About Richard Stiennon

Richard Stiennon, is a security industry analyst, speaker and author of Surviving Cyberwar.

Follow Richard on Twitter @stiennon

 

By: - IT Security Expert, Author

@stiennon

We Thought We Understood How to Defend Against Targeted Attacks

March 12th, 2014

The lesson to be learned from the content of Snowden’s documents released to date is that the NSA has built a global capability to execute on a plan of information dominance for intelligence gathering. Ostensibly to collect enough communications meta data and content to deter, disrupt, and destroy terrorists and their plans, the NSA’s capabilities [...]



By: - IT Security Expert, Author

@stiennon

Three Lessons Learned From the NSA’s Use of Big Data and Security Analytics

August 14th, 2013

Security analytics is the term being applied to the new methods being developed to counter sophisticated targeted attacks. The idea is simple but implementation requires skill sets that have yet to be acquired by most organizations. Gather as much data as possible, apply filters derived from security intelligence, and identify attacks in progress or already [...]



By: - IT Security Expert, Author

@stiennon

Procedures and Policies Without Controls Are Meaningless: Lessons for the NSA

June 25th, 2013

Note to security clearance holders: The following post contains no links to secret documents. As the carefully orchestrated stream of leaks from Edward Snowden are published in The Guardian, we have learned first of the massive scale of US (and now UK) data and communication surveillance. Top Secret/NoForn documents were also published that spelled out [...]



By: - IT Security Expert, Author

@stiennon

Weaponized Malware’s Impact on the Enterprise

August 29th, 2012

Everything changed June 1, 2012. That’s when we entered the age of weaponized malware. On that day David Sanger’s article in the New York Times alerted the world to the fact that the United States and Israel were responsible for a long term, concerted campaign against the uranium refining capability of the Iranian regime. While [...]



By: - IT Security Expert, Author

@stiennon

Welcome to the Age of Weaponized Malware

June 27th, 2012

video

Thanks to my colleagues, Paul Henry and Paul Zimski for a great discussion on weaponized malware yesterday. While the threats that dominate our headlines … Stuxnet (2009), DuQu (2010) and Flame (2011) seem like story lines that spy movies are made of, they are in fact something enterprise should be concerned about. The weaponization of [...]



By: - IT Security Expert, Author

@stiennon

3 Reasons Flame is a Game Changer

June 21st, 2012

Back in the late ’90s, the president of a prominent U.S. anti-virus company was approached by a delegation from India. Their request? Weapons-grade malware. In the same month, he was also approached by representatives from Pakistan with the same request. As he explains it: “Two nuclear armed nations with a common border and a history [...]



By: - IT Security Expert, Author

@stiennon

Best Practice Mobile Security Implementation

February 27th, 2012

Mobile device management is a workplace reality that IT is scrambling to get their arms around. And justifiably so…according to the new report by Symantec, the 2012 State of Mobility Survey, organizations of all sizes are seeing numerous damages due to mobile devices in the workplace, including data loss, damage to the brand and loss [...]



By: - IT Security Expert, Author

@stiennon

Two Approaches to Managing Mobile Devices

February 6th, 2012

There is no question we have entered the era of always connected mobile devices. Smart phones, iPads, and Android devices have changed the way people access information.  Last month, I discussed why denying the use of personal mobile devices isn’t a realistic view. Looking to the future, here are some considerations on how to incorporate [...]



By: - IT Security Expert, Author

@stiennon

Resist Enterprise Mobility? Another Knee Jerk Reaction

December 20th, 2011

I have logged more travel miles than I care to admit in 2011. Throughout it all, I heard significant trepidation from IT security directors and CISO’s over the invasion of their offices with those nasty, uncontrollable personal digital devices that everyone is now armed with: iPhones, Android devices, and iPads.  Especially iPads.  And invariably the [...]




IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com