurity) A look at the Carbanak gang, which deployed malware via phishing scams to get inside of computers at more than 100 banks and steal upwards of USD $300 million -- possibly as high as USD $1 billion. Google Adds Grace Period for Software Developer to Fix Security Flaws (eWeek) In what
The bad guys are using a fairly new technique to tamper with the Microsoft SQL Server Resolution Protocol (MC-SQLR) and launch DDoS attacks. In an advisory released this morning, Akamai's Prolexic Security Engineering & Response Team (PLXsert) described it as a new type of reflection-based distributed denial of service (DDoS) attack. PLXsert first spotted attackers using the technique in October. Last month, researcher Kurt Aubuchon studied another such attack and
Microsoft has released its February 2015 security bulletin. Windows, Internet Explorer, Group Policy and Office are among the affected items. The full patch matrix is below.More Akamai perspective on patching and vulnerability management:Akamai University: Vulnerability Management vs. Pen TestingTen Years After the Blaster WormBug Bounty Programs: A Turning Point for Microsoft
Awhile back, after we ran a post about SEA's phishing activities and DNS attacks, my old friend Dave Marcus -- director and chief architect of McAfee's Federal Advanced Program Group -- took issue with our advice that companies continue to push for better security awareness among employees and customers.
Having been asked to speak at a security event in Boston next month, I find myself thinking about the art of public speaking. Whether you're in sales, marketing, InfoSec or finance, it's increasingly important to have the ability to get in front of a crowd and articulate your message. The Akamai InfoSec team must do so at orientations for new employees, along with HR and other departments. And some of
I've seen way too many security advisories over the years to count. The more critical the issue, the more publishable it was. But that was my perspective as a journalist working for news organizations. In the current role, I'm seeing things from the beginning of the internal vetting process. There's a lot we want to make public, but there's a lot we have to keep to ourselves.
During my time as CSOonline's Salted Hash blogger, I wrote something I'd forgotten about until rediscovering it the other day. Three years after writing it, I think this post is still relevant.