article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

As detailed in my 2014 book Spam Nation , Vrublevsky not-so-secretly ran a pharmacy affiliate spam program called Rx-Promotion , which paid spammers and virus writers to blast out tens of billions of junk emails advertising generic Viagra and controlled pharmaceuticals like pain relief medications. . In 2013, Vrublevsky was sentenced to 2.5

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

There’s been a major data breach, and you’re booked on the next night flight out, at 6am. You know, in this case, for cloud to take down the whole cloud environment, you will need a hell of a DDOS say, you know, so you'd be able to manage those a lot better. It’s 3am and the call comes in.