• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Cyberattacks: The Need for Mandatory Cybersecurity

Leave a Comment

Defense Advanced Research Projects Agency (DARPA) chief Arati Prabhakar foresees a day when automated systems will “reason” about IT vulnerabilities subject to cyberattacks, then create patches and deploy them in real time. That future can’t arrive soon enough for large enterprises, which are both victim and cause of the current cyberattack wildfire. Why hold the enterprise … [Read more...]

TaiG iOS 8 Jailbreaks, Pwn2Own 2015 & Next Conquest for VUPEN

The “ides of March” promise exciting news: the latest iOS 8 jailbreak from China’s TaiG, the annual Pwn2Own contest at CanSecWest, and the possibility that VUPEN will show to claim the crown in zero days once again. Whether TaiG, VUPEN or another will emerge as Brutus to Apple’s Julius Caesar remains to be seen. One point worth remembering: Forget Shakespeare’s … [Read more...]

ClearTrail: Well-Positioned in Lawful Intercept and Spyware

Western surveillance leaders that follow the call of “Go East, Young Man” to India and South Asia have likely encountered a surprise welcoming committee: Indore-based competitor ClearTrail, well entrenched on the subcontinent and expanding outward in all directions. ClearTrail, in business for over a decade, is among the foremost participants in India’s growing surveillance … [Read more...]

Can Narus Boost Symantec Commercial Sales?

When Symantec purchased Narus licenses and brought over key personnel from Boeing on January 12, 2015, the goal was to kick start enterprise sales. What better timing than in the wake of the SONY hack, right? But if Narus’ track record is any indication, it’s fair to ask if Symantec picked the right horse. The core expertise of Narus is and always has been deep packet … [Read more...]

Enterprise Differentiation: How’s That Working for SS8?

Ask any industry observer to name the top global players in lawful intercept (LI) and they’ll list the usual market giants: Verint, SS8, BAE Systems, Cellebrite, Septier and Utimaco. But ask what advantage one firm offers over another and you're apt to draw a blank stare. Market befuddlement on this point underscores an ongoing challenge to LI vendors: the need to … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login