June 2017

June 2017

Jun 282017

Petya: Using Blast Radius to Deduce Attribution

As the global ransomware attack coined Petya continues to proliferate globally, identifying the culprits is an important piece of the puzzle. At this point, it’s prudent to attempt to rule out who it doesn’t appear to be through process of elimination. While there was clear forensic evidence connecting the code used by the WannaCry actors […]

Jun 272017

Vigilance Required: European Ransomware Petya Moves into Russia and U.S.

| Lead Ethical Hacker

Following in the footsteps of WannaCry, a new ransomware named Petya appears to be instigating similar global havoc with EternalBlue. Follow Armor for the latest intelligence on this emerging threat.

Chris Hinkley, OSCP, CISSP

Lead Ethical Hacker

As Lead Ethical Hacker at Armor, Chris Hinkley utilizes a decade of security expertise to design, test and deploy next generation security processes and techniques for the cloud. His work at Armor was instrumental in Armor being one of the first cloud companies globally to achieve PCI DSS compliance. Prior to Armor, Hinkley worked as a Web Developer for TargetScope, an interactive marketing and Web development company. In that role he created everything from website animations to complex and dynamic product configurations using the latest technology and development frameworks. With Armor, Hinkley has held a number of security and technology-related roles, including security engineer, lead engineer and support manager. In those roles he has serviced thousands of FireHost customer servers, including Windows and Linux, and overseen the security of all hosting environments to meet PCI, HIPAA and other compliance guidelines. Hinkley is a sought after speaker and author on cloud, security and open source topics, publishing regular columns in SecurityWeek and other industry magazines. Hinkley is a Certified Information Systems Security Professional (CISSP).

Jun 222017

Cloud Security 101: A Partner’s Perspective

When I went to work for IBM in the early 2000’s, one of the first things I learned was how to work with business partners to create hardware and software solutions in the SMB space. At that time, the business model for partners was far less ambiguous. Hardware in all of its forms, and the […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jun 152017

Narrowing the Attack Surface: A Strategic Approach to Security

With the sustained onslaught of ransomware and high-volume destructive attacks, it’s clear that operations are growing in complexity and threat actors’ skills are improving.  What’s worse, security teams are often asked to do more with less, and there is little tolerance from organizational decision makers for any shortfalls. Against this backdrop, is there any hope […]

Jun 142017

Defense in Depth: Vulnerabilities in your Legacy Systems

With the promise of future leaks by the Shadow Brokers, it’s only a matter of time until the “next shoe drops.” Keeping your software and servers up-to-date and patched is a security best practice. However, there are times when the resources to buy new software or perform patch integration testing may not be available. In these cases, the use of cyber defense in depth principles can at least decrease the likelihood that these insecure systems are affected.

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jun 102017

The True Cost of False Positive Security Events

For every security event, analysts are faced with a difficult choice: devote resources towards their pursuit or not? Although it may seem wise to be better safe than sorry, investigating false positives is expensive both financially and in terms of people hours spent assessing security events and fine-tuning detection tools (WAF, IDS, etc.).

Jun 62017

Part II: The Real Cost of Shadow IT

| Security Operations Center Director

It seems the verdict is still out when it comes to whether companies should embrace or brace for shadow IT. While some CIOs look at the additional software, systems, or services that run in conjunction with the established enterprise systems as a competitive advantage, products that share information with one another can often lead to […]

Holly Dale

Security Operations Center Director

Holly Dale’s two decades in cybersecurity has led her to become the SOC Director at Armor. Prior to Armor, Holly held positions contracted to Oncor Energy and National Nuclear Security Administration under the Department of Energy (NNSA/DOE), including Information System Security Officer (ISSO) cyber security Subject Matter Expert (SME), Senior Security Analyst, Sr. Forensic Investigator, and Sr. Incident Responder. Holly was a founding member of NNSA's Information Assurance Response Center (IARC), as well as a member of the Secret Services's Las Vegas Electronic Crimes Task Force (LV-ECTF) and the FBI-led Nevada Cyber Crimes Task Force (NCCTF), working with numerous city, county, state and federal agencies in each task force.

Jun 22017

10 Critical Questions to Answer when Hiring Security Analysts

| Head of the Threat Resistance Unit

Finding the best security analysts for your security organization is about finding candidates that do more than just “look good on paper.” They need to have the real-world experience to match their education and certification achievements. This article features 10 questions you can ask candidates to determine if they’re the right fit.

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Jun 12017

The Real Cost of Shadow IT

| Security Operations Center Director

There has been a great deal of debate about the impact of shadow IT on a company’s bottom line.  Briefly defined, shadow IT is when software, systems, or services that would normally be procured and managed through an IT department are developed, installed or used without regards to input from IT or security.  Although advocates […]

Holly Dale

Security Operations Center Director

Holly Dale’s two decades in cybersecurity has led her to become the SOC Director at Armor. Prior to Armor, Holly held positions contracted to Oncor Energy and National Nuclear Security Administration under the Department of Energy (NNSA/DOE), including Information System Security Officer (ISSO) cyber security Subject Matter Expert (SME), Senior Security Analyst, Sr. Forensic Investigator, and Sr. Incident Responder. Holly was a founding member of NNSA's Information Assurance Response Center (IARC), as well as a member of the Secret Services's Las Vegas Electronic Crimes Task Force (LV-ECTF) and the FBI-led Nevada Cyber Crimes Task Force (NCCTF), working with numerous city, county, state and federal agencies in each task force.