Cybersecurity Blog: The Cyber Scene is evolving, are you?

Breaches disclosed in the media foster conversations within organizations on how to protect critical assets and enterprise infrastructure. Loss of intellectual property, financial data and customer confidence have produced tangible evidence of an evolving threat landscape that, in turn, has elevated the conversation to the board room.  

This cyber awakening has many organizations evaluating current security measures including tools and technology – and the options available in the market are endless!    

On May 11, 2016, I joined Greg Masters of SC Magazine for an evaluation of new cyber technologies in the marketplace. In my role as Chief Technologist for Lockheed Martin’s commercial cyber business, I’m focused on evaluating the latest trends in the market in order to advance our own defense strategies. 

In the following on-demand webcast, I analyze a variety of cyber technologies that can enhance your defenses including: Threat Intelligence Platforms, Security Operations (SecOps) Tools, Endpoint Detection and Response as well as User Behavior Analytics. 

Read more

External threats garner most of our attention and, consequently, the majority of our security resources but industry analysis demonstrates that cyber-crime incidents perpetrated by insider threat actors are trending up and to the right.

On May 4, 2016 my colleague, Kevin Shewbridge, and I were joined by Forrester Research Senior Analyst and guest speaker Joseph Blankenship for a discussion about the very real threat that malicious insiders pose to organizations around the globe.

Read more

Most security vendors these days, including Lockheed Martin, are touting new capabilities for automatically detecting advanced threats through the use of data analytics and automation. In business, “automation” is often synonymous with downsizing. In this case, however, we would argue the implementation of automation tools is not about downsizing staff but rather empowering cyber analysts to do more, good work. However, while automating some of the more mundane and menial tasks of an analyst may free up cycles, it is not a cure-all solution that eliminates the need for human intelligence.

Read more

How to assemble a team with the skills and qualities needed to outpace today’s evolving threat landscape

We are defenders. It’s in our DNA. While defending cyber interests globally we’ve developed a skilled team, advanced capabilities and a proven framework to proactively protect what matters most. Our solutions promote a mature cybersecurity posture.

Read more

Lockheed Martin Cyber Kill Chain® Prominent Component of NTT Group’s 2016 Global Threat Intelligence Report

This year’s Global Threat Intelligence Report (GTIR) provides organizations the data needed to disrupt attacks. Solutionary, an NTT Group company, partnered with Lockheed Martin on their 5th annual GTIR. 2016 is the first year the report included partners with the goal of an expanded view of the threat landscape, and more analysis of attacks, threats and trends from last year. The 2016 GTIR includes information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion attacks, and 8,000 security clients across 6 continents.

The report uses last year’s attack information and the Lockheed Martin Cyber Kill Chain to highlight practical application of the Cyber Kill Chain and explain a comprehensive strategy to enable effective security across the entire organization.

Read more

Misspelled word thwarts cyber-heist but not before $81 million is syphoned from Bangladesh Central Bank

This past February, hackers were able to steal $81 million from the systems of the Bangladesh Central Bank. Funds were moved from its account at the Federal Reserve Bank of New York to private accounts in the Philippines via wire transfers using the SWIFT payment network. Although this registered as one of the largest cyber heists in history, the damage could have been upwards of $1 billion if not for the attacker’s misspelled word in one of the fraudulent requests. The mistake tipped off an employee at Deutsche Bank and ultimately saved millions of dollars.

Read more

2016 is well under way and this time of year it can be tough to justify training budgets. As an instructor for our Experiential Cyber Immersion Training and Exercises® (EXCITE®) course here at Lockheed Martin, I interface with a lot of computer network defense teams. Over the years I've noticed organizations fall into the trend of allowing the newest tools to drive their analyst training program. Others let their employees self-select training they feel would be the best fit for their role. But these routes can lead to over-reliance on technology, skill set gaps, and disjointed teams. I'd like to take a slightly different approach and suggest three things to add to your in-house training program that you won’t find in traditional classroom curriculums.

Read more

Cyber-attacks are becoming increasingly more sophisticated, more frequent and more severe. Is your security operations center equipped to proactively respond to the evolving threats?

At the RSA Conference in March in San Francisco, Dark Reading’s VP of Event Strategy and Content, Brian Gillooly, had a chance to sit down with Greg Boison, the Director of Homeland and Cybersecurity for Lockheed Martin. The engaging interview covered such important topics as the need for customers to migrate from a security operations center (SOC) to a security intelligence center (SIC), the tools and skills needed to succeed in an intelligence-based security environment, and best practices for understanding threats and threat actors.

Read more

Lockheed Martin contributes to Industry Collaboration at BAI Payments Connect in San Diego

In a recent article, The Guardian reported that Bangladesh’s central bank governor, Atiur Rahman, resigned after $81m (£75m) was stolen from the bank’s account at the Federal Reserve Bank of New York in one of the largest cyber-heists in history.

Read more

As one of the most attacked organizations in the world, Lockheed Martin has a front row seat in the fight against advanced persistent threats (APTs). Last month we hosted a webcast with our partners at Cybereason. Justin Lachesky, Cyber Intelligence Analyst at Lockheed Martin and Cybereason CTO, Yonatan Striem-Amit teamed up to discuss:

Read more