Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

AWS GuardDuty: Human Security Employment Will Become Moot →

November 30, 2017 by Marc Handelman in Information Security Jobs, Cybersecurity Jobs, SecDevOpps Jobs, Intelligence, Intelligence Sharing, Information Security, Cybersecurity, Analytics, Security Economics, Security Architecture, Security, Security Automation

The apparent beginning of the end for certain information and cyber security employment categories: Behold the newly minted Amazon.com, Inc. (NASDAQ: AMZN) AWS GuardDuty... H/T via the inimitable Trey Blalock of Firewall Consultants and Verification Labs.

November 30, 2017 /Marc Handelman
Information Security Jobs, Cybersecurity Jobs, SecDevOpps Jobs, Intelligence, Intelligence Sharing, Information Security, Cybersecurity, Analytics, Security Economics, Security Architecture, Security, Security Automation

Canada's Communications Security Establishment, Assemblyline →

October 23, 2017 by Marc Handelman in Canadian Forces, Canada, America's Allies, Analytics

The CSE has published the sourcecode (via an Atlassian Bitbucket repository) for the organization's malware analytical toolkit. Outstanding. H/T

October 23, 2017 /Marc Handelman
Canadian Forces, Canada, America's Allies, Analytics

XKCD, State Word Map →

June 02, 2017 by Marc Handelman in All is Information, Analytics, XKCD, Measurement, Sarcasm, Humor

Another sarcastically superb analytics mapping bit of tomfoolery? No, it's the real deal - well, maybe... via the superlative talent of Randall Munroe at XKCD.

June 02, 2017 /Marc Handelman
All is Information, Analytics, XKCD, Measurement, Sarcasm, Humor

Splunked, The Leak →

April 06, 2017 by Marc Handelman in All is Information, Analytics, Attack Analysis, Data That Is Big, Information Sciences, Information Security

via the eponymous Richard Chirgwin, whilst writing at El Reg, comes this unfortunate tale of security flaws within Splunk Enterprise (now, happily patched). First discovered by John Page (aka hyp3rlinx), and published via an advisory at Full Discosure. Here's hyp3rlinxs' source.

For the Record: We have always been pleased with Splunk products, and, most importantly, they are fast and focused when fixing issues.

The takeway? Make an effort to be extraordinarily cognizant of the threats posed by log and machine generated data aggregation in the enterprise. That is all.

April 06, 2017 /Marc Handelman
All is Information, Analytics, Attack Analysis, Data That Is Big, Information Sciences, Information Security

Machine-Based Investigation: Fully →

March 14, 2017 by Marc Handelman in All is Information, Analytics, Computation, Data That Is Big, Exploration, Fingerprinting, Information Sciences, Intelligence, Robots, Machine Learning

via Motherboard writer Michael Byrne, comes this well-wrought piece on the apparent proliferation of 'bots on Twitter, ie., the implications of algorithm-driven entities on the Twitterverse. The fascinating component to this study by Onur Varol, Emilio Ferrara, Clayton A. Davis, Filippo Menczer and Alessandro Flammini, was the utilization of a machine-learning apparatus (and the feature-sets therein) to tease out the truth. Additional documentation (in the form of the paper) is available on arXIv. Today's MustRead.

"Part of what makes the new research interesting is the sheer number of features used in the classification model..." - Motherboard's Michael Byrne

March 14, 2017 /Marc Handelman
All is Information, Analytics, Computation, Data That Is Big, Exploration, Fingerprinting, Information Sciences, Intelligence, Robots, Machine Learning

Fingered →

January 16, 2017 by Marc Handelman in Accountability, All is Information, Analytics, Application Security, Attribution, Cybersecurity, Fingerprinting, Forensication, Information Security, Web Security

Relatively new fingerprinting techniques were brought to my attention last week (H/T), that (reportedly) focus on the identification of browser users and utilization across multiple application deployments. Enjoy.

January 16, 2017 /Marc Handelman
Accountability, All is Information, Analytics, Application Security, Attribution, Cybersecurity, Fingerprinting, Forensication, Information Security, Web Security

PREDATOR →

October 31, 2016 by Marc Handelman in All is Information, Analytics, Alternate Attack Analysis, Machine Learning, Information Security, Cybernetic Crime

PREDATOR – Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration, described in the released paper, details the newly developed capability to predict bad-behavior (in this case criminally bad behavior), with the use of analytics at the time of domain registration. Created by Nick Feamster, Shuang Ho, Alex Kantchelian, Brad Miller and Vern Paxson. Outstanding.

"Princeton professor Nick Feamster and University of California Santa Barbara PhD student Shuang Ho worked with Alex Kantchelian (UC Berkley), Google's Brad Miller and Vern Paxson of the International Computer Science Institute to create PREDATOR – Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration...." "The important numbers are: the researchers say PREDATOR identified 70 per cent of domain registrations that were later abused; and they claim a false positive rate of just 0.35 per cent." - via El Reg's Richard Chirgwin

 

October 31, 2016 /Marc Handelman
All is Information, Analytics, Alternate Attack Analysis, Machine Learning, Information Security, Cybernetic Crime

Surveilled Online, The Super Cookie Effect →

December 11, 2015 by Marc Handelman in All is Information, Analytics, Information Security, Identity Theft

via The Security Ledger, comes this outstanding piece detailing malicious data analytics driving super cookie use [the so-called 'Evercookie]'], and focusing on "individuals with links to international diplomacy, the Russian government and the energy sector." Today's Must Read

December 11, 2015 /Marc Handelman
All is Information, Analytics, Information Security, Identity Theft