Have You Heard about the Shadow Brokers Tools Dump?

Have you ever heard of the “Shadow Brokers”? Up until this weekend I had not really ever heard of the term “Shadow Brokers” but it appears the Shadow Brokers are a group of “hackers” that have really put a new spin on the term lost in translation. On Good Friday and ahead of the Easter holiday, the Shadow Brokers have dumped a new collection of files, which they have called “Lost in Translation”, containing what appears to be exploits and hacking tools targeting Microsoft’s Windows OS as well as Linux and firewall as well as other and at the same time they have presented evidence that the Equation Group had gained access to servers and targeted the SWIFT banking system of several banks across the world.

Anti-Privacy Legislation Impacts

The latest Virtualization and Cloud Security Podcast featured a conversation about the recent Congressional repeal of FCC regulations governing privacy. Internet Service Providers (ISPs) could collect, mine, and sell your search and browser history without your knowledge. This bill has not been signed into law yet. Some would see it as opening the doors on competitiveness with …

Ransomware Makes for a Bad Night

I was reading a Reddit request for help regarding ransomware. The title was “Got hit BAD tonight.” That title describes the catastrophe simply and to the point. The ransomware in question attacked the hypervisor. Then, it  proceeded to encrypt all backups and other systems connected to the hypervisor. This is the exact issue that virtualization …

Finding your Sensitive Data to Protect

A bane of having data is the need to know: the need to know where all your sensitive data resides, what that data is, who has accessed it, and how it was accessed. Managing the who, what, where, why, and how of data is a struggle that’s as old as time. Scale changes this struggle. …

Scale and Engineering

When we scale things up to handle ever-larger quantities of data, we also scale up the number of issues related to the increasing pace. We’re dealing with this with fewer tools and, quite frankly, less knowledge We’ve seen changes in security (visit our latest podcasts on security and scale). We have seen changes in operations. We have …

Security Operations Center: Not Just Visibility

On the March 9, 2016, Virtualization and Cloud Security Podcast, we spoke with Sridhar Karnam, director of product marketing for Arctic Wolf, a Security Operations Center (SOC) as a Service provider. In our ongoing series on scale within IT security, a SOC is the next logical stop. The scale of data in today’s environments far …