Richard Bejtlich

Type: Person
Name: Richard Bejtlich
First reported Apr 20 2014 - Updated Apr 20 2014 - 1 reports

For China And U.S., An Attempt To Clarify Rules Of Cyberwarfare : NPR

The U.S. tech industry has long been a favorite target of cyberattacks from China. Now Defense Secretary Chuck Hagel is in Beijing, where he’s set to give a speech encouraging more dialogue between the U.S. and China over cyberwarfare. Here to talk more ... [Published Journal of Law & Cyber Warfare - Apr 20 2014]
First reported Apr 10 2014 - Updated Apr 11 2014 - 1 reports

Does the Heartbleed Bug Mean You Should Stay Off the Internet?

On Tuesday, news broke[1] that the safeguard many websites use to protect sensitive information on the internet has had a major security flaw for about two years. These sites use a security system called OpenSSL [2]to encrypt data like content, passwords, ... [Published DailyMe.Com - Apr 10 2014]
First reported Apr 09 2014 - Updated Apr 10 2014 - 1 reports

Does the Heartbleed Bug Mean You Should You Stay...

On Tuesday, news broke that the safeguard many websites use to protect sensitive information on the internet has had a major security flaw for about two years. These sites use a security system called OpenSSL to encrypt data like content, passwords, and ... [Published Mother Jones - Apr 09 2014]
First reported Apr 07 2014 - Updated Apr 07 2014 - 1 reports

For China And U.S., An Attempt To Clarify Rules Of Cyberwarfare

Monday, April 07, 2014Richard Bejtlich, the chief security strategist at cybersecurity company FireEye, discusses the concerns over the growing possibility of cyberwarfare between China and the U.S.Source ... [Published WNYC - Apr 07 2014]
First reported Apr 02 2014 - Updated Apr 02 2014 - 1 reports

Cybersecurity Law Institute

Cooley Special Counsel Randy Sabett will be speaking on the panel "Offensive Cyber Operations or Cyber Self-Defense: A Simulation."The seeks to help lawyers from companies, private practice, and state and federal government deal more effectively with ... [Published Cooley - Apr 02 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

SEC reviews cybercrime risks to financial markets

The Securities and Exchange Commission is examining the exposure of stock exchanges, brokerages and other Wall Street firms to cyberattacks that have been called a threat to financial stability.The SEC held a roundtable discussion of those risks in Washington ... [Published San Francisco Chronicle - Mar 27 2014]
First reported Mar 26 2014 - Updated Mar 26 2014 - 1 reports

Cyber chat @Brookings: Listen to the podcast

Two weeks ago the Brookings Institution hosted a round table with Ralph, Peter Singer, Richard Bejtlich, and Ian Wallace. The discussion was recorded and is available as a podcast. Topics discussed range from the NIST Cyber Security Framework via the ... [Published Langner – The last line of cyber defense - Mar 26 2014]
First reported Mar 24 2014 - Updated Mar 25 2014 - 3 reports

Re: Late Friday thoughts on the Kevin Mandia RSAC keynote.

Posted by Val Smith on Mar 25 I tried to have this debate several years ago and here is how it ended(note, I never once had any idea, discussion or desire to do businesswith Mr. Bejtlich), draw your own conclusions:---From: Richard Bejtlich Subject: ... [Published Daily Dave - Mar 25 2014]
First reported Mar 25 2014 - Updated Mar 25 2014 - 3 reports

Ukraine Crisis, Target Breach, and Edward Snowden: What's Next for U.S. Cyber Policy?

What does the crisis in Ukraine, the resignation of Target’s chief information officer, and the effect of Edward Snowden on European legislators all have in common? According to Brookings cybersecurity experts, they are all going to be central to the ... [Published Brookings Institution - Mar 25 2014]
First reported Mar 25 2014 - Updated Mar 25 2014 - 1 reports

What Federal Cyber Breach Notifications Really Mean for Business

On Monday March 24th, Ellen Nakashima published a story in the Washington Post describing one of the most significant government security programs active today. She reported that White House official Lisa Monaco, deputy national security adviser for ... [Published Brookings Latest From Brookings - Mar 25 2014]
First reported Mar 24 2014 - Updated Mar 24 2014 - 1 reports

Re: Late Friday thoughts on the Kevin Mandia RSAC keynote.

Posted by Richard Bejtlich on Mar 24 Moses is right. Dave misunderstood what Kevin said. Also, APT1 is onlyone of two dozen or so Chinese groups Mandiant tracks. We also trackRussians, etc.Sincerely,Richard ... [Published Daily Dave - Mar 24 2014]
First reported Mar 11 2014 - Updated Mar 11 2014 - 2 reports

Setting Traps and Going Hunting

As part of our podcast series, live from the RSA USA Conference ,  we are digging into the topic of advanced threats, attacks, and best practices to implement on the network. In this podcast, our host, Richard Bejtlich, sits down with Chris Bream, director ... [Published Security Bloggers Network - Mar 11 2014]

More Content

All (53) | News (11) | Reports (0) | Blogs (42) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
For China And U.S., An Attempt To Clarify Rules... [Published Journal of Law & Cyber Warfare - Apr 20 2014]
​Snowden circumvents NSA by cheap software [Published Mehr News - Apr 15 2014]
Does the Heartbleed Bug Mean You Should Stay Of... [Published DailyMe.Com - Apr 10 2014]
Does the Heartbleed Bug Mean You Should You Sta... [Published Mother Jones - Apr 09 2014]
Does the Heartbleed Bug Mean You Should You Sta... [Published MoJo Articles | Mother Jones - Apr 09 2014]
For China And U.S., An Attempt To Clarify Rules... [Published WNYC - Apr 07 2014]
Top Chief Security Officers (CSOs) to Follow on... [Published CEOWorld Magazine - Apr 04 2014]
Cybersecurity Law Institute [Published Cooley - Apr 02 2014]
SEC reviews cybercrime risks to financial markets [Published San Francisco Chronicle - Mar 27 2014]
SEC Probes Threat From Hacker Attacks Against W... [Published Moneynews - Mar 26 2014]
Cyber chat @Brookings: Listen to the podcast [Published Langner – The last line of cyber defense - Mar 26 2014]
Re: Late Friday thoughts on the Kevin Mandia RS... [Published Daily Dave - Mar 25 2014]
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Institution - Mar 25 2014]
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Latest From Brookings - Mar 25 2014]
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Up Front - Mar 25 2014]
What Federal Cyber Breach Notifications Really ... [Published Brookings Latest From Brookings - Mar 25 2014]
Re: Late Friday thoughts on the Kevin Mandia RS... [Published Daily Dave - Mar 25 2014]
Re: Late Friday thoughts on the Kevin Mandia RS... [Published Daily Dave - Mar 24 2014]
Re: Late Friday thoughts on the Kevin Mandia RS... [Published Daily Dave - Mar 24 2014]
Are Nation States Responsible for Evil Traffic ... [Published TaoSecurity - Mar 20 2014]
Updating Network Security Monitoring for the Cloud [Published Trend Cloud Security Blog - Trend Micro - Mar 18 2014]
Five Thoughts from VADM Rogers Testimony [Published TaoSecurity - Mar 17 2014]
Information Overload Addressed by Next-Gen SOC [Published Security Bloggers Network - Mar 13 2014]
Information Overload Addressed by Next-Gen SOC [Published M-unition - Mar 13 2014]
Setting Traps and Going Hunting [Published Security Bloggers Network - Mar 11 2014]
Setting Traps and Going Hunting [Published M-unition - Mar 11 2014]
Bejtlich Teaching at Black Hat USA 2014 [Published TaoSecurity - Mar 08 2014]
RSA USA 2014: Continuous Monitoring, Protection... [Published FireEye Blog - Mar 06 2014]
Live from RSA USA 2014: Talking Threat Analytic... [Published Security Bloggers Network - Mar 05 2014]
Live from RSA USA 2014: Talking Threat Analytic... [Published FireEye Blog - Mar 05 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Does the Heartbleed Bug Mean You Should You Sta... [Published MoJo Articles | Mother Jones - Apr 09 2014]
On Tuesday, news broke that the safeguard many websites use to protect sensitive information on the internet has had a major security flaw for about two years. These sites use a security system called OpenSSL to encrypt data like content, passwords, ...
Cyber chat @Brookings: Listen to the podcast [Published Langner – The last line of cyber defense - Mar 26 2014]
Two weeks ago the Brookings Institution hosted a round table with Ralph, Peter Singer, Richard Bejtlich, and Ian Wallace. The discussion was recorded and is available as a podcast. Topics discussed range from the NIST Cyber Security Framework via the ...
Re: Late Friday thoughts on the Kevin Mandia RS... [Published Daily Dave - Mar 25 2014]
Posted by Val Smith on Mar 25 I tried to have this debate several years ago and here is how it ended(note, I never once had any idea, discussion or desire to do businesswith Mr. Bejtlich), draw your own conclusions:---From: Richard Bejtlich Subject: ...
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Latest From Brookings - Mar 25 2014]
What do the crisis in Ukraine, the resignation of Target’s chief information officer, and the effect of Edward Snowden on European legislators all have in common? According to Brookings cybersecurity experts, they are all going to be central to the ...
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Up Front - Mar 25 2014]
What does the crisis in Ukraine, the resignation of Target’s chief information officer, and the effect of Edward Snowden on European legislators all have in common? According to Brookings cybersecurity experts, they are all going to be central to the ...
1 2 3 4 5 6 7 8 9
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.