Stories by David Geer

Hackers inside Chinese military steal U.S. corporate trade secrets

By David Geer | 23 July, 2014 02:55

In May, a grand jury in the Western District of Pennsylvania indicted five members of the Chinese military on charges of hacking and economic espionage, according to a May 19 U.S. Department of Justice media release. Per the same release, the targets were six U.S. enterprises operating in the solar products, nuclear power, and metals industries. The attacks began as early as 2006 and were carried out over many years and into this year, according to the same release.

Hackers capture dynamic data to prepare for effective, stealthy attacks

By David Geer | 06 May, 2014 05:51

"Offensive forensics is an attack technique hackers use to capture non-static data that can be useful in performing further attacks," says Joe Sremack, Principal, Berkeley Research Group, LLC, a computer forensics and e-discovery firm.

Bad bots on the rise: A look at mobile, social, porn, and spam bots.

By David Geer | 01 May, 2014 03:41

From 2012 to 2013, Incapsula, a website security firm focusing on CDN solutions as load balancing, found that bot traffic went from consisting of 51 percent to 61.5 percent of all Internet traffic, a 10.5-percent increase. Thirty-one percent of those bots are malicious, according to data from the report.

Can data lakes solve cloud security challenges?

By David Geer | 18 March, 2014 16:52

"Data Lake" is a proprietary term. "We have built a series of big data platforms that enable clients to inject any type of data and to secure access to individual elements of data inside the platform. We call that architecture the data lake," says Peter Guerra, Principal, Booze, Allen, Hamilton. Yet, these methods are not exclusive to Booze, Allen, Hamilton.

Box, Dropbox, or drop both?

By David Geer | 10 March, 2014 16:49 | 1 Comment

"There are four critical questions every enterprise and IT administrator should ask when considering file sharing services," says Adam Gordon, author of "Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)." These include: Where will the service store and share files? Who will view the files? How will the service protect the files? And, what types of files will the service permit in the storage system? If a service provider doesn't respond satisfactorily, CISOs should consider their options.

Why security should monitor social media to prevent violence

By David Geer | 18 February, 2014 16:31

The lone actor

Statistics point to increased physical danger risks of cyberterrorism

By David Geer | 12 February, 2014 21:06

"Traditional terrorism refers to violent acts that indiscriminately target civilians," says Jon Iadonisi, former Navy SEAL, cyber security expert and co-founder, White Canvas Group. Traditional terrorists are largely interested in achieving or thwarting political or ideological goals in the process. "Cyberterrorism invokes the specific use of computer networks to induce violence against innocent civilians," says Iadonisi.

The Internet of Things: Top five threats to IoT devices

By David Geer | 09 January, 2014 17:11

The Internet of Things (IoT) is a mass of billions of connected devices from cars to wireless wearable products. Cisco's Internet Business Solutions Group estimated 12.5 billion connected devices in existence globally as of 2010 with that number doubling to 25 billion by 2015.

Big Data security, privacy concerns remain unanswered

By David Geer | 05 December, 2013 22:43 | 3 Comments

Approaches to storing, managing, analyzing and mining Big Data are new, introducing security and privacy challenges within these processes. Big Data transmits and processes an individual's PII as part of a mass of data--millions to trillions of entries--flowing swiftly through new junctions, each with its own vulnerabilities.

Best practices for safely moving data in and out of the Cloud

By David Geer | 11 November, 2013 17:45

As everyone knows, Cloud provider, Nirvanix, recently fell apart, declaring bankruptcy and leaving its customers in the lurch. Nirvanix gave enterprises less than a month to move their data to a new home. To avoid the fate of those customers, follow these best practices for safely moving data in and out of the Cloud.

Data breach notification laws, state and federal

By David Geer | 01 November, 2013 22:10

State and federal data breach notification laws have changed and are expanding more than a little bit. CISOs and CSOs should start here to expand their knowledge of the increasingly restrictive notification requirements that apply to their organizations.

The dangers of QR codes for security

By David Geer | 19 August, 2013 19:27

A large number of end-user computers are mobile devices and the lion's share of those are smartphones. APTs are increasingly targeting the mobile market.

3 things to consider before buying into Disaster Recovery as a Service

By David Geer | 01 July, 2013 14:45

Disaster Recovery as a Service (DRaaS) backs up the whole environment, not just the data.

How to determine your company's real risk appetite

By David Geer | 26 February, 2013 20:46

In a 2012 customer survey conducted by the Corporate Executive Board (CEB), 70 percent of respondents said they do not have a formal risk-appetite approach in place. "Seventeen percent said they have something in place that is actually working," confirms Matt Shinkman, senior director of risk management research and advisory at the CEB.

Cloud security rebuttal: Don't rebuke the many for the sins of the few

By David Geer | 22 January, 2013 14:35

Long-time cloud security advocate Chris Hoff challenges our recent '7 deadly sins' story

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Email Gateway

Clearswift SECURE Email Gateway is an effective and resilient email gateway for 50 to 50,000 users.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.