article thumbnail

Interview with the Head of the NSA’s Research Directorate

Schneier on Security

MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. ” Making sense of vast stores of unclear, often stolen data in hundreds of languages and even more technical formats remains one of the directorate’s enduring tasks.

Big data 276
article thumbnail

Data flow vs. data security dilemma for China Didi

CyberSecurity Insiders

CAC alleges Didi has breached many laws pertaining to personal data collection, storage and security and will face legal consequences if it fails to further comply with its orders. On business perspective, Didi Chuxing Technology Co.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

The Sandworm group (aka BlackEnergy , UAC-0082 , Iron Viking , Voodoo Bear , and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). Poseidon is a Linux backdoor that supports a full range of remote computer control tools.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. China denied having done so , of course.

article thumbnail

Scott Hermann, CEO of IDIQ, Joins Entryway’s National Board of Directors

Identity IQ

Hermann’s deep expertise in identity theft protection, credit and financial education and leveraging data to implement scalable business solutions will immediately benefit Entryway as the organization works to create efficiencies through data collection to serve a greater number of at-risk individuals and families across all of its program markets.

article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Subsequent analysis revealed earlier instances of suspicious code dating back to 2017. Importantly, our investigation, which considered binary timestamps, indicated that this exploit was created prior to April 2017. It is worth noting that the EternalBlue exploit was publicly disclosed by the Shadow Brokers group on April 14, 2017.

Malware 118
article thumbnail

Rapid7 InsightIDR Review: Features & Benefits

eSecurity Planet

Rapid7 combines threat intelligence , security research, data collection, and analytics in its comprehensive Insight platform, but how does its detection and response solution – InsightIDR – compare to other cybersecurity solutions? These firms include Logentries in 2015, Komand in 2017, and DivvyCloud in 2020.

DNS 131