Media

Jul 24
2017

Cyberspace of 2017 has become a free-fire zone with a multiplicity of actors. The dark-side of globalization resides in cyberspace. Corporations are regularly under siege from a multiplicity of threat actors. The cyber arms bazaar that flourishes around the world has allowed for criminals and nations to wage long term campaigns against corporations and government…

Jun 30
2017

This illustrates the stark reality that the half-life of the breach continues to wreak havoc on the reputation of a company, draining brand value, customer perception, and inevitably profits. Collateral damage associated with cyberattacks in 2017 will surpass the loss of customer data. The new face of cybercrime directly impacts a corporations reputation. Full Article:…

Jun 27
2017

“It is being used to start a forest fire, beginning in the Ukraine and spreading west.”- Tom Kellermann Watch Video: https://scvgroup.net/wp-content/uploads/2017/06/BBC-World-News-America_Kellerman-Intv-Cyber.mov

Jun 27
2017

A new cyberattack similar to WannaCry is spreading from Europe to the U.S. and South America, hitting port operators, disrupting government systems, and disabling operations at companies. Strategic Cyber Ventures CEO Tom Kellermann weighs in on “Bloomberg Daybreak: Australia.” Watch Video: https://www.bloomberg.com/news/videos/2017-06-27/kellermann-calls-petya-full-fledged-forest-fire-video

Jun 23
2017

Strategic Cyber Ventures has invited a number of people we admire to contribute to our blog. This week: Paul Donfried, Senior Vice President Corporate Development of ID Dataweb You may recall last year when the Bangladesh Central Bank was robbed for $81M. It was done through the use of stolen credentials. Similarly, the 2014 criminal…

Jun 23
2017

Tom Kellermann, CEO of cybersecurity investment strategy company Strategic Cyber Ventures in Wash- ington and a former member of the Commission on Cy- bersecurity under President Barack Obama, told Bloomberg BNA that, overall, companies must know their information supply chains and ask vendors the right questions. Specifically, they should know if vendors have con- ducted…

Jun 22
2017

Tom Kellermann, CEO of Strategic Cyber Ventures, said the research itself was sound, but he wasn’t convinced it was “foolproof or scalable” and worried this technique of scanning encrypted traffic could be modified “to find other types of data and allow for futuristic packet inspection and sniffing.” Full Article: http://searchsecurity.techtarget.com/news/450421296/Malware-in-encrypted-traffic-uncovered-with-machine-learning

Jun 19
2017

Kellermann advises using intrusion suppression to hunt for adversaries already in the network. This method requires businesses to alter their architecture for the purpose of detecting, deceiving, diverting, and containing adversaries who have broken in. Full Article: http://www.darkreading.com/attacks-breaches/rise-of-nation-state-threats-how-can-businesses-respond/d/d-id/1329171?