06 Apr 2022

The Critical Infrastructure Defense Project: Free, Premium Cybersecurity Services Available to Hospitals and Utilities

As Western companies continue to break ties with the Russian State (as an extension of the sanctions imposed on Russia by the U.S. and NATO),  three U.S. cybersecurity companies in the U.S. are addressing the ongoing threat of potential cyber-attacks in the U.S.  by making their platforms available to critical infrastructure entities, including the energy and healthcare sectors. Crowdstrike (endpoint protection), Ping Identity (two-factor authentication) Cloudflare (DDoS attack protection, amongst other tools) are making their services available for free to high-risk, critical infrastructure such as utilities and hospitals. 

Read More
05 Apr 2022

IriusRisk’s Open-Threat Model (OTM) Standard Available via Creative Commons License

In 2014, Elon Musk applied the open-source philosophy to Telsa patents (to foster innovation and “create a common, rapidly-evolving technology platform”) making all the company’s patents available for public use. The automated threat modeling company IriusRisk may have similar motivations for the rapid market creation of an open-standard threat modeling tools marketplace, with the added incentive of the enormity and ferocity of the threat faced by CISOs and cybersecurity professionals daily.  A scalable, replicable, open-source threat modeling standard is a brilliant space for innovation – and the timing could not be better.

Read More
07 Mar 2022

Russia Is Not Following Its Own Blueprint for Success in Cyberspace Against Ukraine

More than a week into its invasion of Ukraine, by many accounts the Russian military effort is not going as well as expected. Some movements have stalled, impacting Russian force supplies and prompting a 40-mile convoy to address these shortcomings. There is a general consensus Moscow has miscalculated its ability in winning the conflict quickly, strengthening Ukraine’s resolve against its belligerence and allowing the global community to unite against its malfeasance and providing financial and material aid to Ukraine. Moscow has had to rethink its initial campaign strategy.

Read More
02 Mar 2022

Chinese Company Outs U.S. Cyber Espionage and Sends a Message

In late February 2022, Qi An Pangu Lab, a Chinese cybersecurity company, “declassified” technical details of a cyber espionage campaign allegedly perpetrated by an elite hacking group working under the U.S. National Security Agency (NSA). Per the company’s findings, these state actors dubbed the “Equation Group” by the cybersecurity community created an advanced backdoor that was used to monitor approximately 45 countries for over a decade.

Read More
02 Mar 2022

Cyber Incident Reporting Rule for Critical Infrastructure Approved by U.S. Senate

Hours before the State of the Union address, the Senate unanimously passed the Strengthening American Cybersecurity Act,  which is actually various bills that have now been made into one piece of legislation. Months ago, the measures had previously been removed from the annual defense policy bill.

Read More
03 Feb 2022

Cyber Safety Review Board Launched by DHS

Consistent with our analysis back in November ’21 – Cybersecurity and Cyber Incidents: Innovation and Design Lessons from Aviation Safety Models and a Call for a “Cyber NTSB” – the DHS has now established a Cyber Safety Review Board.   The announcement was made today by the DHS. 

Read More
01 Feb 2022

Renewed Interest in Hack-Backs Is a Step in the Wrong Direction

In mid-2021, members of the Senate Finance Committee introduced Bill S2292, which directed the Department of Homeland Security (DHS) to study the potential pros and cons of allowing private companies to hack back against perpetrators that attack their organizations. Dubbed the “Study on Cyber-Attack Response Options Act,” the bill is the government’s attempt to address the substantial volume of cyber malfeasance against the United States’ public and private sectors being conducted by both state and non-state actors alike.  Emilio Iasiello breaks it all down.  

Read More
05 Jan 2022

Services Australia brushes off vulnerability concerns in COVID-19 digital certificates

Services Australia has received criticism due to its lack of concern over security risks in Covid-19 digital certificates. The company was grilled by senators in Australia’s federal Budget Estimates last year over various initiatives such as the Covid-19 digital certificate rollout and the bungled robo-debt scheme. According to senators, there

Read More
13 Dec 2021

A Call to Action from CISA’s Jen Easterly and Def Con’s Jeff Moss at Inaugural CISA Advisory Committee Mtg.

In the first meeting of the Cybersecurity and Infrastructure Security Agency’s (CISA) new Cybersecurity Advisory Committee, CISA Director Jen Easterly made clear to the committee members their working model would be action-based, not the usual passive mode assumed by an advisory body, telling the group:  “I welcome this group creating action. This is really just not about being a talking club. This is about leveraging your expertise, your perspective, to make the nation safer.” Advisory Committee Member, Def Con Founder Jeff Moss, also offered his perspective on how best to engage the hacker community.

Read More
29 Nov 2021

Google Cybersecurity Action Team Releases First Cloud Threat Intel Report

Google’s Cybersecurity Action Team was launched in early October of this year, as part of the company’s $10 billion pledge to strengthen cybersecurity, all of which grew out of the launch in August, by CISA Director Jen Easterly, of the CISA JCDC (Joint Cyber Defense Collaborative). Google is a partner company with CISA in the JCDC. The Cybersecurity Action Team’s efforts begin with Google Cloud. They recently released their first publicly available intelligence offering – Threat Horizons, Cloud Threat Intelligence, November 2021, Issue 1.

Read More