Richard Bejtlich

Type: Person
Name: Richard Bejtlich
First reported Sep 18 2014 - Updated Sep 18 2014 - 1 reports

US greenlights Chinese universities’ plan to adopt NSA cyber training

21:06Reuters / StringerSchools in China are free to borrow from a cybersecurity program being implemented across the United States, the head of the US National Initiative for Cybersecurity Education said in a recent interview.The National Centers of Academic ... [Published Russia Today - Sep 18 2014]
First reported Sep 18 2014 - Updated Sep 18 2014 - 1 reports

Chinese hack defense contractors

WASHINGTON — The Chinese government has frequently hacked into the computer systems of defense contractors for the U.S. Transportation Command, the Pentagon agency responsible for deploying American troops and military equipment worldwide.A bipartisan ... [Published Pittsburgh Tribune Review - Sep 18 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

We Need More Than Penetration Testing

Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ... [Published TaoSecurity - Sep 16 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

A Brief History of Network Security Monitoring

Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the ... [Published TaoSecurity - Sep 16 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

Week 37 In Review – 2014

Events Related ArchC0n ’14 Report – www.digitalbond.com Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller ... [Published Security Bloggers Network - Sep 16 2014]
First reported Sep 08 2014 - Updated Sep 08 2014 - 1 reports

ArchC0n ’14 Report

I spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason I chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the ... [Published Digital Bond's SCADA Security Portal - Sep 08 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

Bejtlich Teaching at Black Hat Trainings 8-9 Dec 2014

I'm pleased to announce that I will be teaching  one class  at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is  Network Security Monitoring 101 . I taught this class in Las Vegas in July 2013 and 2014, and Seattle ... [Published TaoSecurity - Sep 04 2014]
First reported Sep 03 2014 - Updated Sep 03 2014 - 1 reports

The Hacker 'Skills Gap' May Be More of a Strategy Gap

It sure feels like the bad guys are winning.In the ongoing cat-and-mouse game between malicious hackers and their targets – any individual, company, agency or government with information that might be profitable or useful – the bad news for the “mice” ... [Published CIO Magazine - Sep 03 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Air Force Leaders Should Read This Book

I just finished reading  The Icarus Syndrome: The Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force by Carl Builder. He published this book in 1994 and I wish I had read it 20 years ago as a new Air Force second lieutenant. ... [Published TaoSecurity - Aug 22 2014]
First reported Aug 18 2014 - Updated Aug 19 2014 - 2 reports

US Nuclear Regulatory Commission Hacked, Government Confirms

The Nuclear Regulatory Commission, which monitors weapons-grade radioactive material, detected and prevented a security issue from becoming a dangerous eventThe Nuclear Regulatory Commission (NRC), the US government agency that monitors US nuclear reactors ... [Published Value Walk - Aug 18 2014]
First reported Jul 08 2014 - Updated Jul 09 2014 - 2 reports

Chinese cyberspies have hacked Middle East experts at major U.S. think tanks

Middle East experts at major U.S. think tanks were hacked by Chinese cyberspies in recent weeks as events in Iraq began to escalate, according to a cybersecurity firm that works with the institutions. The group behind the breaches, called "DEEP PANDA" ... [Published Post Tech - Jul 08 2014]
First reported May 14 2014 - Updated May 14 2014 - 2 reports

Incite 5/14/2014 — Solo Exploration

Is it possible to like interacting with people, yet need time alone? To really enjoy working as a team, yet cherishing a night of solitude? I’ve always defined myself as an introvert. It provided a convenient excuse when I just didn’t want to deal with ... [Published Security Bloggers Network - May 14 2014]

More Content

All (52) | News (14) | Reports (0) | Blogs (38) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
US greenlights Chinese universities’ plan to ad... [Published Russia Today - Sep 18 2014]
Chinese hack defense contractors [Published Pittsburgh Tribune Review - Sep 18 2014]
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
A Brief History of Network Security Monitoring [Published TaoSecurity - Sep 16 2014]
Week 37 In Review – 2014 [Published Security Bloggers Network - Sep 16 2014]
ArchC0n ’14 Report [Published Digital Bond's SCADA Security Portal - Sep 08 2014]
Bejtlich Teaching at Black Hat Trainings 8-9 De... [Published TaoSecurity - Sep 04 2014]
In case of cyberattack: NATO members ready to p... [Published ArsTechnica - Sep 04 2014]
The Hacker 'Skills Gap' May Be More of a Strate... [Published CIO Magazine - Sep 03 2014]
Cybersecurity hiring crisis: Rockstars, anger a... [Published ZDNet - Aug 26 2014]
Air Force Leaders Should Read This Book [Published TaoSecurity - Aug 22 2014]
US Companies Can't Protect Citizens? Chinese Ha... [Published Christian Post - Aug 20 2014]
US nuclear watchdog fails to defend its own com... [Published FierceITSecurity - Aug 19 2014]
US Nuclear Regulatory Commission Hacked, Govern... [Published Value Walk - Aug 18 2014]
Exclusive: Nuke Regulator Hacked by Suspected F... [Published Nextgov.com - Aug 18 2014]
Cyber Spies Hit 760 Companies [Published Treasury & Risk Management - Jul 19 2014]
Chinese cyberspies have hacked Middle East expe... [Published Post Tech - Jul 08 2014]
Chinese cyberspies have hacked Middle East expe... [Published Faster Forward - Jul 08 2014]
Is there a Cuckoo in your control system? [Published Liquidmatrix Security Digest - Jul 01 2014]
A 360° View of Cybersecurity – FireEye Incident... [Published FireEye Blog - Jun 17 2014]
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
US indicts five in China's secret 'Unit 61398' ... [Published Christian Science Monitor - May 19 2014]
A Deeper Dive into M-Trends with Richard Bejtlich [Published Security Bloggers Network - May 19 2014]
Video of Bejtlich at Cyber Crime Conference 2014 [Published TaoSecurity - May 14 2014]
Incite 5/14/2014 — Solo Exploration [Published Security Bloggers Network - May 14 2014]
Incite 5/14/2014 — Solo Exploration [Published Securosis Highlights - May 14 2014]
On “Defender’s Advantage” [Published Anton Chuvakin - May 09 2014]
Strategy, Not Speed: What Today's Digital Defen... [Published Brookings Latest From Brookings - May 07 2014]
Brainwashed by The Cult of the Quick [Published TaoSecurity - May 04 2014]
Friday News & Notes [Published Digital Bond's SCADA Security Portal - Apr 25 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ...
A Brief History of Network Security Monitoring [Published TaoSecurity - Sep 16 2014]
Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the ...
Week 37 In Review – 2014 [Published Security Bloggers Network - Sep 16 2014]
Events Related ArchC0n ’14 Report – www.digitalbond.com Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller ...
ArchC0n ’14 Report [Published Digital Bond's SCADA Security Portal - Sep 08 2014]
I spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason I chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the ...
Bejtlich Teaching at Black Hat Trainings 8-9 De... [Published TaoSecurity - Sep 04 2014]
I'm pleased to announce that I will be teaching  one class  at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is  Network Security Monitoring 101 . I taught this class in Las Vegas in July 2013 and 2014, and Seattle ...
1 2 3 4 5 6 7 8
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.