Quantcast
Channel: » People
Browsing all 13 articles
Browse latest View live

Computer Security Experts Kyrus, Syndis Announce Strategic Partnership

Partnership designed to address increasing demand for security services in international markets WASHINGTON – Cyber security solutions developer and service provider Kyrus announced today that it has...

View Article



Kyrus in the Land of Ice and Snow

The hammer of the gods drove Kyrus CEO Dan Hall and me to Reykjavik to participate in the launch of Syndis, which is a new – and the only pure-play – computer security consultancy in Iceland.  If your...

View Article

Keith Jones Quoted Twice About the Boston Marathon Bombings in Computerworld

In case you missed it, I was quoted twice in Computer World about the Boston Marathon Bombings and how computer forensics can play a role in catching criminals that performs their crime in the physical...

View Article

Computer Forensics “Expert’s Expert” Keith Jones Joins Kyrus

Renowned and highly respected computer forensics expert leads rapidly growing forensics and incident response practice WASHINGTON – Computer security solutions developer and service provider Kyrus...

View Article

The Coolest Computer Security Conference of the Year

Kyrus is proud to announce its sponsorship of Nordic Security Conference 2013, which is being put on by our Icelandic partners Syndis! This is our first year sponsoring NSC and the second year of the...

View Article


The Real Persistent Threat

Among the many issues associated with the revelations of Edward Snowden, one stands out among the speculation and sensation: the risk posed by those who have the keys to your digital kingdom. A system...

View Article

Nordic Security Con 2013 – Trip Report

Nordic Security Con is the most technically focused computer security conference held in Scandinavia. Organized by our partners at Syndis, Dan Hall (CEO) and Mike Tanji (CSO) were once again proud to...

View Article

Five Things You Won’t Do To Combat Cyber Threats

There is no shortage of people who are prepared to offer you gentle, painless, feel-good advice about what you should do to help improve your company’s computer security posture and minimize...

View Article


CryptoLocker FAQ

There is a lot of confusion about the latest piece of ransomware now making the rounds on the Internet, known as “CryptoLocker”. This FAQ intends to clear up this confusion and understand your data...

View Article


Why you can’t hire your way out of your cyber security problem

Richard Stiennon wrote in Forbes the other day that the solution to the problem of not enough cyber security talent isn’t more STEM education it’s the teaching of tools and very specific skills. If...

View Article

People: The Real Persistent Threat

In 2002 the sys admin for a financial firm planted a logic bomb in his soon-to-be-ex-company’s computer with the idea of shorting their stock and making a fortune when the bomb went off. Two years ago...

View Article

No Accountability, No Peace (of mind)

Thanks to the ever vigilant Richard Bejtlich for pointing out Jeremiah Grossman’s slides on the idea of INFOSEC security guarantees. Reading them reminded me of a saying, the exact wording of which I...

View Article

Computer Security Violations: When to Punish and Who Should Do It?

“Someone who fails every single phishing campaign in the world should not be holding a TS SCI [top secret, sensitive compartmentalized information—the highest level of security clearance] with the...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images