Using DNS for “Local” Threat Intelligence

In a session I attended at the RSA Conference in San Francisco, one of the panelists was asked a question in the Q&A section about detecting malware that stays entirely in memory, i.e. Avoiding detection by never writing itself to disk. The panelist’s answer was insightful; he stated that malware still needs to communicate with […]

“Father of the Internet” wasn’t thinking about attacks

Last Wednesday night I had the pleasure of attending a live interview with Vinton Cerf, one of the people credited as the “Father of the Internet” for his part in co-designing the networking protocol TCP/IP and the basic architecture of the Internet. He was speaking at City Arts and Lectures in San Francisco, in conjunction […]

Cloudmark’s 2015 Q1 Global Threat Report

With articles on the rise and fall of a major spammer, the pros and cons of DNSSEC, Canada’s Anti Spam Law, ransoming your data, home router compromises, and casino advertising that went too far, Cloudmark’s Threat Report for 2015 Q1 covers the latest in the cyber threat landscape. We normally imagine that most spam sent […]

RSA: Cyber War Games

One of the new features at the RSA conference this year is a series of Interactive Learning Sessions, where participants role play dealing with major security crises. I signed up for the very first one, National Cyber Crisis – Live Exercise Scenario, in which we spent two hours dealing with the threat of a nation […]

RSA: JitJea (Just In Time, Just Enough Administration)

In his keynote speech at the RSA conference, Scott Charney, Corporate Vice President for Microsoft’s Trustworthy Computing Group, spoke about the need for not giving too much power to system administrators. He suggested the solution was to implement JitJea: Just In Time, Just Enough Administration. That means giving your sysadmins just the access that they […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.