• Working from home? Not so fast..@nicoleperlroth and the DHS talk on the dangers of remote access via http://t.co/NvkebGbWAZ
  • #blackhat2014 is just days away - which sessions are YOU planning to attend?
  • It's all about being resilient http://t.co/LSaPopl0zR via @yasin36 @InformationWeek #cybersecurity
  • RT @Mediabistro: WSJ’s Computer Systems Hacked http://t.co/cLVxOYme6U (via @FishbowlNY)
  • RT @SecMash: NSA whistleblower Edward Snowden plans to work on easy-to-use privacy tools http://t.co/xdYlmOdVCv #InfoSec
  • Reading @TechJournalist story on security flaws in hotel automation systems http://t.co/FwhNpRZE7c #blackhat
  • RT @CyberExaminer: US needs to restore trust following NSA revelations, tech groups say http://t.co/9KEk5aPMbn #infosec
  • Startling...31% of ITSec teams don't speak with company execs via @SCMagazine http://t.co/dpB30vj9Wc
  • RT @TheHackersNews: New Sophisticated Computer #Virus "Pushdo" Hacked into 11,000 Computers in just 24 Hours http://t.co/CAZ7sGv5AN http://…
  • Another day another #breach - this time with popular food chain P.F. Changs via http://t.co/pQLY6upuSF @nicoleperlroth
  • Yikes! Global impact of cybercrime estimated at more than $400 billion via @ErickaChick @DarkReading http://t.co/7oHsOTcbNi
  • RT @nicoleperlroth: Second Chinese Army Unit Implicated In Public and Private Sector Cyberattacks http://t.co/HKQReFBv9f
  • Breaking News via @nicoleperlroth for @nytimes 2nd chinese army part of cyberattacks against US http://t.co/LE6UuzVqId
  • @TonyBradleyBSG writes for @CSOonline on the future of #malware via http://t.co/IGfzffKNV3
  • Advanced Malware Analysis class just added to the training calendar for July 21st. Visit here for more info http://t.co/jmkN7WiJD6.
  • Iranian #cyber espionage operation utilizing social media to #hack targets: http://t.co/g950xvQNwT via @kjhiggins, @DarkReading
  • #Encryption policies get a boost in LA County after #databreach: http://t.co/cWG0w2UBCm via @SecurityHIT
  • Apple #iOS users devices in Australia are being #hacked & held for ransom: http://t.co/2auaP1cbiE via @TechJournalist, @eWEEKNews
  • SNMP #DDoS attacks spike, reports @kjhiggins: http://t.co/c0kHv3HnF0 via @DarkReading
  • Advanced Malware Analysis class just added to the training calendar for June 9-13. Click here for more information: http://t.co/jmkN7WiJD6
  • Recap from @wrash: indictments against Chinese, #Blackshades Ring, a bold move by #DOJ http://t.co/4rxZM1wFKO via @eWEEKNews
  • For the first time, US has charged foreign state employees with #hacking: http://t.co/YDpe9XjUZn via @PeteWilliamsNBC, @NBCNews
  • RT @cnnbrk: FBI & police in several countries arrested more than 100 people in crackdown on #Blackshades hackers http://t.co/AlWET1yBS4
  • The average enterprise network receives over 10,000 #security events a day: http://t.co/hFl2XLHhah via @kjhiggins, @DarkReading
  • Major retailers join R-CISC to share #cyberthreat #data: http://t.co/T7KH6SbMNS via @zachminers, @Computerworld
  • #PoS #malware is getting smarter: http://t.co/fx1Bj9fmyP via @InfosecurityMag
  • The most skilled #hackers are in Russia and Eastern Europe, states new report: http://t.co/ePxIKfFnSl via @InfosecurityMag
  • Execs and board members getting put in the hot seat after #databreach: http://t.co/nZag9P8AmD via @SCMagazine
  • Study finds having a #CISO can help reign in the impact of a #databreach: http://t.co/bO1vDfjH5v via @daniellewlkr, @SCMagazine
  • #Databreaches cost US companies an avg. of $201 per lost record in 2013: http://t.co/O2qvfqwbPC via @MessmerE, @NetworkWorld
  • Microsoft issues emergency fix for IE #security bug, including #XP, reports @techwriterjim: http://t.co/RLSXnXMgDS via @Reuters
  • Our threat intelligence dir. talks to @jpmello about the state of govt cyber vulnerabilities: http://t.co/tIuOTH1XMS via @technewsworld
  • Ken Silva of @ManTech says #communication early on is key after a #databreach: http://t.co/iDT6kgqAN6 via @kjhiggins, @DarkReading
  • #AOL urges users to change passwords as email #security breach unravels, reports @OneJaredNewman: http://t.co/QU8GR6J7DF via @CSOonline
  • Personal & financial #data #breaches happening undercover as #DDoS attacks: http://t.co/RqmwRkGdCx via @Mike_Mimoso, @threatpost
  • Iowa State #breach believed attackers wanted to mine for coin, reports @SteveD3: http://t.co/e5wu0ahcKW
  • 94% of #security incidents fall into 9 attack patterns, states #Verizon #databreach report: http://t.co/h08QfjWviu via @ldignan, @ZDNet
  • Months later, Michaels confirms 3 million cards were impacted from #databreach: http://t.co/zg1wClrkEG via @briankrebs
  • New report shows that people are perceived to be biggest #security problem for #IT: http://t.co/cDtx9X5Efy via @InfosecurityMag
  • Hardware company LaCie confirms year-long #databreach: http://t.co/AXIDLWWOri via @briankrebs
  • 7 key components to start your incident response plan, from @ManTech president Ken Silva: http://t.co/QEmGZpIhVY via @ITBusinessEdge
  • A #cybersecurity info sharing & intelligence center for retail industry to be set up by June: http://t.co/jPFMqZSBj0 via @Reuters
  • Nearly 80% of internet users want greater #data regulation: http://t.co/wBwiTpDO2b via @GrantGross, @NetworkWorld
  • Free #Heartbleed plug-in risk scanner released for #Firefox and #Chrome: http://t.co/LIHCC4SDTz via @kjhiggins, @DarkReading
  • Links between Neiman Marcus #breach and past breaches are beginning to surface: http://t.co/evCXK874yN via @FraudBlogger
  • The hunt for vulnerabilities is on for #Heartbleed #hackers: http://t.co/zgFNqsyouu via @antoneg, @CSOonline
  • #Heartbleed bug raising major #security concerns, read more from @newyorker here: http://t.co/IyTHQ0XaG5
  • Study shows a little over half of employees have #SecurityAwareness training: http://t.co/Y6BDTvrful via @SCMagazine
  • Mega #databreaches exposed 552 million identities in 2013, states report: http://t.co/KF3DMyfNU2 via @InfosecurityMag
  • #FFIEC advisory warns banks of attacks targeting ATM #IT #security: http://t.co/918bXsEaNm via @SecurityWeek
  • RT @DarkReading: Advanced Attacks Are The New Norm, Study Says http://t.co/OxluHS15HW via @darkreadingtim
  • Over 24M home routers enabling DNS amplification #DDoS attacks: http://t.co/YAUyJqK54O via @writingadam, @SCMagazine
  • #GAO report outlines agency protocol for #databreach response: http://t.co/lg6w5rrwQS via @NWWlayer8, @NetworkWorld
  • Study: AETs still evade #security #IT pros around the globe: http://t.co/oGBqnC4ESg via @SCMagazine
  • Authorized users are not entirely to blame for causing network #security problems: http://t.co/twVuhbQb8D via @TonyBradleyBSG, @CSOonline
  • Check out the redesigned @DarkReading- a more collaborative and interactive space for #IT #security pros: http://t.co/nkR0xHno7v
  • Two banks rescind their #databreach claim against Target: http://t.co/ZkVHyPud9d via @Jeremy_Kirk, @Computerworld
  • The surge of #databreaches could soon make #SSN less reliable: http://t.co/BHsXFKdT1P via @JohnEDunn, @CIOonline
  • Univ. of Maryland significantly ramps up #security efforts after #databreach: http://t.co/NIkF5CAE4t via @daniellewlkr, @SCMagazine
  • 'Target #databreach was equivalent to 10 free Super Bowl ads for #cyberinsurance': http://t.co/LXo2F26muz via @lesliescism, @WSJ
  • New study on the irreversible damage #databreaches involving #PII can create: http://t.co/8PaQIJKXe6 via @daniellewlkr, @SCMagazine
  • New report examines the evolution of #cybercrime and what it looks like today: http://t.co/l8NEdBTc3r via @zdFYRashid, @SecurityWeek
  • Banks file class-action against Target and Trustwave after massive #breach, reports @writingadam: http://t.co/bZnrCqnWJC via @SCMagazine
  • Sally Beauty #breach update: new ZIP code info changes the number of estimated cards affected: http://t.co/vO3j8BiotJ via @briankrebs
  • California #DMV looking into possible credit card #breach: http://t.co/5Y0Z7VtarP via @MichaelMarois, @BloombergNews
  • #DDoS traffic spikes up 240% in 2014, new report states: http://t.co/ur3HNR0oHb via @SteveD3, @CSOonline
  • Get those #IT #security plans in place: study says #malware & #breaches will cost $491B in 2014: http://t.co/RCsBaGDScr via @SCMagazine
  • RT @daniellewlkr: 20K impacted after IRS employee brings thumb drive home. http://t.co/0MqExkrhye via @SCMagazine
  • Apple IDs and card #data at risk from #hacked EA Games servers: http://t.co/WiBDMFmIoA via @writingadam, @SCMagazine
  • Report: 57% of organizations don’t willingly report #hacks if not legally required to: http://t.co/0w3eXo0KaL via @kjhiggins, @DarkReading
  • Recent #databreach settlement could change how patients pay for #data #security: http://t.co/1I0y7j8xlk via @jaivijayan, @Computerworld
  • #SallyBeauty confirms #databreach, around 25,000 records compromised: http://t.co/hi0TFugQGN via @jeremy_kirk, @Computerworld
  • Long running cyberespionage worm is potentially linked to multiple spy campaigns: http://t.co/lxsiSTyKD9 via @DarkReading
  • Vulnerabilities are uncovered this week at the #Pwn2Own hacking competition: http://t.co/OrSEfJTeJC via @roblemos, @eWEEKNews
  • RT @ManTech: Learn why @HBGary’s Active Defense 1.4 is one of Network World’s products of the week: http://t.co/EKTe6ya4E5
  • Social media sites see major drop in attack emails, thanks to #DMARC: http://t.co/087CWpitJV via @MessmerE, @NetworkWorld
  • Malicious advertising offers broad reach and quick rewards for #malware perpetrators: http://t.co/FvYnt1caYH via @jpmello, @CSOonline
  • Ramping up #security for enterprise systems ranks as #1 priority for CIOs in 2014: http://t.co/9JGnPGnAB6 via @FierceFred1, @FierceITSec
  • #Experian ID theft exposed 200M consumer records, reports @mathewjschwartz: http://t.co/zydnoR70RA via @informationweek
  • Over 162,000 WordPress sites being used to launch #DDoS attacks, reports @writingadam: http://t.co/FnklqOU22B via @SCMagazine
  • RT @ExecutiveBiz: Ken Silva: @HBGary updates cyber incident management tool. #GovCon http://t.co/lO0KswtcAx
  • Active Defense 1.4 is recognized in @NetworkWorld Products of the Week: http://t.co/r533U27yun via @MessmerE #security #software
  • Announcing our latest #security #software update, Active Defense 1.4. Click here for more info: http://t.co/xPpb4aU5MR
  • RT @InfosecurityMag: National Electric Grid Remains at Significant Risk for Cyber-attack http://t.co/thlrhwn3LI
  • We talked to @MessmerE about the peculiar #Skype-based #malware we found hiding in plain sight: http://t.co/gCHPBjFkrL via @NetworkWorld
  • In @windowssecrets, Mike Lasky discusses our report findings of Skype being used as a transport for #malware: http://t.co/y0iMKGQKk5
  • Sally Beauty appears to be the most recent victim of a major credit card #breach, reports @briankrebs: http://t.co/ZTTVFbYvH7
  • #RSAC discussion recap via @roblemos: RT @DarkReading: Securing Software Requires Design, Testing, And Improvement http://t.co/W5RA50BaPY
  • #DDoS attacks are leaving a more damaging and costly wake in their path, @pete_apps reports: http://t.co/qRPUVVgAKA via @Reuters
  • Meetup site is shut down after suffering #DDoS attacks and being held for ransom: http://t.co/tj6JAYhLtO via @zachminers, @infoworld
  • Long running #malware ‘Uroburos,’ potentially being traced back to Russian roots: http://t.co/WFCfRHCAGt via @writingadam, @SCMagazine
  • Sears investigates potential #security #breach, but is it driven by proof or precaution? http://t.co/yj37HsT81r via @InfosecurityMag
  • Did you attend #RSAC this week? What were some of the highlights for you?
  • A look at what the Verizon 2014 #DataBreach Investigations Report will entail: http://t.co/qbBQnuFGtQ via @kjhiggins, @DarkReading
  • 14 years straight, identity theft ranks as the #1 complaint to the #FTC, reports @NWWlayer8, @NetworkWorld: http://t.co/m0G2HsqqEu
  • Wrapping up #RSAC today- Make sure to swing by and check out our booth #309 if you have not had the chance to yet http://t.co/Ui0JykBWPq
  • Great time talking with @ISMG_News yesterday. RT @ismg_press: #ISMG about to sit down with @HBGary for a chat #RSAC #RSAISMG14
  • If you are at #RSAC, come by and check out our booth #309! http://t.co/hJk0MR7kdZ
  • Keep your guard up by knowing the difference between 2 major types of #cyber hacks, says @rogeragrimes, @infoworld: http://t.co/JwBFm3eIbX
  • Desktop #applications put at risk by #Apple encryption snafu, reports @Jeremy_Kirk: http://t.co/sVymBLPfMH via @pcworld
  • As #security threats become more diverse and multiply, the names stay the same. @tarmerding2 explains why: http://t.co/6OXB4iZ1R9
  • Attending #RSAC ? Make sure to stop by our booth 309 next week
  • Hackers are eyeing location and #mobile to target their attacks: http://t.co/3Zf3FAmEI6 via @tonybradleybsg, @pcworld
  • Multi layered #security defenses penetrated by hackers, exposing 309,000 Univ of Maryland records: http://t.co/BWTsniHeTN via @SecurityWeek
  • Hackers drain ATM with #malware laden USB drive potentially stealing millions, @zdFYRashid reports: http://t.co/CZFkdkoVXN via @SecurityWeek
  • RT @MessmerE: Is Zeus crawling Salesforce? http://t.co/Ad3RayBcY0
  • Threat Intel Dir. Matt Standart discusses the final #NIST Cybersecurity Framework this week with @SecurityWeek http://t.co/NnlH09U8Bk
  • Our threat intel dir. Matt Standart talks to @techjournalist about the #NIST Cybersecurity Framework http://t.co/dMZL91v3JO via @eWEEKNews
  • #Data #encryption use grows while management policy adoption becomes a roadblock: http://t.co/dF7YulIr8g via @InfosecurityMag
  • Careless employee file sharing could have major repercussions for companies, new report states: http://t.co/QjW9Zq8tg0 via @writingadam
  • New #cyberespionage operation, The Mask, is one of the most sophisticated yet, states researchers: http://t.co/rW9h1LBkxX via @kjhiggins
  • Reportedly, 27k Barclays customers compromised in recent #hack; more details via @zeljkazorz, @helpnetsecurity http://t.co/iw00s4U7Ls
  • Businesses are beginning to realize the benefits of PCI compliance, states #Verizon report: http://t.co/2ICZIXpF54 via @achanthadavong
  • RT @WSJ: One of the biggest corporate breaches in U.S. history (Target) has been traced to the A/C repairman. http://t.co/dhDAgFBZo5 $TGT
  • Report shows in 2013, there was a new instance of identity fraud every 2 seconds: http://t.co/dPJQ25T4qJ via @DarkReading
  • Threat Intel Director Matt Standart talks with @jleclaire about the latest Senate #cybersecurity report findings: http://t.co/i77gv6njS7
  • A new bill is proposing the #FTC provide #security rules and regulations for #databreaches: http://t.co/5ugK0nwcXC via @InfosecurityMag
  • A #databreach costs an estimated $188 per affected record, which can add up fast: http://t.co/Z5554q0YVv via @DrewAHendricks @Forbes
  • Hotel company looking into potential #databreach that went undetected for over 9 months, reports @mathewjschwartz: http://t.co/y2trWV5Ppm
  • Our threat intel. director Matt Standart weighs in on the issue of advancing #malware, in @SCMagazine: http://t.co/s0UpDasxBS
  • Attention Yahoo email users, change up your password ASAP: http://t.co/N5B8w4Y405 via @nicoleperlroth @nytimesbits
  • #FF for the latest cyber #security and #databreach insights: @cyberwar, @Jose_Pagliery
  • 5 #security threats to keep an eye on in 2014, according to @TonyBradleyBSG: http://t.co/1XfwpWJ6RV via @pcworld
  • RT @eWEEKNews: Amplified #DDoS Attacks Broke Bandwidth Records in 2013: Arbor Report... http://t.co/2H7ypEr0hp via @roblemos
  • Double check that $9.84 credit card charge, it could be a #scam, reports @byronacohido, @jmbacon: http://t.co/BHEKIDMKjk via @USATODAY
  • 55 non-encrypted laptops stolen over 6 years= 74K at risk in #CocaCola #breach: http://t.co/y2ubMQO0Hr via @daniellewlkr, @SCMagazine
  • How the 'network perimeter' has changed and how you can secure it today: http://t.co/9oUrQpf6cU via @roblemos, @DarkReading
  • DIY projects may come with a higher price tag; #Michaels investigating potential #databreach: http://t.co/r2VQJhLDEr via @Jeremy_Kirk
  • Having multiple layers is key to password #security, length and complexity are secondary, says @TechJournalist: http://t.co/oj68qWc25U
  • The Neiman Marcus #databreach appears to be worse than expected, @nicoleperlroth reports: http://t.co/cOqnYhxyX5 via @nytimes
  • Happy #FF to some great #IT #security sources: @josephmenn and @turbomarcos
  • New card skimming scheme used Bluetooth in recent #hack, @turbomarcos reports: http://t.co/oEYd1XpMec via @SCMagazine
  • Hackers are turning to more effective strategies like "watering hole" for targeted attacks:http://t.co/IlsmXK1ZHD via @antoneg, @CSOonline
  • It is unlikely a Target-like attack would happen to small businesses, @antoneg reports: http://t.co/2e5jdDFExx
  • RT @InformationWeek: Target, Neiman Marcus Malware Creators Identified http://t.co/8UIp1tXePr
  • #Security measures are being updated to ensure your sensitive #data stays safe online: http://t.co/zmoM3fQDPe via @techjournalist
  • RT @SearchSecurity: News: Microsoft to offer Windows XP antivirus updates past April 2014 http://t.co/tUOyBB9mut
  • Preventing credit card #data theft is difficult, but not impossible, reports @wrash: http://t.co/j7VVR8bPfd via @eWEEKNews
  • Commerce dept working to create a centralized #cybersecurity center: http://t.co/gvNSZhFxBF via @daveperera
  • #Tech support ads for #mobile devices are turning out to be a scam for your bank account: http://t.co/vlJwQwNLeW via @lconstantin
  • Google hospitality listings become the target for spammers: http://t.co/EnM3l1zGH6 via @jeremy_kirk, @NetworkWorld
  • The 411 on malware used in the recent #Target #databreach: http://t.co/kvxeJrORxp via @kansasalps, @washingtonpost
  • Our Responder Pro 2.1 listed in @networkworld products of the week roundup: http://t.co/HoHR218ux0 via @jim_duffy
  • Several retailers may have been #hacked over the holiday season who still have not come forward: http://t.co/mxeNERTRdc via @liamT
  • Endpoint #security risk is a growing concern for #IT pros, but budgets remain the same: http://t.co/zZ90CS5E8a via @SiliconMoon
  • Target #databreach affecting over 70 million shoppers, reports now stating: http://t.co/KxbfakG0bb via @cnnmoney
  • Reduce your business risk this year with these tips from @ISACANews, via @dmccaff : http://t.co/ajKsFNGTKa
  • A video games two- step authentication system is getting beat by a new Trojan #malware: http://t.co/4ibAxv9nYP via @lconstantin
  • Our latest edition of Responder Pro 2.1 has been announced today; learn how it can help counter #cyberattacks: http://t.co/sgszc3uaI3
  • RT @byronacohido: Fraudsters likely to exploit stolen Snapchat data http://t.co/qjPKT07jFY via @usatoday
  • Establishing normal network behaviors can make it easier to pinpoint the bad behavior: http://t.co/g6k9dEzAec via @ErickaChick #security
  • There are still some questions around last weeks Yahoo #malware infection: http://t.co/sPr31xdTYW via @dbfarber, @CNET
  • #FF for the latest #security news: @Johnribeiro, @fmanjoo
  • 78% of the most popular Android and iOS #apps were hacked in 2013: http://t.co/A5xLdI3apc via @sueporemba
  • #Security vulnerabilities that won't go away in 2014, via @roblemos, @darkreading: http://t.co/jXrxF8CtvI
  • Snapchat #databreach hacks over 4.6 million, more on what this breach means here: http://t.co/rOQKYtDgYi via @dylan20, @VentureBeat
  • 75% of #IT pros think #mobile devices will pose biggest #security threat in 2014, reports @cbrooks76, @BNDarticles: http://t.co/yP55P8hKBZ
  • Target #databreach caused by #malware attack on POS system; @fraudblogger reports further details here: http://t.co/A7W9MMVLpY
  • Players change, but the game stays the same; @InfosecurityMag takes a look at #cybersecurity over the years: http://t.co/MfAxpZNEvp
  • The holiday season is also the hacking season: http://t.co/lWqRYmTvi3 via @darkreading
  • Matt Standart chats with @jpmello about the latest Washington Post #hack: http://t.co/8W2coNjMmz via @technewsworld
  • Major Target #databreach hits over the holiday shopping season, millions of customers compromised: http://t.co/n56VHIwmsi via @messmerE
  • Hackers take a quality over quantity approach to phishing messages in 2013: http://t.co/ykkX2GD2Ix via @JohnEDunn
  • The US comes out as the top country for financial #malware computer infections in 2013, reports @daniellewlkr: http://t.co/oJRgoRpS0f
  • #Security predictions for 2014 around #malware, from @InfosecurityMag: http://t.co/rZVkhxYCGH
  • If you get an upgraded #mobile device for the holidays, properly wipe your old old one of work data: http://t.co/IxSF8esmnd via @kjhiggins
  • Malicious #Firefox plugin scans websites for vulnerabilities, infects over 12500 systems so far: http://t.co/NNoXi0OzDl via @mathewjschwartz
  • Stolen digital code-signing certificates help #hackers appear more legitimate: http://t.co/YpGLpJG3Ug via @SecurityWeek
  • #Security companies are taking a step forward by focusing on biz processes instead of products: http://t.co/XvyrR9Lf8Q via @erickachick
  • #FF to get the latest on #cyber #security news: @gkeizer and @briankrebs
  • Security best practices need rethinking as #mobile #malware & criminals are getting smarter: http://t.co/w68OtE8jia via @InfosecurityMag
  • An overview of the biggest #security threats of 2013, from @bobviolino, @csoonline: http://t.co/KkFr66XYQo
  • #Database #cloud services becoming a gateway for cybercrime: http://t.co/b5YKGTuFvE via @kjhiggins, @DarkReading
  • #IT #security lessons learned in November of 2013: http://t.co/akBUFBbBax via @jeffwriter, @eSecurityP
  • Latest #cyberespionage #hack takes aim at diplomates, service providers and resellers: http://t.co/BbYMWVpDhz via @rwestervelt
  • Holiday #security scams aren't only for the web, #POS and security cameras can be hacking tools: http://t.co/Or0vgPofar via @tarmerding2
  • What banks can expect in 2014 from the #NIST framework and other trends: http://t.co/vOuA81YGsO via @fraudblogger
  • Could tracking down #software vulnerabilities be fun? #DARPA is working to make it into a game: http://t.co/6rMqj1aVXz via @joab_jackson
  • Flawed #software proves to be the reason for majority of cyber #security incidents, @techjournalist reports: http://t.co/Pa9i579cgC
  • In addition to leaked passwords, the recent breach highlights other issues; Matt Standart discusses with @sueporemba: http://t.co/Rb2jxY7RCi
  • RT @SCMagazine: Hackers access plain text info on nearly 500K JPMorgan Chase cardholders | http://t.co/vn5wvdMP38
  • Dir of Threat Intel Matt Standart talks to @jleclaire about the recent #database password #breach: http://t.co/JylqUb6FqP via @newsfactor
  • Over 2 million passwords stolen in major breach on popular sites; more details here: http://t.co/pYnFbfNFlR via @heysamantha #malware
  • #Data breach notification laws will vary on state by state basis, due to nature of hacks: http://t.co/cnhdbTvXAf via @writingadam
  • New report shows #APT style attacks hit companies around 9 times in a year: http://t.co/PgXq5tEqks via @kjhiggins, @DarkReading
  • During the holiday season, be sure to take the proper #mobile shopping #security steps: http://t.co/mbQcmxeL1Q via @antoneg, @CSOonline
  • Take note of which browser you are using, they might harbor critical vulnerabilities: http://t.co/f9crW9PtGG via @daniellewlkr
  • Snapping up #CyberMonday deals on your #smartphone? You could be compromising company security: http://t.co/C8ubRAq3zp via @sueporemba
  • 5 less common, but still important protocols to keep an eye on: http://t.co/LxQr93DYYt via @roblemos, @darkreading
  • #Malware creation hits over 10 million and counting in 2013, reports @techjournalist: http://t.co/9KmINrhdBy via @eWEEKNews
  • Tips to keep in mind at work on #cybermonday: http://t.co/9VF35KwwGo via @InfosecurityMag
  • A worldwide BlackShades #malware surge exposes machines to RAT, reports @daniellewlkr: http://t.co/n4NUANeIJE
  • Dir of Threat Intel Matt Standart talks to @sueporemba about #databreach threats to the #health exchange system: http://t.co/a1lLWoj6vL
  • Some helpful tips at keeping your #passwords secure, from @probetheandata: http://t.co/5gLleJdX7a
  • A wrap up of the updates to the #NIST framework from this past year: http://t.co/ZeZQUVxE4f via @gcntech #cybersecurity
  • While #botnet takedowns are beneficial, there could be a down side, reports @roblemos: http://t.co/x6OXRyn4GT
  • For the latest in #cybersecurity news #FF: @dannyyadron and @georgevhulme
  • As the metals industry expands, mining companies are increasingly becoming a focus for #hackers: http://t.co/GVr1GXxL6d via @Jeremy_Kirk
  • #OMB calls for agencies to have continuous monitoring #cybersecurity practices in place by 2017: http://t.co/pcHbwIBSi7 via @daveperera
  • New report: a good incident response plan can significantly reduce the cost of a #breach: http://t.co/Pj0pEKdd45 via @securityweek
  • RT @InfosecurityMag: You WILL be Hacked – Cope With It http://t.co/VJpgMS3lpg
  • #CryptoLocker #malware attacks over 12 thousand accounts in just several days: http://t.co/dFi9zCKa8e via @writingadam
  • #Cyber #attacks take aim at http://t.co/ejWGHgdrfg, reports @turbomarcos: http://t.co/M4FtcwvPDu
  • Companies that monitor user authentication can head off attacks before they're a major problem, explains @roblemos: http://t.co/EqKt7Y6U0k
  • Common coding flaw looks to be main reason behind website attacks targeting world's biggest banks: http://t.co/t5o8u12H8j via @daniellewlkr
  • #FF to get the latest in #tech news: @jordanr1000 and @techwriterjim
  • 25% of companies plan to bump up #IT #security spending in the coming year: http://t.co/7u820rwpr4 via @jeffwriter
  • Further investigation into seemingly unrelated #APT, show that they are connected below the surface: http://t.co/jWhKZrUx3a via @antoneg
  • MacRumors Forums hacked this week, leaking thousands of users passwords: http://t.co/lcoqDsBzIU via @securityweek
  • London banks take on simulated #hacks to stay on their toes: http://t.co/FrQh8WwQGx via @daniellewlkr
  • The latest #security requirements for businesses from @pcissc- read full details here: http://t.co/DzBEY2nDxM via @darkreading
  • #Malware is stepping up its game this holiday season; read about what and who the targets are: http://t.co/UCuCqr0jnP via @zdnetcharlie
  • Who is most likely to get personal with their work? Find out here: http://t.co/6qIyXRr06W via @eweeknews #BYOD #Security
  • Payment services brands account for 48% of phishing #hack decoys in Q2; read more here via @antoneg: http://t.co/Xl20Rr0hqg
  • Make sure to #FF these #cybersecurity reporters for the latest news: @byronacohido and @nicoleperlroth
  • In order to beat hackers to the punch, more companies are hiring people to help find their flaws: http://t.co/nA8RivPnII via @lancewhit
  • 72% of workers are using unauthorized file-sharing services, find out more details here: http://t.co/6HrVxr40UB via @securityweek
  • Thanks to #NIST, knowing how to combat all the latest hacking methods isn't only helpful, it's required: http://t.co/zWbAtvZVMw via @gcntech
  • New zero-day attacks target Microsoft Graphics; more on the story from @kjhiggins here: http://t.co/fCzwvn8Jxw
  • #Phishing attacks are using social media as a gateway to get to corporate #data, reports @antoneg: http://t.co/BtPk6sD6Qy
  • Over 16 million Americans were affected in some way by a breach in 2012; read more stats here: http://t.co/NnjNXd6Vfo via @darkreading
  • Steps are being taken in the right direction to boost #cybersecurity, but report shows it's not enough: http://t.co/VkGVVuAZE6 via @antoneg
  • RT @JenniferLSchiff: Have #tech trends like Big Data, QR codes + wearable tech been over-hyped? @CIOonline finds out http://t.co/bQnCvCXOrr
  • While #SMBs think they are safe from #security breaches, a recent research report proves otherwise: http://t.co/oBZ6Iil4ms via @steved3
  • #FF for the latest on #cybersecurity news @paulfroberts and @Mike_Mimoso
  • Evaluate your #IT #security more than just once a year, @ErickaChick gives some advice from experts here: http://t.co/AsDfK3JlbA
  • Watch out for these nightmares that haunt #IT networks: http://t.co/QUshx2mLCX via @NetworkWorld
  • CEOs pledge to enforce the #Cybersecurity Framework guidelines from #NIST: http://t.co/TAeO83i3Ud via @DJusatoday, @USATODAY
  • Check out how much a website glitch on #CyberMonday could cost your business: http://t.co/lhoL18fv5M via @daniellewlkr, @SCMagazine
  • A little goes a long way; new report shows the damage exposed info can cause: http://t.co/OYxBmvzT8n via @steved3
  • Three tips from @rogeragrimes on why you need faith in hard #data when it comes to your #security: http://t.co/PrMtn4Iv1G
  • Forecasted #tech spending is reduced due to govt shutdown. Read more about the update here: http://t.co/Yx2Usmkgd2 via @jburteweek
  • New #malware has been hitting ATMs in Mexico and beyond with an updated English translation: via http://t.co/X9USkVHZ8Z @jeremy_kirk
  • Avoid an online disaster and watch what personal info you share; read these tips from @SteveD3: http://t.co/DbGs9zvPpd
  • Make sure to #FF for the latest in govt #IT news:@daveperera and @GCNtech
  • To tackle #security issues effectively, use these tips to help assess the situation from @darkreading: http://t.co/6sA0Fdlr4Y
  • Survey shows banks do not have the backup to thwart #cyberattacks; read more here from @darrylktaft: http://t.co/Ve1Fb3TLj1
  • Tips from @ManTech's Ken Silva on incident response plans in light U.S. #cyberattack drill: http://t.co/Knb73bS34y via @rwestervelt, @crn
  • First draft of #NIST #Cybersecurity Framework has been released, read the details here from @techtarget: http://t.co/mk5kQOzoLv
  • A look at how global #DDoS attacks map out, and how #Google is trying to help smaller sites: http://t.co/XlGcJILKWN via @russellbrandom
  • New #Apollo #malware is hitting Eastern Europe banks with a mix of old and new techniques: http://t.co/ozancfLQsw via @securityweek
  • Take a look at what companies are beginning to look for in their #SIEM tools: http://t.co/JYuUSdEvvi via @roblemos, @darkreading
  • Computer-napping? New #malware CryptoLocker could hold your computer ransom: http://t.co/z6H3sGOc1D via @jleyden
  • Our CSO Jim Butterworth discusses the #IT #security impact on the oil and gas industry: http://t.co/VlDPmcJGND via @kjhiggins, @darkreading
  • Make sure to #FF these great #tech reporters: @roblemos, @sueporemba, @kjhiggins
  • Passwords are in the hot seat this week and @roblemos discusses how companies can keep them safe: http://t.co/zLKxuHiIzq
  • Draft of #NIST #cybersecurity framework on hold until further notice: http://t.co/jbcmQa5c7u via @daveperera
  • In order to find vulnerable sites, #hackers are combing through #Google using #botnets: http://t.co/fR0om2u3IW via @syegulalp, @infoworld
  • With #IT #security, shiny & new is tempting, but sticking to the basics pays off in the long run: http://t.co/r5m24FrJel via @erickachick
  • New study shows millennials are not making moves towards cyber #security workforce: http://t.co/49FFf1NSVk via @daniellewlkr
  • The cost of failing to catch a #cyberattack: http://t.co/fmJBBFG5v9 via @MessmerE
  • Is ATM #malware becoming a growing concern? @fraudblogger explains the most recent hacks: http://t.co/tbctf5at03
  • All eyes on you, thanks to your #smartphone; @techjournalist explains the most recent #security report findings: http://t.co/r6y73jlBL9
  • Keep up to date in the #tech space, #FF: @BobViolino, @MessmerE, @jaivijayan
  • RT @DarkReading: Top 15 Indicators Of Compromise http://t.co/lULFLTZZrz
  • #Mobile #security might be safer than you thought: http://t.co/3ofEfO4xl0 via @techjournalist, @eweeknews #malware
  • RT @AustinHTCIA: Join @AustinHTCIA for memory forensics/analysis presentation from @HBGary Greg Connelly and Joe Riggins on 10/15/2013 http…
  • Threat Intel. Mger Matt Standart talks about the top 15 indicators of compromise with @erickachick: http://t.co/jHEWL2OLYf
  • #Cybercrime economy takes a hit with a decline in Blackhole activity, reports @kjhiggins: http://t.co/DPe61v8KN0
  • October is #CyberSecurityAwareness Month, take a look back with @techjournalist at what has changed over the years: http://t.co/kHOiW7boOA
  • Playing 'would you rather' with govt #IT pros, #security comes out on top: http://t.co/qeo4yHB288 via @GCNtech
  • Enterprise #cybercrime damage averages $11.8 mil per year in the US; more than any other country: http://t.co/rAbuG4Qcza via @messmerE
  • #Interop brings up the discussion of #IT #security concerns and solutions for the enterprise: http://t.co/QSAQeN2qOr via @darkreading
  • New survey shows businesses are not confident in their #IT #security, reports @eweeknews: http://t.co/219vpggqec
  • Almost 3 million accounts and source code from Adobe were breached last month: http://t.co/KaazSYpYnA via @steved3
  • For the latest in #hacking news #FF @dangoodin001 and @antoneg
  • New report shows how #cyber attacks can be identified, but false flags can cause confusion: http://t.co/VEhBp103lN via @darkreading
  • With less monitoring, the #shutdown offers hackers a way to pull off under the radar attacks: http://t.co/nFALpfGHEZ via @daniellewlkr
  • Research shows brute-force password guessing attacks are now turning attention to email: http://t.co/K43NTrGKBi via @lconstantin #malware
  • Check out what could be making your business a bullseye for #hackers: http://t.co/YX8opPu6sU via @bobviolino, @csoonline
  • #Android users beware: there are over 1 million malicious #mobile #apps and malware out there: http://t.co/7O275IkhWc via @zdnetcharlie
  • #LinkedIn steps up its #security game by shutting down 4 XSS flaws, reports @infosecuritymag: http://t.co/UaGevIwSq9
  • The #ACA set for tomorrow, #technical hiccups could cause major problems, @annbednarz explains: http://t.co/wH3uAbfCpd
  • #Technology might not be to blame for recent spike in #cybercriminal activity: http://t.co/DofoDm0aJQ via @antoneg
  • Our CSO Jim Butterworth talks to @erickachick about making the most of quality analytics #data: http://t.co/QxTHjkqOiG via @darkreading
  • For the latest banking #security news, make sure to #FF: @fraudblogger and @joncamhi
  • New study shows companies focus on blocking popular #apps, not the risky ones: http://t.co/AXHGNzNUCZ via @steved3
  • Russian botnets helping to steal US #data and info to sell off: http://t.co/9hY6EtpkS6 via @syegulalp
  • With soc media as a main hacking target, Threat Intel. Mger Matt Standart explains the effect of #BYOD: http://t.co/EgsgJJZICZ via @jpmello
  • #Google shuts down new #app after invoking #security concerns: http://t.co/rqHfewWtyp via @gkeizer, @computerworld
  • #Apple accounts catch the eye of phishing attackers this August: http://t.co/geQ30nmsYY via @jeremy_kirk
  • #Mozilla ramps up #security efforts with new #Firefox 25 and 26, read more here from @techjournalist: http://t.co/uah23uZjhR
  • The jury is still out on how secure #biomentric #security and the new #Apple Touch ID are: http://t.co/3sErQJAV9Y via @securityweek
  • Help eliminate #security false-positives with these 3 best practice tips, from @roblemos: http://t.co/QZYB9iXq1h
  • Oil and energy watering hole #hacks could be linked to past #trojan attacks, reports @mike_mimoso: http://t.co/wPLDRRIEad
  • 1/3 of #Tor web browsing was proven fradulent in August, @infosecuritymag reports further findings: http://t.co/1QHhmhSaQd
  • 'Hidden Lynx' becoming a clear #hacking threat to the US, @roblemos reports via @eweeknews: http://t.co/tj2EPtt2Xw
  • Proceed with #BYOD caution to help avoid risk, reports @jpmello via @csoonline: http://t.co/AUxleUq0rC
  • Threat Intel. Mger Matt Standart gives tips to increase #enterprise #security around #vodafone hack: http://t.co/Mr8ecaxkf3 via @sueporemba
  • Was someone asleep at the switch to fix the #Nasdaq XSS flaw? @jeremy_kirk investigates: http://t.co/Sqx4YMSAi6
  • Watch what you #Google, @mcafee releases the celeb names that lead to the most malware-laden sites: http://t.co/VkQIFbNptL via @heysamantha
  • Data breaches cost around $136 per lost record, @erickachick gives some tips on how to soften the blow of a breach: http://t.co/TuvbcA580R
  • #DDoS attacks are getting sneakier, @roblemos explains how in @darkreading: http://t.co/ro9llhcqgd
  • For top #security news, make sure to #FF @TechJournalist, @InfosecEditor, @kjhiggins
  • 77% of biz have experienced rogue #cloud situations this year, read more about the issue here from @tarmerding2: http://t.co/uGssHcX0S9
  • Threat Intel. Mger Matt Standart sheds light on #vodafone hack #mobile #security: http://t.co/G2UT2UiQmi via @wirelesswench @infosecuritymag
  • Could the new #iPhone fingerprint scanner change the future of #biometrics?http://t.co/Xif0YVWCgN via @kevinmccaney #govIT #encryption
  • With Russian govt focusing in on #cyber #security, cyber crimes begin to decline, reports @infosecuritymag: http://t.co/4yg59Fpx9M
  • Thanks for the follow @ITsecuritytech!
  • Thanks for the follow @iblametom!
  • 5 honorees to be inducted into the National #Cyber #Security Hall of Fame this October: http://t.co/9ErLhFeIsE via @networkworld
  • Banks and govt agencies set to be on alert for #DDoS attacks tomorrow, 9/11, @fraudblogger gives the full story: http://t.co/8TPj4Gyx83
  • The Internet of Things brings risk into the #enterprise, @erickachick explains how: http://t.co/TtO6FL8YRs
  • Hear what Fahmida Rashid @itsecuritytech has to say about the future of #encryption http://t.co/vxLudEjgEO
  • RT: @byronacohido @USATODAY: How prepared are you for a cyberattack? http://t.co/7hQpkVMlK4
  • #NIST #cybersecurity framework might need a bit more work before Oct deadline, reports @msbrumfield, @csoonline: http://t.co/G4ipw2Y2A1
  • Looking for great, in-depth #infosec news? #FF @SteveD3, @rwestervelt, @mathewjschwartz
  • RT @threatpost: Huge #Botnet Found Using @TorProject Networks for Communications - http://t.co/ZmJ23gs1tW
  • A new #encryption technique is helping to expand #security measures for computer users, reports @markoff, @nytimes:  http://t.co/XQKbouhhBN
  • #Hesperbot, the latest and most potent banking Trojans is hitting Turkey and beginning to spread: http://t.co/TNsEsj0Y4b via @securityweek
  • Trojan attacks are becoming an increasing problem in the banking sector, reports @rwestervelt via @CRN: http://t.co/FvUpchlKLo
  • New survey shows 96% of #security #IT professionals believe #hacking landscape will get worse: http://t.co/2ZlETylqXp via @securityweek
  • With no evidence of malware in recent #nytimeshack, @kjhiggins explains how the investigation is continuing: http://t.co/dxOe4fqIrl
  • RT @FCWnow: @hbgary Thanks for the NASCAR RT.
  • Congrats and thank you to @treyford and rest of #BlackHat team for a great show last week. Looking forward to 2014!
  • RT @opexxx: Record Breaking Black Hat USA 2013 Wraps: With Tremendous Momentum, Esteemed Information Security Event Detail... http://t.co/9…
  • NASCAR and the secret to cybersecurity http://t.co/KXkqtaEbHM via @FCWNow <-very nice piece on risk
  • ABA releases new Cybersecurity Handbook http://t.co/SH2knMy27p
  • We Need a Dialogue on Cyber Security http://t.co/HxqjS0bCfX via@TVTechnology<-Broadcast industry is at frontline of potentialcyberassaults
  • Triangle universities strengthen cybersecurity as hackers grow bolder http://t.co/vJx3Qs9hsv Duke: More phishing than network attacks
  • RT @grecs: #Defcon Day 2 Postmortem http://t.co/o70HHy6dKe
  • RT @cibercrimen: Delitos Informáticos x Cibercrimen is out! http://t.co/wqk2Sa48gA ▸ Top stories today via @HBGary @cibercrimen
  • RT @anjalimullany: More journalists should follow @profsamuels_nyu -- I find myself clicking on everything he tweets. Media news that actua…
  • RT @bobmcmillan: Facebook has paid out more than $1 million in bug bounties. https://t.co/MgmcQDd6mh
  • RT @grecs: BSidesLV Day 1 Postmortem - get more info here! http://t.co/3R4VgDicom #infosec
  • OCC's DuChene warns smaller banks to beware of cyber threat http://t.co/DdVZKNGsHD<-cybercriminals go after smaller players or supply chain
  • RT @HTCIA: Happy Friday Everyone! Before you leave for the weekend, invite a friend to the #HTCIA Conference!... http://t.co/W85705xVTX
  • Major malware businesses discovered in Russia act like Silicon Valley startups http://t.co/A7NAfQOxJN via @VentureBeat
  • Survey Finds CPAs in Dark on Cyber Threats http://t.co/z0Ikpq1WmI via @fbsmallbiz <-only 36% tax pros very familiar with cyberthreats
  • Understanding incident response: 5 tips to make IR work for you via @CSOonline http://t.co/MT2kciFzBM @ManTech Ken Silva interviewed
  • Demos non-stop yesterday of our new Incident Response Command Center technology. Stop by #BlackHat #225 to learn more.and see a demo.
  • Amazing response to our special #BlackHat promos on our products Active Defense and Responder! Still time to learn more and see a demo!
  • Thanks to everyone who stopped by for our #BlackHat T-shirt yesterday. Very impressed with your #LegendofZelda knowledge! Great to see you!.
  • Our #BlackHat prize winning entry will be drawn at 1 PM today! Not too late to drop off your card at booth #225! http://t.co/0R9CWoJYfG
  • Our #BlackHat T-shirts were gone early today, but we still have a few of our amazing Digital DNA Zero Access posters!
  • 90 minutes and counting until we unveil our annual #BlackHat T-shirt at booth ##225! #Excited #TheLegendofZelda
  • Limited supply of our Digital DNA Zero Access poster at #BlackHat #225. Doors open at 10. See you then! http://t.co/TtAat589gy
  • #BlackHat attendees can win a Collector's Edition of The Legend of Zelda! Stop by our booth #225 to find out more. http://t.co/TfU7SRZD6G
  • Beautiful morning in Las Vegas at #BlackHat! Join us at booth #225 to learn more about our Incident Response Command Center!
  • Looking forward to enjoying the final days at @CaesarsPalace and excited to make new #BlackHatMemories at @MandalayBay in 2014.
  • Thanks to #BlackHat for organizing great tour of 2014 show venue today at @MandalayBay.
  • RT @PatrickCMiller: It's been awhile, but I decided to blog a bit on this flight... "Special of the Day: Elephant" http://t.co/ARcLAw1r9C
  • RT @cibercrimen: Delitos Informáticos x Cibercrimen is out! http://t.co/wqk2Sa48gA ▸ Top stories today via @HBGary @MicrosoftDCU @delitosI
  • RT @kevdjordan: Effective Risk Management Sets Leaders Apart From Followers #Blackhat http://t.co/ydH4rAR386
  • RT @treyford: If you have a pic of Barnaby you'd like to share, please send it to info <at> blackhat <dot> com subject 'Barnaby'
  • RT @banktech: What Constitutes a Data Breach for Banks? http://t.co/x0bfOF4eP2
  • Got Game? Win The Legend of Zelda 25th Anniversary 3DS & Ocarina Of Time 3D Collector's Edition->#BlackHat booth #225 http://t.co/1LJCF4VpJz
  • "It’s dangerous to go alone! Take this!" What are some other more iconic quotes from The Legend of Zelda? #BlackHat
  • Think you know The Legend of Zelda? Stop by our #BlackHat booth #225 to test your knowledge -- and get one of our great t-shirts!
  • Stop by #BlackHat #225 to learn more how our Incident Response Command Center can help manage rising number and complex security incidents
  • Excited to be a #BlackHat Gold Sponsor this year -- stop by booth #225 for demos, special #BlackHat-only promotions and cool prizes & swag
  • RT @josephmenn: Exclusive #BlackHat preview: Researchers to show new ways to hack oil, gas and water plants http://t.co/536XDmgj39 #infosec
  • RT @PatrickCMiller: HBGary launching new cyber-security software - Sacramento Business Journal http://t.co/Ll1rARBBVF
  • RT @bscansdotcom: @HBGary @RazorEQX The Digital DNA Zero Access poster is awesome, btw <- thanks for the nice words!
  • @RazorEQX @bscansdotcom Happy to put one aside for you -- no hugs required!
  • @bscansdotcom @RazorEQX The expo opens at 10 AM -- I would try to get there before noon.
  • Limited copies of our Digital DNA Zero Access poster at our #BlackHat booth #225. Stop by early if you want a copy! http://t.co/CTJdoeqToh
  • Win The Legend of Zelda 25th Anniversary 3DS & Ocarina Of Time 3D Collector’s Edition – stop by #BlackHat booth #225! http://t.co/WDUB4ZscAQ
  • RT @mandersonsacbiz: HBGary launching new cyber-security software http://t.co/RP4wFDKE30 via @Sacbiz
  • HBGary to Launch New Incident Response Command Center Technology at #BlackHat http://t.co/VbgfU59v6k @DFINews Stop by booth #225 for a demo!
  • RT @AACCCyberCenter: HBGary to Launch New Incident Response Command Center Technology at Black Hat http://t.co/dURS8bvdIP #cybersecurity
  • RT @mbriol: Why help desk employees are a social engineer's favorite target http://t.co/srKp4aSSkq #infosec #awareness
  • ManTech Subsidiary to Unveil Cyber Incident Response System; Ken Silva Comments http://t.co/2gxsw9ckiH #HBGary #DFIR via @ExecutiveBiz
  • What do retailers need to consider when putting together an effective IR plan? Join us for our 8/14 webinar http://t.co/EHhSB9UxmH
  • Join us for our next Tuesday Tips & Tricks webinar 7/23: Active Defense: Reporting for Network Information http://t.co/SKhmCjRbgM
  • @RazorEQX Great! See you there!
  • Our #BlackHat T-shirt and prize are amazing this year -- sneak peek to come soon! Something special for our gamer fans...
  • Be sure stop by our #BlackHat booth #225 to see our latest product demos including our Incident Response Command Center announced today.
  • HBGary is a Gold Sponsor at #BlackHat this year!
  • RT @InfoSecMash: HBGary To Launch New Incident Response Command Center Technology At Black Hat http://t.co/FbZ7bX3Zgw #infosec
  • RT @NonTechChick: The PainPoint Network Daily is out! http://t.co/CSMdz4eJ1E ▸ Top stories today via @diamond4jobs @TechJournalist @HBGary
  • HBGary To Launch New Incident Response Command Center Technology At Black Hat http://t.co/jkX6qBzUEa via @DarkReading
  • HBGary To Launch New Incident Response Command Center Technology at #BlackHat http://t.co/iuZem4T74U #dfir
  • RT @IndustryWeek: The Manufacturer's Agenda: Monitoring the US #Manufacturing Resurgence http://t.co/9UPbTZIAje
  • For hackers in China's cyber army, Taiwan is a test target http://t.co/IVdGEU3ej0 via @NBCNews
  • Mock Cyberattack on Banks a Success, SIFMA Says http://t.co/YLiwIpM5rL via @AmerBanker
  • How new cybersecurity rules bedevil electric industry http://t.co/CbR4d1XroW via @USAToday
  • RT @lbhuston: Security Strategy & Tactics Daily is out! http://t.co/DPwivxcVNW ▸ Top stories today via @HBGary @teksquisite
  • HBGary CSO featured in this article: Google Glass Gets Patch To Avoid Hacks http://t.co/GHAl7it8WV via @InformationWeek
  • As cyber attacks detonate, banks gird for battle http://t.co/rB2PFAgSQz via @MercNews
  • RT @msftsecurity: #Microsoft releases new #whitepaper entitled “Secure Software Development Trends in the Oil & Gas Sectors." http://t.co/z…
  • RT @nytimes: Barrage of Cyberattacks Challenges Campus Culture http://t.co/oGLQHJFbeg
  • Register here for our 7/17 webinar: Building an Effective Incident Response Plan: What Energy Companies Need to Know http://t.co/dnlkdobRcP
  • RT @MikeClayton01: Risk Happens! is out! http://t.co/wvFnF8KyPh ▸ Top stories today via @ACG_CEO @HBGary @Ehtisham_Syed
  • RT @Gartner_inc: Gartner Blog Post by Anton Chuvakin, "On Importance of Incident Response" http://t.co/BDkAatsQuI
  • RT @KelloggSchool: How to Win at Risk: A Q&A with #Kellogg Professor Russell Walker About #Risk Management: http://t.co/zvyN43vQUB
  • RT @teksquisite: The Forensics Weekly is out! http://t.co/mvkZVeP2st ▸ Top stories today via @danmiami @HBGary @tomaszmiklas
  • RT @jgarcia62: @KDPryor won Best Digital Forensic Blog at the @4cast awards #DFIRSummit
  • O&G companies must protect physical and digital assets, and respond to infiltrated air-gapped and monitored networks.http://t.co/90lfYCPesj
  • Join us for today's 1 PM PT Tuesday Tips & Tricks webinar: Active Defense: Common Status Codes and Fixes http://t.co/VghotCserV
  • RT @benrothke: Why Organizations Don’t Prepare for Information Security Incidents.Great piece by @lennyzeltser http://t.co/icWJA4Nnml #info…
  • "A company must identify its crown jewels and then spend all their efforts protecting those crown jewels." HBGary CSO http://t.co/T7iUP7z90E
  • Is your adversary capable of developing own malicious code or are they going to use the malicious tool set of others? http://t.co/T7iUP7z90E
  • HBGary CSO Jim Butterworth interviewed in this @CSOonline piece Knowing adversary key to good cyberdefense http://t.co/slN5kJeOkW
  • HBGary CSO Jim Butterworth discusses cost of retail breach @BankInfoSecurity MAPCO Express Sued Over Malware Attack http://t.co/lDzTzYqxAa
  • HBGary CSO to discuss cyberthreats facing Energy companies and tools and team needed to respond in 7/17 webinar http://t.co/7PCK2etr9E #dfir
  • HBGary CSO Jim Butterworth quoted in this @DarkReading piece Experiment Simulated Attacks On Natural Gas Plant http://t.co/qZTlSbaRjW
  • #HBGary CSO Jim Butterworth talks motivations, more in @OilGasMonitor contributed piece on targeted attacks http://t.co/8e91Scdcf8
  • RT @OilGasMonitor: July 8, 2013 Jim Butterworth | HBGary Today, an increasing number of U.S.-based companies are being targeted for... htt…
  • RT @McAfee:McAfee SIA combines industry-leading innovations from partners http://t.co/l2aWEBB48c <-Nice video! @HBGary is Tier 3 partner..
  • Alarming trend:increasing number of cyber-attacks on smaller financial institutions and businesses @BloombergNews http://t.co/2by3laxceH
  • RT @usmansindhu: Energy sector can learn best practices from financial but requires distinct and long-term strategy #ICS http://t.co/UK9N9I…
  • NIST Unveils Draft of Cybersecurity Framework http://t.co/vPyfxaPOPE @GovInfoSecurity 5 core functions: Know,Prevent,Detect,Respond,Recover
  • Cyber security at ports insufficient, study says http://t.co/q0I5aBc1tO @LATimes Largest U.S. port does not have incident response plan,
  • RT @BankTechNews:The price of a cyberattack (for the criminal): http://t.co/OwlPDxOTWs DDoS attackers target sites for as little as $2/hour
  • RT @SecMash: For:A host of tools that enable a thorough and organised investigation - SC Magazine UK http://t.co/pGvi8q5Q7J #InfoSec
  • Cybersecurity training on the rise for young students http://t.co/4MaQePVSXE @USAToday 700,000 new cyber security pros needed by 2015
  • HBGary CSO to discuss cyberthreats facing Energy companies and tools and team needed to respond in 7/17 webinar http://t.co/7PCK2etr9E #dfir
  • Army Boosts Network Security By Cutting Access Points http://t.co/b26xdWJmQt @Defense_News
  • MI5 and GCHQ: Britain facing 70 advanced cyberattacks per month against govt and industry targets http://t.co/Uy3notb2x1 @InfoSecurityMag
  • RT @cibercrimen: Delitos Informáticos x Cibercrimen is out! http://t.co/wqk2Sa48gA ▸ Top stories today via @attrc @HBGary @coyotegris
  • RT @InfosecurityMag: Phishing surge shows human element weakest link in cyber-defense http://t.co/pWj3z5NBUX
  • Ten Steps to Planning An Effective Cyber-Incident Response http://t.co/6P00v5TToR @HarvardBiz
  • RT @darinandersen: Introducing the Industrial Internet | http://t.co/ITTygAG5Wy http://t.co/zTrYdJQVF5 via @generalelectric
  • RT @i_defender: @darkreading Energy sector suffers brute force attacks http://t.co/ewbX7PGT6t
  • RT @MalwareJake: @BlackHatEvents @jespinhara @urma FYI, I think digital DNA is an @HBGary trademark. <- correct
  • RT @Greghoglund: @pr0neer @daviottenheimer regarding the SANS cheatsheet, I am compelled to mention FastDump and Responder are both top cla…
  • Join HBGary CSO for next webinar 7/17: Building an Incident Response Plan: What Energy Companies Need to Know http://t.co/7PCK2etr9E #dfir
  • RT @msjoanieg: 3 reasons why America's security model is broken http://t.co/51NbUFECUx via @csoonline
  • RT @InfosecurityMag: Average cyber-atttack clean-up totals $616K http://t.co/KQ4jruvri0
  • RT @securosis: New post: Standards don’t move fast enough http://t.co/9a8dxX87wt <- agree
  • @syngress Thank you for the #FF! Have a nice weekend.
  • RT @syngress: #FF #hacking & #cybersec - @richerdinelle @HBGary & @commonexploits
  • RT @teksquisite: The Forensics Weekly is out! http://t.co/mvkZVeP2st ▸ Top stories today via @dckovar @HBGary @McGrewSecurity
  • Missed the HBGary 'Building An Effective Incident Response Plan' webinar yesterday? You may view the recording here https://t.co/bLI25hcqDQ
  • Recidivism (repeat incident rate) Effective Validation + Accurate Risk Identification + Proper Remediation = Reduction in Incident Rate
  • IR Plan Breakdowns. Incident Types & Threat Type changes context and risk: - Unauthorized Access - Malicious Code - Email
  • A good Incident Response plan is not a step-by-step process; rather a supplemental guide or run-book (references a series of procedures)
  • Incident Response Objectives: http://t.co/4euHKSPpmC
  • Support and drive effectiveness of each phase with Tracking, Automation, and Correlation technologies.
  • Locard’s Exchange Principle Applied: http://t.co/QN3FjxGyGL
  • These trace artifacts are useful in achieving key IR objectives: Prevention, Detection, Containment, Remediation, Adaptation.
  • A fully integrated Incident Response system will optimize the ability to recover trace artifacts left behind from an attacker.
  • ... Only human failure to find it [physical evidence], study and understand it, can diminish its value.
  • Locard’s Exchange Principle: Physical evidence cannot be wrong, it cannot perjure itself, it cannot be wholly absent. ...
  • IR team needs to be trained and equipped to validate adverse events and investigate over the various system platforms.
  • Challenges: Preparation, Detection, Investigation ( Validation AND Response ), and Risk Management.
  • Incident Response Challenges: Basic Holistic IR Cycle: Adapt/Prepare - Monitor - Validate - Respond - Remediate http://t.co/Qn2VzDLxaT
  • Compromise upstream or downstream puts your data, product, and customers at risk.
  • Manufacturers in particular face complex and serious problems due to: Role in a Supply Chain, Reliance and usage of Control Systems, IP.
  • defensive power needs to meet or exceed parity with today’s free version of Metasploit.”
  • HD Moore’s Law: Casual Attacker power grows at the rate of Metasploit. “…to stop breach attempts from even our weakest adversary class,
  • Your security is only as good as the weakest link. Security posture must cover all threat vectors, from physical to logical.
  • Cyber Capabilities have empowered small non-state actors to have the same level of power/influence as major state actors.
  • Cybercrime economies have risen for the purchase & sale of: Exploits, vulnerabilities, trojans, compromised systems, malicious capabilities
  • Join us in 10 mins for the Building An Effective Incident Response Plan: What Manufacturers Need to Know webinar! https://t.co/wO3U0eaeeX
  • PinkStats malware, used in targeted nation-state attacks, acts as a gateway for additional malicious payloads. http://t.co/38dSY9fqV9
  • Join us tomorrow 6/26 1PM PT for "Building An Effective Incident Response Plan: What Manufacturers Need to Know!" https://t.co/wO3U0eaeeX
  • RT @helpnetsecurity: DDoS attacks: What they are and how to protect yourself - http://t.co/1a0w7uNylI
  • RT @CoreSecurity: Ransomware on #Android: It was only a matter of time http://t.co/aK9PcXEfWl @tsamson_IW @infoworld
  • RT @SophosLabs: Taking a closer look at the Glazunov exploit kit http://t.co/gIA2cfaVL4
  • RT @RSAConference: Analyzing Vulnerabilities In Business-Critical Applications - via @darkreading | http://t.co/ISV1FvRvzD
  • This Wednesday 6/26 at 1PM PDT! Building An Effective Incident Response Plan: What Manufacturers Need to Know https://t.co/wO3U0eaeeX
  • 90% Of Companies Underestimate The Volume Of Malicious Software http://t.co/gxaP81W8WQ
  • RT @helpnetsecurity: Nearly 200,000 new malware samples appear daily - http://t.co/wqvJA6k4aM - @Kaspersky
  • RT @MalwareMustDie: #MalwareMustDie #BLOG: Knockin' on #Neutrino Exploit Kit's door.. Part-1 (where is "that" #PluginDetect 0.8.0 ??) http:…
  • Connecting the Dots–How Your Digital Life Affects Identity Theft and Financial Loss http://t.co/6rHsn8vNnt | via @McAfee
  • Survey: Companies Aren't Ready to Respond to Cyber Attacks http://t.co/xeNd2sbjk5 | via @eSecurityP
  • RT @SCMagazine: Facebook was made aware of the glitch through its bug bounty program. | http://t.co/YbmIauhIzb
  • RT @DaveMarcus: Finding a Needle in a Datastack: Big Security Data Survey Results: There’s a lot of discussion around big data... http://t.…
  • RT @TrustedSec: The Social-Engineer Toolkit (SET) v5.2 Released. Major PowerShell update, features + more. https://t.co/mB40K7AY7G #Trusted…
  • RT @briankrebs: online banking shutdown at Bank of China. http://t.co/ITC5XUf07D | western source http://t.co/nqzYbH9HiB #redphone
  • RT @DependableIT: Banks often ignore the early signs of impending cyber attacks, according to an Australian bank’s head of... http://t.co/X…
  • RT @SecurityWeek: Facebook Bug Exposed Contact Details of 6 Million Users http://t.co/3Yb4Qm6svE
  • RT @MackCaliProp: Keeping up with today's security RT @ramonray Protect your #smallbiz from cyber attacks w/ these 3 tips from @HBGary http…
  • RT @SecurityWeek: Companies Not Keeping Pace with Growing #Cybercrime #Threats: Survey http://t.co/xX4janu8rj
  • RT @RazorEQX: #Mac Spyware Bait: Lebenslauf für Praktitkum - F-Secure Weblog : News from the Lab http://t.co/uRGsNdmW5N #malwaremustdie
  • RT @eSecurityP: Survey: Companies Aren't Ready to Respond to Cyber Attacks http://t.co/MvtKKnlXsh
  • RT @jeffreycarr: Breaking: Secret Russian Lab in The Fishenko Espionage Case Identified | SOFREP http://t.co/gxVE5ChqrC < We identify the F…
  • RT @verdasys_inc: Don't be intimidated by a #cyberthreat defense program. Learn more with security expert Dan Geer - http://t.co/l3ePZDkihV
  • Next week 6/26 HBGary presents: “Building An Effective Incident Response Plan: What Manufacturers Need to Know” https://t.co/wO3U0eaeeX
  • RT @RazorEQX: New #DirtJumper Variant Packs Supercharged #DDoS Engine | http://t.co/hejPp5cQIX http://t.co/t8Ip1B6DIZ via @SecurityWeek
  • RT @SecurityWeek: Google Docs Abused to Protect Malicious Traffic http://t.co/KG3BrWChDe
  • Report on crime against businesses ignores cybercrime http://t.co/HStwnTAFFn | via @HelpNetSecurity
  • RT @DarkReading: Why Are We So Slow To Detect Data Breaches? http://t.co/uUUvRkk3lm
  • A comprehensive list of security terms you should know http://t.co/J5hsK7uTfB | via @GCNtech
  • RT @SCMagazine: VIDEO: Cyber crime and the threat of virtual terrorism | http://t.co/8aRiC5dgiF
  • RT @Gartner_inc: #CISOs learn about the critical need for documented response plans for security breaches by watching this http://t.co/4sbP…
  • RT @cybfor: Do you cover up your webcam?: [http://t.co/XyYNO0kZrz] (Web)camjacking is in the news. This morning from BBC... http://t.co/m5p…
  • Tranwos Backdoor Manipulates EFS, Defeats Researchers’ Investigation http://t.co/e2ThoIUTlx
  • RT @CiscoSecurity: Not just #LinkedIn affected. As many at 5000, including 50 heavy hitters after NetSol #DDoS http://t.co/mZI1Mb8mK9 #secu…
  • RT @cylanceinc: Learn more about the FDA medical device hack from @Cylanceinc’s @XSSniper via @healthinfosec http://t.co/Cf6YxeYJSL
  • RT @SecurityWeek: Online SAP Deployments Widely Susceptible to Attack http://t.co/OVuBTR5CBO
  • RT @helpnetsecurity: Cybersecurity is a business imperative - http://t.co/7ExaeNZRiq
  • RT @helpnetsecurity: Wall Street prepares for simulated cyber attack - http://t.co/XxDxzZDEIX
  • About 90% companies underestimate malicious attacks http://t.co/rchZUmLRhs
  • Over 20% Of All Phishing Attacks Mimic Banks http://t.co/nCXBY4rEU3
  • RT @DarkReading: 10 Reasons SQL Injection Still Works http://t.co/qDZ89yU5St
  • 6/26 1PM: Learn cyberthreats facing Manufacturing Companies & how to ID, manage & respond to security incidents. https://t.co/wO3U0eaeeX
  • RT @ramonray: Check out these 3 tips to protect your #smallbiz from cyber attacks from @HBGary http://t.co/SjtkuSd6VF
  • HBGary CSO Jim Butterworth is featured in 3 Ways To Protect Your Small Business From Cyber Attacks http://t.co/XSYT27v2x5 via @ramonray
  • Please join us on 6/26 1PM PST for Building An Effective Incident Response Plan: What Manufacturers Need to Know https://t.co/wO3U0eaeeX
  • RT @Gemini52469: Protect your #smallbiz from cyber attacks w/ these 3 tips from @HBGary http://t.co/04wMZ4eNPa
  • RT @TrendLabs: A vulnerability in Android allows an app to install itself as an administrator on the device: http://t.co/gZX4J0DF1z
  • RT @CounterTack: 4 steps towards public/private #cybersecurity cooperation http://t.co/AUMlde7l5Z via @HarvardBiz
  • RT @SkywrathTechInc: New malware analysis coming to TOR http://t.co/29GlwbgHff
  • RT @RazorEQX: Google Docs hijacked by Trojan.APT.Seinup malware | Cyberwarzone http://t.co/SAIQaYbM3J #malwaremustdie #malware
  • RT @EGeorgantas: Bank of England ranks cyber attacks above Eurozone crisis as biggest threat http://t.co/xtlsGKLvy6
  • RT @SecurityWeek: Russia and U.S. Setup Cybersecurity Hotline to Prevent Accidental Cyberwar http://t.co/jwdA8MyAeT
  • RT @DarkReading: New OWASP Top 10 Reflects Unchanged State Of Web Security http://t.co/lD6gyrNDMJ
  • RT @helpnetsecurity: 65+ websites compromised to deliver malvertising - http://t.co/gw0uU40oa8 - @zscaler
  • RT @stopbadware: More banking #malware on the horizon? Source code for Carberp banking Trojan allegedly up for sale at a low $5K http://t.c…
  • RT @SCMagazine: Malicious email that recipient is on "Prism watchlist" linked to just-uncovered espionage campaign | http://t.co/1gZoa6KR9o
  • RT @cylanceinc: Terry @0psys and Billy @Xssniper share their thoughts on the FDA advisory http://t.co/a1ROAoe9VJ
  • RT @SecurityWeek: Criminals Hacked Shipping Systems to Track Their Massive Drug Shipments http://t.co/63fURmddiN
  • RT @CoreSecurity: U.S. & Russia sign pact to create communication link on #cybersecurity http://t.co/3FGzFKfkHB good first step...
  • RT @McAfee: Q2: Best practices #BYOD policy: secure devices & mobile data, deliver company-wide endpoint security, warn/block risky apps #D…
  • RT @ramonray: Protect your #smallbiz from cyber attacks w/ these 3 tips from @HBGary http://t.co/TWBwDqzg4b
  • RT @SCMagazine: CISOs must approach security as a strategy | http://t.co/orZMOmUZSc
  • RT @cylanceinc: New Blog: "Raising the Bar for Medical Device Security" http://t.co/a1ROAoe9VJ
  • RT @pctechmate: Cybercriminals using hijacked Cloud hosting accounts for targeted attacks http://t.co/vGE0jke5fH via @TheHackersNews #Secur…
  • RT @BankDirector: What do bank directors need to know about cyber security? http://t.co/cvVnvRtwBa
  • RT @helpnetsecurity: Guccifer hacks U.S. nuclear security agency chief - http://t.co/h0widMuIRk
  • RT @SecurityWeek: When it Comes to APTs, Don’t Confuse Tactics With Strategy http://t.co/vlfJsVQvRO
  • RT @DarkReading: Cyberespionage Operators Work In Groups, Process Enormous Data Workloads http://t.co/6p14H1dpCl
  • RT @InfosecurityMag: US Energy Department creates cybersecurity council http://t.co/bYeSfmBfPX
  • Register for "Building An Effective Incident Response Plan: What Energy Companies Need to Know" w/ J. Butterworth! https://t.co/c8zBJkb9fG
  • RT @SCMagazine: DATA BREACH: Another victim comes forward in massive ticketing software company breach | http://t.co/ak0bvMzzsg
  • RT @cylanceinc: Our own @XSSniper and @0psys discussing cyber security and the FDA via @washingtonpost http://t.co/Si17MBzvlG
  • Nation continues as growing breeding ground for malware: 83% increase in CnC servers to operate botnets in Canada. http://t.co/iLVdqFuycl
  • Identifying Vulnerable Medical Devices: Big Risks in Devices Unknowingly Exposed to Internet http://t.co/b1htqXp5eC | via @healthinfosec
  • RT @lbhuston: Latest Cyber Threat Intelligence News from Australia http://t.co/KW4jJEdYsd <Red Dragon has some good stuff today!
  • RT @helpnetsecurity: ISC-CERT warns about medical devices with hard-coded passwords - http://t.co/JDjaJxF0dF
  • RT @DarkReading: Cyberespionage Operators Work In Groups, Process Enormous Data Workloads http://t.co/VOovrM31Ok
  • RT @briankrebs: Iranian elections bring lull in DDoS attacks on banks, spike in phishing targeting Iranians http://t.co/6mZGrlpvsT
  • RT @Gartner_inc: Gartner Says by 2019 90% of Organizations Will Have Personal Data on IT Systems They Don't Own or Control http://t.co/bxTj…
  • RT @teksquisite: Cybercriminals Improve Android Malware Stealth Routines with OBAD http://t.co/RIOx1y3K1Q
  • RT @SecurityWeek: FDA Warns of Cyber Attacks on Medical Devices http://t.co/RwjFJX2OWP #embedded
  • RT @SecurityWeek: Rarstone RAT Being Used in Targeted Attacks in Asia http://t.co/lMXz3bmt6E
  • Most Fortune 500 Companies Would Face 'Serious Harm' or Be 'Adversely Impacted' By a Cyber Attack http://t.co/tChBscZCFj via @eSecurityP
  • RT @sansforensics: ForensicFocus Blog: David Cowen and Lance Mueller talk digital forensics and IEF http://t.co/tL8iLBF2TD
  • RT @DarkReading: 8 Charged In $15 Million Attempted Cyber Fraud Targeting U.S. Banking Customers http://t.co/aXW645Ogft
  • RT @DarkReading: Iranians Targeted In Massive Phishing Campaign http://t.co/s1AbE8w8UN
  • RT @RazorEQX: #Zeus #Malware Configured To Recruit Money Mules In Credit Card Theft http://t.co/QhmRxrBGDC #malwaremustdie
  • UK banks fear cyber attack and global cyber crime more than euro crisis http://t.co/603y8sY7do | via @Reuters
  • Another Sutter Health Breach: Police Investigation Identifies Patients Affected http://t.co/JD12Slu3U2 | via @HealthInfoSec
  • Join us on 6/26 at 1PM PST for the "Building An Effective Incident Response Plan" webinar with Matthew Standart! https://t.co/wO3U0eaeeX
  • RT @r_netsec: Circumventing Security Systems With Dubious HTTP Responses - http://t.co/hWHhVLBekp
  • RT @a0rtega: Going Solo: Self-Propagating ZBOT Malware Spotted http://t.co/LsUAKk2Y88
  • RT @MalwareMustDie: #MalwareMustDie - Today's #BHEK (173.255.213,171) rides a Pony to download Zeus(Gameover) https://t.co/k21eDkeQXT https…
  • RT @eEye: #Android #Trojans spread by Bluetooth, hijack bank codes http://t.co/IlOtss5xNF #security #netsec #infosec
  • RT @SecurityWeek: New Self-Propagating Zeus Variant Detected in the Wild http://t.co/3fH9akf6Vs
  • RT @helpnetsecurity: Researches test resilience of P2P botnets - http://t.co/ImznrQaDQd
  • Our "Active Defense: Effective Permission Settings" webinar is starting in ~7 minutes! If you can't join now, the archive will be up soon.
  • #GartnerSec Jorge Lopez preso on CEO concerns: cybersecurity #1 fear of Board of Directors
  • Join us at 1PM PST today for the "Active Defense: Effective Permission Settings" webinar with G. Hamilton! https://t.co/WhKs3oS3en
  • RT @sansforensics: Forensic4Cast: 4:cast Episode 43 Where No Forensicator Has Gone Before http://t.co/Pq4Qo01K6I
  • RT @netsecu: 2013 Cost of Data Breach Study from Ponemon and Symantec (g), http://t.co/mWDSNmlKLg #security
  • RT @SecurityWeek: 'KeyBoy' #Malware Used in Targeted Attacks in Asia http://t.co/8UT8IK207n
  • RT @helpnetsecurity: Researchers find self-propagating Zeus variant - http://t.co/rS1sGJZWfe
  • RT @teeltech: 7 Cybersecurity, Forensics Tools to Watch for | @CellebriteUSA @DFLabs @forensic_store @FireEye @HBGary | http://t.co/9YXHc1s…
  • #GartnerSec Day 2: Admiral Mullen keynote on leadership and cyber.
  • Register for the "Active Defense: Effective Permission Settings" webinar with Systems Engineer G. Hamilton on 6/11! https://t.co/S8hHCMTvav
  • Register for our 6/26 webinar: Building an Effective Incident Response Plan: What Manufacturers Need to Know https://t.co/GWMlfahilq
  • HBGary Active Defense 1.3 featured in @LawTechNews 7 Cybersecurity, Forensics Tools To Watch http://t.co/5B4WXojR3y
  • Be prepared for IT regulation in years to come I.e. expect ISP regulation. Hunter #GartnerSec
  • Intersting preso on cyberwar by Richard Hunter and Avivah Litan. #GartnerSec
  • RT @ICSCERT: ICS-CERT released advisory ICSA-13-161-01 IOServer DNP3 Improper Input Validation to ICS-CERT Web page - http://t.co/tiA0hx3Euy
  • Response to Advanced Persistent Attacks-->not about new malware hunt; instead ability to determine where your IP is going. Ahlm #GartnerSec
  • RT @SecurityWeek: New Android Trojan Mirrors Traditional Malware Complexity http://t.co/nktvtE9Izn
  • RT @DarkReading: Putting Vulnerabilities And Threats Into Context http://t.co/24WdSDlHmD
  • RT @helpnetsecurity: New expert-level cyber forensics certification - http://t.co/NqshwXe5v8 from @ISC2
  • RT @DarkReading: More targeted attacks against Vietnam and India http://t.co/amwI8S4XCG
  • RT @DFSource: June 9th Forensic @4cast episode http://t.co/DeCTCOWKGT #DFIR
  • RT @paulsparrows: May 2013 Cyber Attacks Statistics http://t.co/LXtzaXkHAL #Infosec #Cybercrime
  • Seeing more targeted attacks against manufacturing and natural resources--very worrisome. Ruggero Contu CIP preso #GartnerSec
  • When making case for security and risk to your Board of Directors, don't use FUD; instead, focus on business impact. @peproctor #GartnerSec
  • Incident response prep best use of time, money today. Why? Because there will be incidents. @peproctor GartnerSec keynote
  • RT @peproctor Major theme in the keynote: Gartner security scenario 2020 #GartnerSec
  • RT @peproctor Major theme in the keynote: #CISO adaptation over 4 decades #GartnerSec
  • Register for the "Active Defense: Effective Permission Settings" webinar with Systems Engineer G. Hamilton on 6/11! https://t.co/hTRJJwHZ9j
  • RT @InfoSecWebinars: That's it for the Incident Response Summit! If you missed a presentation, catch it on demand immediately: https://t.co…
  • RT @RazorEQX: #Plesk #Zero-Day Exploit Results in Compromised Webserver http://t.co/l22MUukx5m #exploit
  • RT @helpnetsecurity: New Android Trojan is complex as Windows malware - http://t.co/G2XPd0ot67 from @ZeljkaZorz
  • RT @DarkReading: Microsoft, FBI Slam Door On Thousands Of Citadel Botnets http://t.co/qbcUkZEt5t
  • RT @secureslinger: The secureslinger Daily is out! http://t.co/KtUgRKMUa0 ▸ Top stories today via @iawtUK @HBGary @RizkyMuhammadF
  • Access the recorded HBGary webinar "Active Defense: Basic overview of how to use it, how it works." here: https://t.co/nPaRYZuKXU
  • RT @symantecdlp: Orgs with a CISO & incident response plan save on data breach costs http://t.co/PYylDIf8cv
  • Join us on 6/11 at 1PM PST for "Active Defense: Effective Permission Settings" with Systems Engineer G. Hamilton! https://t.co/hTRJJwHZ9j
  • Cyberespionage campaign 'NetTraveler' siphoned data from hundreds of high-profile targets. http://t.co/SMMCifdLYW via @ComputerWorld
  • Clapzok.A malware can spread among binary files, making it one of the first-known, true computer viruses for OS X. http://t.co/v92xZ8hiHM
  • RT @CoreSecurity: China & U.S. #cyberthreats – Welcome to the new Cold War, says @CadieThompson http://t.co/JVRRTaMSER via @CNBC
  • RT @PaloAltoNtwks: Americans don't fret over #cybersecurity despite growing awareness of #cyberthreats. http://t.co/CeZ3Uf4OJZ via @DataBre…
  • RT @SecMash: Average cost of data breach rose in 2012, most expensive in Germany and US ... - Canadian Underwriter http://t.co/77ZB3UodR7 #…
  • RT @RazorEQX: Microsoft, FBI Claim Success Against #Citadel #Botnets http://t.co/goHO1kjnhu via @http #malwaremustdie
  • Learn about cyberthreats facing manufacturing companies & how to identify, manage & respond to security incidents: https://t.co/BYkfnMezeQ
  • RT @DarkReading: Negligence, Glitches Push Up Cost Of Breaches Worldwide http://t.co/fhZQQo9fET
  • RT @SecurityWeek: Moving Beyond Antivirus: From Reactive to Proactive Endpoint Protection #threats #malware #cybersecurity http://t.co/YACY…
  • RT @kaspersky: Cyberthreats: Welcome to the New Cold War http://t.co/V7oqWKnIsy via @CNBC by @CadieThompson
  • RT @sansforensics: New #DFIR Blog Post: Windows Memory Analysis In-Depth - Discount Code = WINDEX = 10% Off #DFIR http://t.co/leTC6L0SQS
  • RT @briankrebs: Interesting, that Microsoft's legal page for its Citadel takedown is in English and Russian. http://t.co/ESYYzwq2pD <lots o…
  • RT @DaveMarcus: Cyberbullying: How to Be Part of the Solution: Cyberbullying is a public health issue that continues to go thr... http://t.…
  • RT @RazorEQX: US to Propose Bill against Foreign #Hackers http://t.co/8rCu0l3Jk3
  • RT @SecurityWeek: Gen. Alexander Wants Radical Changes at U.S. Cyber Command http://t.co/C2xPWNTPfr #Cybersecurity
  • Missed the Responder Pro: Understanding 'Normal Windows' webinar yesterday? You may access the archive here: https://t.co/WWzQtuaQfA
  • @KDPryor Our webinar recording is available! Please visit the link here, and let me know if you cannot access it. :) https://t.co/WWzQtuaQfA
  • VA Systems Hacked From Abroad: At Least 8 Nation-States Said to Be Behind Attacks http://t.co/MwXMSRmA67 via @GovInfoSecurity
  • RT @SecurityWeek: Chinese Hacking Group Linked to NetTraveler Espionage Campaign http://t.co/OAqwp2cOPO
  • RT @helpnetsecurity: The rise of the Koobface social networking worm - http://t.co/BLYnvbuk0c
  • RT @DarkReading: End user security requires layers of tools and training as employees use more devices and apps http://t.co/TLvf1vKyEk
  • RT @SkywrathTechInc: China Says Its Navy Is Spying On America | @DCITA http://t.co/bHBbG9OdKR
  • Thank you everyone for attending our webinar! If you were unable to attend, we will have the recorded meeting available for you shortly!
  • RT @SkywrathTechInc: Still time to register for the HBGary Responder Pro: Understanding “Normal Windows” webinar, TODAY at 1PM PST! http://…
  • RT @helpnetsecurity: Web developer devises new phishing trick - http://t.co/3RhMOzCL9L
  • RT @RazorEQX: Net Traveler #Espionage Campaign Uncovered, Links to Gh0st #RAT, Titan Rain Found: http://t.co/4GqhSH7Tvs #malwaremustdie
  • RT @teamcymru: The anatomy of a phishing operation http://t.co/2ins2HrSQO
  • Still time to register for the HBGary Responder Pro: Understanding “Normal Windows” webinar, TODAY at 1PM PST! https://t.co/MOrXr2v7GG
  • RT @TheHackersNews: Again from China with Love ! #Malware targets 350 high profile victims in 40 countries http://t.co/doQ83INCJk #Security
  • RT @SkywrathTechInc: Black Hat hackers break into any iPhone in under a minute, using a malicious charger | @ExtremeTech http://t.co/pP4fQO…
  • Join us tomorrow 6/4 1PM PST for the HBGary Responder Pro: Understanding “Normal Windows” webinar. Register here: https://t.co/MOrXr2v7GG
  • Largest ever DDoS attack directed at financial firm, Prolexic reports: DNS reflection tactic http://t.co/cSe9Sm5Spf via @NetworkWorld
  • RT @cylanceinc: Hacker Claims Airplanes Vulnerable at 30,000 Feet http://t.co/lNId1vvqoj
  • RT @PatrickCMiller: News: White-hat hacker fights cyber intrusions on NATO systems, 03-Jun.-2013 http://t.co/YwD4YWO1qh
  • RT @PhysicalDrive0: Reverse Engineering #Malware videos released! http://t.co/xh0fYHmogI
  • @AxessLAN Thank you for your question, Josh! If you could please DM us with your contact information, we'd love to work with you on this. :)
  • RT @TheHackersNews: China military to conduct training on digital #warfare, modernizing cyber attacks http://t.co/ECFef2YATS #Security #Inf…
  • HBGary CSO Jim Butterworth will present 'Skimming at the Register: Fraud Goes High-Tech' 6/25-26 @TheACFE Fraud Conf http://t.co/3GTSDw56fW
  • Matthew Standart will provide an overview of a capability-driven incident response program at AZ @HTCIA on 6/12: http://t.co/GGgmXINFtb
  • RT @RazorEQX: BBC News - 'Fake votes' cast in France's first digital election http://t.co/GgmSBFzWOX #hacking
  • RT @sansforensics: New #DFIR Blog Post: Getting Your First DFIR Job - Recently, I spoke to students in a computer forensics class who... ht…
  • RT @TrendLabs: New post: Cybercriminals Catch up With the Digital Landscape http://t.co/r4cXhyjmll @TrendMicro @TrendMicro
  • RT @MKaiserNCSA: FBI warns of scammers using photo sharing to infect computers. http://t.co/oP8UfTF7kH #FBI #cybersecurity #malware
  • Are DDoS Attacks Against Banks Over? Experts Debate What Lull in Activity Means http://t.co/GmyAdB4XHx | via @FraudBlogger
  • Cyberattacks Could Disable Banking System, Defense Secretary Hagel Says http://t.co/EB6IsYPmMr | via @AmerBanker
  • RT @TheHackersNews: China continues to deny carrying out cyberattacks against U.S. http://t.co/7DVSM4ROHX Stopping APTs http://t.co/gYNqdun…
  • The Case for Teaching Network Protocols to Computer Forensics Examiners: Part 1 http://t.co/2q2TAnpQPb | via @DFINews
  • New Commercial Trojan #INTH3WILD: Meet Beta Bot http://t.co/ik1q0PyB8y | via @rsasecurity
  • RT @securitypro2009: CISOs Must Engage the Board About Information Security CIOcom http://t.co/VAGDl95gJk
  • @tmatd Hello Mat! If you would please send an e-mail to: support@hbgary.com, we would be more than happy to assist you! :)
  • Malware: The Threat to Medical Devices. Infected devices may "give incorrect data to healthcare professionals." http://t.co/sXuZn8oAIk
  • Manufacturers & their suppliers continue to be targets of cyberattacks. Learn to build an effective IR plan, join us https://t.co/wO3U0eaeeX
  • RT @SecurityWeek: Continuous Monitoring and the Confusion It Causes http://t.co/2oFePPyhNj
  • RT @helpnetsecurity: Employees continue to use risky apps on mobile devices - http://t.co/Avo2gtyPj2 - @SANSInstitute
  • RT @DarkReading: Hacking The TDoS Attack http://t.co/5PPP1euTYW
  • RT @c_APT_ure: New blog post just up: "Ponmocup Hunter" SANS DFIR Summit 2013 http://t.co/FGsL3xa6wW #Ponmocup #malware #DFIR #DFIRsummit
  • RT @healthinfosec: Malware: The Threat to Medical Devices - HealthcareInfoSecurity http://t.co/tQE9ux9MDU
  • RT @DaveMarcus: Ask slashdot: Is GNU/Linux Malware a Real Threat? http://t.co/ac5677GdyV < good comments
  • RT @TheHackersNews: #Malware writers make it is possible to trigger malware hidden in mobile devices using music, lighting or vibration : h…
  • Join us on 6/4 1PM PST for "Responder Pro: Understanding Normal Windows" w HBGary Sr. Systems Engineer Kris Gabor! https://t.co/MOrXr2v7GG
  • Protecting the Critical Infrastructure Has Become More Critical http://t.co/CAZOcMPfJu | via @ITBusinessEdge
  • New York Queries Insurers on Cybersecurity: Safeguarding a Virtual Treasure Trove from Hackers http://t.co/ahjNO7aC24 via @GovInfoSecurity
  • RT @DaveMarcus: 5 Mobile Security Tips: Cybercrime is one of the most lucrative illegal businesses of our time, and it shows n... http://t.…
  • RT @RazorEQX: #China Defence Ministry Dismisses US #Cyberspying Paper | http://t.co/hejPp5cQIX http://t.co/0fey59KtEx via @SecurityWeek
  • RT @MiltonSecurity: "Beta Bot" marks the latest banking #malware to hit the online underground. #infosec #botnet #trojan #cybercrime http:/…
  • RT @DarkReading: Google Sets New 'Aggressive' 7-Day Deadline For Vendors To Reveal Or Fix Zero-Day Bugs Under Attack http://t.co/GfiV6OJrmU
  • RT @SecurityWeek: Drupal Forces Password Resets After Breach Discovery http://t.co/sqh8Cska2t
  • RT @unixfreaxjp: #MalwareMustDie! Story of #UNIX Trojan: Tsunami (IRC/Bot) w/ Flooder, Backdoor at a hacked xBSD via Web Panel Attack http:…
  • RT @DarkReading: Fact Check: Endpoints Are The New Perimeter: http://t.co/DuBu9UGlwQ
  • RT @InR00tWeTrust: InRootWeTrust on Tweeted Times http://t.co/d1r2nn3oSQ - top stories by McAfee_Labs, DaveMarcus, HBGary
  • RT @SecMash: FAQ on global supply-chain security standard to prevent IT tampering, counterfeiting http://t.co/aFsVCv0YOi #InfoSec
  • "Attacks can come from so many different sources," Ken Silva said, "and code can be reused across environments, groups and states."
  • @ManTech @HBGary Ken Silva in the @TechNewsWorld article "Chinese Hackers May Have Pinched US Military Designs." http://t.co/bZleIKXela
  • RT @kaspersky: RT @threatpost: UPDATE: PayPal to Fix XSS Flaw, But No Reward For Researcher: http://t.co/w3AO1cvEeo <-- Now with comments f…
  • RT @JussiPeralampi: Cylance Tech Blog | Uncommon Event Log Analysis for Incident Response and Forensic Investigations http://t.co/S0LiDUVc7I
  • RT @DaveMarcus: You’re Being Hacked http://t.co/oZRFK3eu2P via @newsweek < Soon the laptop of @th3j35t3r will be on display at @IntlSpyMuse…
  • Signature-Based Endpoint Security on Its Way Out http://t.co/uEthghojqK | via @PCAdvisor
  • RT @SecurityWeek: $6 billion US Fraud Probe Targets Digital Currency http://t.co/TUMd2gugik
  • RT @SecurityWeek: All Governments Hack Secret Data: Huawei https://t.co/aRE4cHN0Ik
  • Join the free webinar "Building An Effective Incident Response Plan: What Manufacturers Need to Know" 6/26 1PM EST! https://t.co/X1toybbDE3
  • @ManTech & @HBGary Ken Silva in "Chinese Cyberspies Access U.S. Military Weapons System Designs" http://t.co/VELGFs0drt via @DarkReading
  • RT @MiltonSecurity: #SpearPhishing Paves Road for Advanced Persistent Threats. #infosec #phishing #cybersecurity http://t.co/4Uq5Pqsof7
  • RT @PatrickCMiller: SCADA IDS Moving To Emerging Threats http://t.co/LTBTr60giR
  • RT @sansforensics: 10 MIN AWAY DFIR Webcast Today @ 1 PM EDT -- @MalwareJake: Got malware? Get up 2 speed quickly using APT1 https://t.co…
  • @HBGary's Ken Silva in "@ManTech Eyes Cybersecurity Innovations Transferable Between Public And Private Sectors." http://t.co/vvy2WtWiVF
  • RT @CoreSecurity: Bank #Phishing Attacks Raise Security Fears via @newsfactor http://t.co/hCb9YmCkOw
  • RT @kjhiggins: How AIG uses endpoint "honeypots": http://t.co/OqebKiEVvP
  • RT @tvargasciodb: Critical Ruby on Rails bug exploited in wild, hacked servers join botnet http://t.co/1mHmcgYUNU
  • RT @RSAConference: How #bigdata and technology are shaping the consumer landscape - via @SCMP_News http://t.co/p4mfGpGEsw
  • RT @MasafumiNegishi: "Flame One Year Later" http://t.co/3KFncFBPn2
  • RT @helpnetsecurity: Can mobile malware be activated via sensors? http://t.co/Dt2U07Skby
  • RT @DarkReading: Liberty Reserve Laundered $6 Billion and was 'bank of choice for the criminal underworld': http://t.co/Fa2uyhmSbW
  • Iranian Cyber-Attackers Target US Energy Companies, featuring @ManTech & @HBGary Ken Silva: http://t.co/a7wehMiS0o
  • @ManTech's Ken Silva is featured in the Sci Tech Today article: "Chinese Said To Have Hacked U.S. Weapons Designs." http://t.co/RmMvwkAgv4
  • RT @DarkReading: The Network And The Malware http://t.co/QfavciizsE
  • RT @CoreSecurity: Most breaches can be tied directly to human error and/or a breakdown in protocol, explains CORE CEO in @SecurityWeek http…
  • RT @SecurityWeek: Syrian Electronic Army Launched Cyber Attack Against Israeli Water System http://t.co/CY3EOPq39N #ICS #Cybersecurity
  • RT @taosecurity: Shocking story by @nakashimae in @washingtonpost on Chinese theft of DoD weapons info http://t.co/PYCNFvdbug Stolen: http:…
  • RT @helpnetsecurity: U.S. weapons systems designs reportedly stolen by hackers - http://t.co/GlpQjZ3bTo
  • HBGary CSO Jim Butterworth to moderate NYC CISO Executive Summit panel tomorrow: http://t.co/sqc5CU827x
  • HBGary Sr. Director of Incident Response, Joe Riggins, to present “Memory Forensics Demystified” tonight for Chi4n6 http://t.co/GGoG0KNqdP
  • Schnucks security breach expensive for local banks http://t.co/fGBp6Oqu7K | via @semissourian
  • Only one month left to take advantage of our special pricing on HBGary Online Instructor-Led Training Courses! http://t.co/jmkN7WzMF6
  • Join Matthew Standart's HBGary webex: “Building An Effective Incident Response Plan" 6/26 @ 1PM PST. Register here: https://t.co/wO3U0eaeeX
  • RT @joshcorman: Streaming for #BSidesDEN is at http://t.co/tAYxJbeFt6 but we are breaking for lunch
  • RT @threatpost: Report Says Active Recovery Efforts Could Deter IP Theft By Foreign Attackers - http://t.co/nK6uyePmzh
  • @ultradeus Looking forward to it!!
  • RT @WSJ: Breaking: Iranian-backed hackers have escalated a campaign of cyberassaults against U.S. firms, the U.S. says. http://t.co/Lp1uUiK…
  • RT @VZEnterprise: DBIR Video Series Part 4: What Should My Organization Do, When Attacked? http://t.co/0Wlj8u2ouc #DBIR @VerizonJanet #Info…
  • Cyber criminals refined old versions of the Zeus/Zbot malware, in order to steal financial information: http://t.co/wFxAEFdtbk @v3_co_uk
  • Judging Cyberthreat Against Power Grid: Not All Cyber-Attacks on Electric Industry are Equal http://t.co/okN6eWY63p | via @GovINfoSecurity
  • Cybercrooks siphon $800,000 from US fuel distribution firm http://t.co/nbxfJBCybK | via @NakedSecurity
  • RT @DarkReading: Focused Black Hat 2013 Trainings Focus On Incident Response, Malware http://t.co/9X5Sv1Rrd7
  • RT @DarkReading: BIOS Bummer: New Malware Can Bypass BIOS Security http://t.co/yOQ65wx7Ov
  • RT @SecurityWeek: DHS Says Software Vulnerability Put Sensitive Employee Information At Risk http://t.co/moW2u9kvBc
  • RT @BrianHonan: My slides from my talk yesterday at @SOURCEConf Dublin are now on Slideshare http://t.co/5PRuRmlPbE
  • RT @cyber: DHS Blog: Beware of Cyber Criminals Capitalizing on the Tragedy in Oklahoma http://t.co/SUZsXSGBtb
  • RT @SCMagazine: Critical vulnerablilty discovered in industrial control product | http://t.co/CiphOosq0d
  • RT @ICSISAC: #SCADA security is better and worse than we think • The Register http://t.co/loByzVkQfv
  • Join us on 5/28 at 1PM PST for the HBGary webinar: "Active Defense: Basic Overview of How To Use It, How It Works." https://t.co/UiicqA7aOH
  • RT @RobotSpaf: Cybersecurity expert adds CNN contributor to his resume - Purdue Exponent: Features http://t.co/9Y76C137mO
  • RT @SophosLabs: Cyber security in US power system suffering from reactive, self-policed rules http://t.co/T6AajGW1K0
  • RT @PatrickCMiller: The Danger of Mixing Cyber Espionage with Cyber Warfare http://t.co/kNd3n8Z2e9
  • RT @josephmenn: Panel urges tougher U.S. response to trade secret theft (but not hackback free for all) http://t.co/MYznRlVlva
  • New startups prime targets for cyberattacks http://t.co/oX0Wb4TEeo | via @CNNMoneyTech
  • RT @McAfeeBusiness: Koutodoor and TDSS: two rootkits you don't want to tangle with http://t.co/4kbxHrsxCV via @McAfee
  • RT @SecMash: Proxy Advisory Firm Fined $300000 for Data Breach - DailyFinance http://t.co/TvWJSzlFK4 #InfoSec
  • HBGary Online Instructor-Led Training Courses: Just one month left for the special introductory pricing! Learn more: http://t.co/jmkN7WzMF6
  • RT @cylanceinc: Our own @JustinWClarke discusses the Markey-Waxman report on the cyber security of power utilities via @csoonline http://t.…
  • RT @PCMag: 2013 Will be Malware's Biggest Year Ever http://t.co/sQ9QcFc8E9
  • RT @GetCarbonBlack: The recent power grid vulnerability report should be a wakeup call to all security professionals, not just Congress - h…
  • RT @jmatthewg1234: @HBGary @globeandmail But given prevention isn't sufficient, good detection, investigation, & response capabilities are …
  • RT @SkywrathTechInc: Kinda funny: More than 90 per cent of the user-generated passwords in the Middle East are susceptible to hacking. http…
  • RT @SkywrathTechInc: Our friends at HBGary will be presenting “Building An Effective Incident Response Plan: What Manufacturers Need to... …
  • @SkywrathTechInc Thank you so much! :)
  • "Active Defense: Basic Overview of How To Use It, How It Works." webinar with HBGary Systems Engineer, Jim Richards: https://t.co/9D3nY9ALkz
  • HBGary Webinar: Building an Effective Incident Response Plan: What Manufacturers Need to Know, with Matthew Standart https://t.co/wO3U0eaeeX
  • RT @chicurity: In 1 week: @Chi4n6 RMU 401 S. State St Chicago May 28th 6pm. Joe Riggins presenting: Memory Forensics Demystified. Sponsored…
  • RT @helpnetsecurity: Google researcher reveals another Windows 0-day - http://t.co/tMN05etIsD
  • RT @DarkReading: Security is a central driver in enterprise Governance, Risk and Compliance initiatives, experts say http://t.co/QPtIUL36fD
  • RT @scoraellis: @ultradeus @Chi4n6 just saw @hbgary at #ceic2013. Really cool stuff, hope I can make it!
  • Data breaches: It’s more expensive to react than prevent http://t.co/wR9Ptk5PwU | via @GlobeAndMail
  • RT @briankrebs: Press exposure of Federal data security hole leads to legal threats http://t.co/76lAeiNOPc < sadly all too common still
  • NC Fuel Distributor Hit by $800,000 Cyberheist - Failed to notice attackers for 5 days. http://t.co/WYMz09mx0F | via @BrianKrebs
  • Targeted Cyber-Attacks: How to Respond http://t.co/ScridHTVgA | @ via @SecurityEditor
  • RT @josephmenn: 'Irrational' hackers are growing U.S. security fear http://t.co/dqaL40XquK via @reuters
  • RT @healthinfosec: $400,000 Penalty in HIPAA Case After Breach Investigation http://t.co/1AO23gtegc
  • RT @VZEnterprise: 2013 Data Breach Investigations Report: An Insider’s Look on What’s Behind the China Connection http://t.co/CmXkvUe4C0 #…
  • RT @cylanceinc: Wordpress under attack (again). New blog post from Cylance researchers Brian Wallace and Aaron Bryson http://t.co/VEzJGft71l
  • As Chinese Leader’s Visit Nears, U.S. Is Urged to Allow Counterattacks on Hackers http://t.co/dHwlEQqXHl | via @nytimestech
  • The Eight Most Common Causes Of Data Breaches http://t.co/llpXnPj4kG | via @DarkReading
  • Attackers could exploit critical vulnerabilities in game engines to compromise game clients and servers. http://t.co/djqVwAhg2h
  • RT @SecMash: US Electric Grid Shows 'Worrying' Security Gaps - TechWeekEurope UK http://t.co/HWhq2Yv2L4 #InfoSec
  • Join us for our HBGary Webinar on 5/28 at 1PM PST- "Active Defense: Basic overview of how to use it, how it works." https://t.co/GKCjzvJkIV
  • RT @DaveMarcus: April #SecChat Recap: The Future of Cyber Education: View the story “April #SecChat Recap: The Future of Cyber... http://t.…
  • RT @mikko: The "Rajinder Kumar" Apple Developer ID has been used to sign at least six Mac OS X trojans. http://t.co/xteTq1UwpB
  • RT @helpnetsecurity: Experts highlight top data breach vulnerabilities - http://t.co/isB5uHI9Po
  • RT @DarkReading: Myth-Busting SQL- And Other Injection Attacks http://t.co/7E1CQiScDG
  • RT @PatrickCMiller: Interactive "Industrial Risk Assessment Map" visualizes locations of ICS/SCADA and BMS devices found on the Internet ht…
  • RT @SkywrathTechInc: Quantum Or Not, New Supercomputer Is Certainly Something Else. http://t.co/upjq9oK2oa
  • "Highly motivated and well funded" Chinese Hackers Resume Attacks on U.S. Targets. Orgs need the 5 key phases of IR. http://t.co/wO37NvRGjx
  • Power utilities claim 'daily' and 'constant' cyberattacks, says report http://t.co/MAWXFiOSrZ | via @CNet
  • RT @chicurity In 1 week: @Chi4n6 RMU 401 S. State St Chicago May 28th 6pm. @HBGary Joe Riggins presenting: Memory Forensics Demystified.
  • RT @dataprivacyrisk: Cyber Attacks On Banks More Serious Than Public Realizes http://t.co/RnBEb0FJpE
  • RT @RazorEQX: New Citadel Malware Strain Targeting Payza Service: http://t.co/3OA9DRAoyH #malwaremustdie #malware
  • RT @DarkReading: Yahoo Japan officials say they "can't deny the possibility" of epic data breach http://t.co/rkhi6XXa57
  • RT @helpnetsecurity: Aurora attackers were looking for Google's surveillance database - http://t.co/oUS1zYpfVD
  • Cyber Espionage Campaign Hits Organizations Around the Globe http://t.co/Xu5cI34nam | via @SecurityWeek
  • HBGary CSO Jim Butterworth featured in: Chinese Hackers Resume Attacks on U.S. Targets http://t.co/tx1j2WWDtk
  • RT @redcrossokc: Best way to help tornado victims is to donate to the Red Cross at http://t.co/ZVb8VmMdvx or text REDCROSS to 90999. #okwx
  • RT @PatrickCMiller: Building A Secure Manufacturing Infrastructure http://t.co/0PMVE2egNa
  • RT @SkywrathTechInc: US claims Chinese military is on new cyber offensive against America via @c0rr0s10n http://t.co/Qh07BPRTVW
  • Learn about cyberthreats facing manufacturing companies & how to identify, manage & respond to security incidents: https://t.co/BYkfnMezeQ
  • RT @RSAConference: Business intelligence is also #security intelligence - via @zdnet | http://t.co/gJxE0evKSx
  • Responder Pro 2.1 detects the latest malware variants undetected by anti-virus, IOCs & signature-based solutions http://t.co/Pmfdk1mXbH
  • Check out @NetworkWorld's Products of the week: Responder Pro 2.1 http://t.co/s6zCPJuVcJ
  • RT @Chi4n6: REMINDER: Meeting 5/28/13 @ RMU. Presenter: Joe Riggins - "Memory Forensics Demystified". Sponsored by HBGary
  • How anticipating a health data breach can boost security http://t.co/uaUtDWGPlI | via @SecurityHIT
  • RT @secureslinger: The secureslinger Daily is out! http://t.co/KtUgRKMUa0 ▸ Top stories today via @HBGary @RizkyMuhammadF @MrsYisWhy
  • RT @rsasecurity: New #RSA Blog Post! Don’t Fear the Hangover – Network Detection of Hangover Malware Samples http://t.co/rWMpGwt7T0
  • RT @DarkReading: 'Commercialized' Cyberespionage Attacks Out Of India Targeting U.S., Pakistan, China, And Others http://t.co/wy3abjLDWx
  • RT @SCMagazine: The new attack infrastructure is conducting national security and industrial espionage on targets across the world. http://…
  • RT @SCMagazine: Espionage hacking campaign "Operation Hangover" originates in India | http://t.co/t0rAt8ZuAR
  • State-sponsored cybercriminals use simple weapons to infiltrate US networks & remain undetected while stealing data. http://t.co/wF4Yil3DJD
  • 'Aggressive' espionage-for-hire operation behind new Mac spyware http://t.co/6Y3roMxPnv | via @ZDNet
  • RT @kjhiggins: Operation Hangover signals new franchise model in cyberespionage with cyberspying services for hire. http://t.co/VipoOe8RKN
  • RT @cylanceinc: Watch Shane Shook discuss the threat landscape in 2013 via @reuters http://t.co/kCyuSUfScB
  • Stopping Hacks from Stealing Corporate Secrets or Disrupting Electric Service http://t.co/HuKl2STquY | via EnergyBiz
  • RT @i_defender: China's Unit 61398 Resume #Cyberattacks & IP theft on U.S. Targets via @nytimes http://t.co/XFVHnlgnnh
  • Researchers uncover new global cyberespionage operation dubbed Safe http://t.co/58mgaM4JF2 | via @NetworkWorld

About MCSI

ManTech Cyber Solutions International (MCSI) delivers advanced cybersecurity and information security products to the commercial and federal marketplace. We provide endpoint malware detection, memory forensics, reverse engineering, and incident response products and services.


MCSI Advantage


Active Defense 1.3 recognized as 2014 Best Security Software Bronze Award at the Info Security's Global Excellence Awards ceremony held at the RSA Conference

Read More...