How a simple office prank can lead to serious damage

Harry had been raising hell for about ten minutes already. He had a habit of finding fault in everything, from the signature in a letter not following the template to papers being stacked improperly. But today, in fairness, his complaints had some merit: John had failed to send a draft report yesterday. Nevertheless, he didn’t have to yell. After all, no one would have been around to open it the previous evening.

Rocking IT

As I didn’t get to attend Blackhat, BsidesLV, Defcon this year, I’ve been reading up on writeups from people that did attend to catch up on all the good knowledge that was shared.

Top 10 MITRE ATT&CK™ Techniques

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework (https://attack.mitre.org/) is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” One of the most beautiful parts of the MITRE ATT&CK™ Framework is that its information can be analyzed to answer a wide variety of different questions.

Open Source License Comparison: Connecting — and Contrasting — the Dots

Delving into the world of open source license comparison is not for the faint of heart. Copy-left this, permissive that, and what, in the name of GNU, is the difference between GPL 2 and GPL 3 With over 80 OSI-approved open source licenses out there, and hundreds of others floating around the open source ecosystem, putting together an open source license comparison is no easy feat. 

UK FinTech CashFlows Continues Growth With Akamai In Face Of Increasing Cyberthreats.

Akamai (NASDAQ: AKAM), the intelligent edge platform for delivering and securing web experiences, today announced it is protecting CashFlows, an innovative FinTech offering comprehensive merchant services, alternative payments, and BIN Sponsorship solutions (card issuing and ATMs), from the growing threat of Distributed Denial of Service (DDoS) attacks against its cloud-based services.

Side-Channel Attacks: Cyber Warfare’s New Battleground

The current state of cybersecurity is complex, fast-moving and a critical risk to all organizations. Understanding where U.S. businesses stack up in terms of their security knowledge and defense strategy is of utmost importance. It’s critical that leaders—from enterprise to small business and government—gain more awareness of one of the greatest challenges cybersecurity is currently facing.

Splunk To Buy Cloud-Monitoring Software Maker SignalFx For $1.05 Billion

Splunk Inc. reached a $1.05 billion deal to buy cloud-monitoring startup SignalFx Inc., a deal that would strengthen the cybersecurity and data-analytics firm’s offerings in the fast-growing cloud-computing sector. The Wall Street Journal reports: Founded in 2004, Splunk — a play on the word “spelunking” — collects and analyzes data to help companies identify patterns, like customers’ beverage preferences, and detect anomalies, say fraud or a cyberattack. Splunk officials told analysts that Splunk has some customer overlap with San Mateo, Calif.-based SignalFx and that the target company’s software represents a “top tier asset to the things that matter” to clients. Closely held SignalFx was valued at nearly $500 million after a $75 million funding round that closed in May, according to a Dow Jones VentureSource estimate.

The cash-and-stock deal is expected to close in the second half of Splunk’s fiscal year, which ends Jan. 31. San Francisco-based Splunk, which went public in 2012 and carries a nearly $1.5 billion deficit, said it would be able to absorb the added operating costs from the deal. Splunk has been increasing its cloud business, which accounted for 25% of revenues in the July quarter and is expected to represent half of operations over the next few years, company officials said.