Computer Security Experts Kyrus, Syndis Announce Strategic Partnership
Partnership designed to address increasing demand for security services in international markets WASHINGTON – Cyber security solutions developer and service provider Kyrus announced today that it has...
View ArticleKyrus in the Land of Ice and Snow
The hammer of the gods drove Kyrus CEO Dan Hall and me to Reykjavik to participate in the launch of Syndis, which is a new – and the only pure-play – computer security consultancy in Iceland. If your...
View ArticleKeith Jones Quoted Twice About the Boston Marathon Bombings in Computerworld
In case you missed it, I was quoted twice in Computer World about the Boston Marathon Bombings and how computer forensics can play a role in catching criminals that performs their crime in the physical...
View ArticleComputer Forensics “Expert’s Expert” Keith Jones Joins Kyrus
Renowned and highly respected computer forensics expert leads rapidly growing forensics and incident response practice WASHINGTON – Computer security solutions developer and service provider Kyrus...
View ArticleThe Coolest Computer Security Conference of the Year
Kyrus is proud to announce its sponsorship of Nordic Security Conference 2013, which is being put on by our Icelandic partners Syndis! This is our first year sponsoring NSC and the second year of the...
View ArticleThe Real Persistent Threat
Among the many issues associated with the revelations of Edward Snowden, one stands out among the speculation and sensation: the risk posed by those who have the keys to your digital kingdom. A system...
View ArticleNordic Security Con 2013 – Trip Report
Nordic Security Con is the most technically focused computer security conference held in Scandinavia. Organized by our partners at Syndis, Dan Hall (CEO) and Mike Tanji (CSO) were once again proud to...
View ArticleFive Things You Won’t Do To Combat Cyber Threats
There is no shortage of people who are prepared to offer you gentle, painless, feel-good advice about what you should do to help improve your company’s computer security posture and minimize...
View ArticleCryptoLocker FAQ
There is a lot of confusion about the latest piece of ransomware now making the rounds on the Internet, known as “CryptoLocker”. This FAQ intends to clear up this confusion and understand your data...
View ArticleWhy you can’t hire your way out of your cyber security problem
Richard Stiennon wrote in Forbes the other day that the solution to the problem of not enough cyber security talent isn’t more STEM education it’s the teaching of tools and very specific skills. If...
View ArticlePeople: The Real Persistent Threat
In 2002 the sys admin for a financial firm planted a logic bomb in his soon-to-be-ex-company’s computer with the idea of shorting their stock and making a fortune when the bomb went off. Two years ago...
View ArticleNo Accountability, No Peace (of mind)
Thanks to the ever vigilant Richard Bejtlich for pointing out Jeremiah Grossman’s slides on the idea of INFOSEC security guarantees. Reading them reminded me of a saying, the exact wording of which I...
View ArticleComputer Security Violations: When to Punish and Who Should Do It?
“Someone who fails every single phishing campaign in the world should not be holding a TS SCI [top secret, sensitive compartmentalized information—the highest level of security clearance] with the...
View Article
More Pages to Explore .....