Calling all voice biometrics providers. Emergency in progress at the nation's capital. Following the massive cyberattack on the U.S. government's Office of Personnel Management (OPM) data, the White House directed federal agencies to ratchet up security of computer systems. Among the emergency measures called for: priority threat detection systems and patching blatant … [Read more...]
S2T: How to Find ISIS on the Dark Web
C5IS reviews Singapore’s S2T, a specialist in Dark Web data and identity extraction. Sometimes military analysts tracking targets on social media get lucky. Tucked among the usual recruitment videos and propaganda, a member of ISIS tweets about his “command and control” capabilities and adds a photo. Analysts tag that quickly and within hours, as happened earlier this month, … [Read more...]
Cyberattacks: The Need for Mandatory Cybersecurity
Defense Advanced Research Projects Agency (DARPA) chief Arati Prabhakar foresees a day when automated systems will “reason” about IT vulnerabilities subject to cyberattacks, then create patches and deploy them in real time. That future can’t arrive soon enough for large enterprises, which are both victim and cause of the current cyberattack wildfire. Why hold the enterprise … [Read more...]
Can Narus Boost Symantec Commercial Sales?
When Symantec purchased Narus licenses and brought over key personnel from Boeing on January 12, 2015, the goal was to kick start enterprise sales. What better timing than in the wake of the SONY hack, right? But if Narus’ track record is any indication, it’s fair to ask if Symantec picked the right horse. The core expertise of Narus is and always has been deep packet … [Read more...]
Enterprise Differentiation: How’s That Working for SS8?
Ask any industry observer to name the top global players in lawful intercept (LI) and they’ll list the usual market giants: Verint, SS8, BAE Systems, Cellebrite, Septier and Utimaco. But ask what advantage one firm offers over another and you're apt to draw a blank stare. Market befuddlement on this point underscores an ongoing challenge to LI vendors: the need to … [Read more...]