Agile Computing Authors: John Mertic, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

Related Topics: Agile Computing

Agile Computing: Blog Post

Getting Back to the Basics of Actionable Threat Intelligence

Shoot, move and communicate more effectively

I remember it like it was yesterday, the first few hours of basic training. I stood there cooking in the South Carolina humidity with a very loud and short man, named Drill Sergeant Doll screaming a few inches from my ear, "You need to shoot, move and communicate!" At the time, I had absolutely no clue what he was talking about. However, over the course of a few weeks I would start to understand that these would be the basic skills I needed to successfully complete my training.

Later, I would learn that these three skills needed to be honed together and each soldier would eventually take what they learned and apply it under the pressure of a live fire exercise. This would test our ability to work as a team, each soldier required to direct precise suppressing fire, moving swiftly in alternating bounding movements towards an objective all while communicating with one another, taking care not to shoot a fellow team member. "Shoot, Move, and Communicate" became the cornerstone of our military training.

We see communication as a vital attribute underpinning much of what we do as a community on a daily basis. We communicate within our circle of influence, within and across our organizations, as well as with external parties or even autonomous machines. Communication is what builds interpersonal relationships and is what allows us to draw upon a larger community that then becomes a countermeasure, which can be organized and wielded against modern threats.

Teamwork Makes the Dream Work
Not unlike training for and conducting conventional combat, neutralizing asymmetric cyber threats requires some of the same basic teamwork skills. The njRAT infrastructure takedown operation conducted by Microsoft this week has been nothing short of controversial. If you shoot and move but fail to communicate, the result often means someone is going to get hurt. The unilateral takedown has served its purpose of impacting the attackers, but has also negatively effected all the stakeholders, such as Microsoft,  Vitalwerks (NO-IP), and its users alike.

While this is a highly complex example, the anatomy of the problem is disguised behind a two-front war, and as we look closer, the Microsoft takedown illuminates some of the problems we face today. Certainly there are the obvious technical challenges that the threats pose, but those are largely dwarfed in comparison to the interpersonal, social and cultural issues we have with one another, our individual motivations, as well as how and why we choose to communicate. The fallout between Microsoft and Vitalwerks (NO-IP) is a strategic inflection point within a decade old industry that seemingly fumbles every time one of us gets the ball.

There are many viewpoints, both for and against the actions Microsoft took, that have been posted on blogs, discussed on mailing lists and questioned in the news. Like trying to solve any challenge faced on a global scale, pulling one lever will undoubtedly move three or four somewhere else, triggering unforeseen consequences, in many cases becoming the new focal point and problem. As an industry, we need to become more situationally aware and selfless. We cannot continue to go at it alone, nor should we try. Unity is our strength. The sooner we all recognize this, the more effective we will be in dealing with common adversaries.

Solution Focused vs. Problem Focused
We specifically engineered ThreatConnect to be the enterprise solution that allows the security community to cross the chasm that exists between the technical and non-technical security challenges we face today. ThreatConnect was created with the intention of giving anyone the ability to easily develop and control their own threat intelligence by aggregating data from any source they deemed of value, allowing them to analyze and dynamically enrich contextualized indicators over time with the ability to communicate their findings in a controlled and trusted manner.

This flexibility gives analysts and network defense personnel the precision that is needed to accurately focus in on specific indicator types of interest and effectively manage their knowledge and pool resources. When it comes time to operationalize the information and coordinate their neutralization, there are capabilities to communicate around the data, intent to convey and actions to coordinate in order to minimize the risk of uninformed stakeholders and unintended consequences.

No Excuses
In today's highly connected world, there should be no excuse for breakdowns in communication when conducting such important and delicate operations as infrastructure takedowns. As of late April 2014, ThreatConnect has been sponsoring a free private ThreatConnect Community, proactively reaching out to service providers who are victims of abuse and wish to actively contribute resources to support coordinated takedown operations.

This emerging community is populated with vetted individuals and organizations within enterprise security teams, dynamic DNS providers and domain registrars. The goal is to deliver a platform and environment in which all stakeholders can easily come together and adopt a selfless attitude, and then deliver results for the common interest of our users and customers.

On a daily basis, the ThreatConnect Intelligence Research Team (TCIRT) leverages ThreatConnect to effectively share information and collaborate with large organizations, such as Microsoft and small to medium sized organizations, like Vitalwerks (NO-IP), so they are able to act on information in a coordinated manner. We do this because it is the right thing to do and the best way to do it.

If you or your organization is interested in participating in this community or others in ThreatConnect, register for a free basic account and get started, so you can do your part and enter into a community which will allow you to shoot, move, and communicate more effectively.

More Stories By Rich Barger

Rich is the Chief Intelligence Officer for Cyber Squared and the ThreatConnect Intelligence Research Team (TCIRT) Director.

@ThingsExpo Stories
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
In the next forty months – just over three years – businesses will undergo extraordinary changes. The exponential growth of digitization and machine learning will see a step function change in how businesses create value, satisfy customers, and outperform their competition. In the next forty months companies will take the actions that will see them get to the next level of the game called Capitalism. Or they won’t – game over. The winners of today and tomorrow think differently, follow different...
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and ...
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Donna Yasay, President of HomeGrid Forum, today discussed with a panel of technology peers how certification programs are at the forefront of interoperability, and the answer for vendors looking to keep up with today's growing industry for smart home innovation. "To ensure multi-vendor interoperability, accredited industry certification programs should be used for every product to provide credibility and quality assurance for retail and carrier based customers looking to add ever increasing num...
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will advance interoperability between connected devices from both groups, enabling the full operating potential of IoT and representing a significant step towards a connected ecosystem.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...