Episode 6: Global panel, AI & innovation
Our global retail panel discusses how AI, in particular, is taking an increasingly large role within the context of retail IT innovation and within regional markets.
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attempt. As we’ve seen in the past, this […]
CMX Takes the Stage at DevNet Hackathon at #CLUS 2014
Earlier this week you learned about the network at Cisco Live! If you attended the event this year, you'll also have noticed that there was a brand new extension...
Attack Analysis with a Fast Graph
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]
Angling for Silverlight Exploits
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering. httpv://www.youtube.com/watch?v=Yrc0U3pjVZM Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we […]
Cisco CMX & Monetization @ MWC 2014
Mobile World Congress 2014 continues this week in Barcelona with record attendances. Many SP's are exploring new ways to monetize...
CMX, Analytics and Intelligence @ MWC 2014
Mobile World Congress 2014 is underway at Fira Gran Via in Barcelona, Spain. As well as providing the WiFi network to...
Big Data in Security – Part V: Anti-Phishing in the Cloud
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing […]