
  
{"title": "VES Development Feed", "modified": "2016-03-01T12:00:00Z", "generated": "2016-03-01T12:00:00Z","articles": [{"id": "1a7389667e1f5f6ef9b777dcbd0f766c","url": "2017-data-breach-digest-half-year-anniversary","title": "2017 Data Breach Digest: Half Year Anniversary","published": "2017-08-23T20:59:24Z","source": "Verizon Enterprise Solutions","pop": 85,"age": 7,"rank": 2, "topics": ["Computer Hardware", "Software", "Cyber Security", "Cybercrime", "Data Breach", "Data Centers", "Security", "Computer Software"],"authors": ["John Grim"],"images": ["https://images1.newscred.com/Zz1jZGFlNTRlMzc1OTIyZjIyZWNjNDhjMzUzN2YwMjMzOA=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "It’s the sixth month anniversary of the 2017 Data Breach Digest. John Grim revisits the report, and explains how you can leverage these data breach scenarios to enhance your cybersecurity and incident response plans. ","h1": "2017 Data Breach Digest: Half Year Anniversary","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9712855caa036b2257d337d16f161a0d","url": "what-is-the-opportunity-for-advertisers-as-search-moves-towards-voice-based-interaction","title": "What is the opportunity for advertisers as search moves towards voice-based interaction?","published": "2017-08-23T16:00:00Z","source": "The Drum","pop": 28,"age": 7,"rank": 10, "topics": ["Google Inc.", "Search Engines", "Google Plus", "SIRI", "Personal Computer"],"authors": ["Sean Larkin"],"images": ["https://images2.newscred.com/Zz1jZDJkY2IwZTkwMzIxZWVmMmJhYjJhODI0Y2NjZjIyNQ=="],"category": ["report_category:business_performance"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"firstpart\" > The above is one that has been one of the key questions bubbling under the surface of the digital industry since the introduction of interfaces such as Apple&#8217;s Siri, etc, came on to the market.</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "312e0412812b1dc19ec32dabb2bd011e","url": "scientists-“hack”-a-computer-using-dna-malware-was-encoded-in-strands-of-genetic-code","title": "Scientists “hack” a computer using DNA: Malware was encoded in strands of genetic code","published": "2017-08-22T16:31:11Z","source": "Alphr Mag","pop": 57,"age": 7,"rank": 3, "topics": ["Software", "Malware", "University of Washington", "Science & Research", "InSecurity", "Security", "DNA", "Computer & Network Security", "Computer Software", "Education"],"authors": ["Victoria Woollaston"],"images": ["https://images4.newscred.com/Zz1iMjBmOGQ2ZTA1OTA4Yzg4YTMwZDhhNTc3ZWMyNTUwYg=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In what sounds like a script from a dystopian sci-fi thriller, scientists have &ldquo;hacked&rdquo; a computer using DNA.\r\nBy encoding malware into strands of the human DNA, the researchers were able to infect a gene-sequencing machine by corrupting the software it runs on.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "87af89c1249994533a777db253f1173f","url": "ubs-coo-axel-lehmann-on-fintech-banking-jobs-will-completely-change","title": "UBS COO Axel Lehmann on fintech: Banking jobs 'will completely change'","published": "2017-08-22T14:30:00Z","source": "Business Insider","pop": 37,"age": 8,"rank": 8, "topics": ["Eastman Kodak Company", "Financial Crisis", "Productivity", "Entrepreneurship", "Nokia", "UBS AG", "Jobs (profession)", "Banking", "Mortgage Rates", "Startups", "Innovation"],"authors": ["Ben Moshinsky"],"images": ["https://images2.newscred.com/Zz00MzlhZjE2YWI3ZTg1Y2UzMTVlYWE1NTQwMTg4NzlkNQ=="],"category": ["report_category:business_performance"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"firstpart\" > Since the 2008 financial crisis, fintech startups have boomed, making quick ground on a banking industry struggling to cope with new financial rules and legacy tech systems.</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "432e32635e22f5b02d2c423a7e655888","url": "are-we-brave-enough-to-entrust-how-we-live-to-algorithms","title": "Are we brave enough to entrust how we live to algorithms?","published": "2017-08-21T14:30:00Z","source": "Alphr Mag","pop": 28,"age": 7,"rank": 10, "topics": ["Machine Learning", "Autodesk", "Computing", "Education", "London"],"authors": ["Ian Betteridge"],"images": ["https://images2.newscred.com/Zz1jYjAzZmNlZGRhZGVhZGE5OTQ1MjZiMzU5YTEwMGUyOQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Almost everything we see around is us made by us. From mega-structures to remote controls, even much of the landscape is made or shaped by us. </p> ","h1": "","type": "","outcome": [""]},{"id": "7c246237aaefa878b5be9f47081279e6","url": "cyber-security-fears-raised-over-lackadaisical-marketing-and-it-industry","title": "Cyber security fears raised over lackadaisical marketing and IT industry","published": "2017-08-21T14:18:18Z","source": "The Drum","pop": 50,"age": 8,"rank": 4, "topics": ["Regulation", "Marketing", "European Union", "Cyber Security", "InSecurity", "Security", "Security and Investigations", "Data Protection"],"authors": ["John Glenday"],"images": ["https://images2.newscred.com/Zz05NmZiMjk3MDllM2RhMjdkODIxNDE0OWExYzUzZWUxNQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > A survey of marketing firms has raised concerns that many are ill-prepared to counter the threat posed by hackers, with just 10% of marketing professionals polled saying that they were concerned about cyber security.</p> ","h1": "","type": "type:analyst:articles","outcome": [""]},{"id": "845139efe504609592a1b849f0cabed3","url": "how-artificial-intelligence-is-defining-the-future-of-brick-and-mortar-shopping","title": "How artificial intelligence is defining the future of brick-and-mortar shopping","published": "2017-08-21T14:17:47Z","source": "The Next Web","pop": 999997,"age": 0,"rank": 888887, "topics": ["Thought & Cognition", "Shopping", "Robotics & Artificial Intelligence", "Online Shopping"],"authors": ["Ben Dickson"],"images": ["https://images4.newscred.com/Zz1lMDZkOTdkMGE2MjA1ODAzZDQxNGE1ZmZmNTI5YWJlZg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">While online shopping has taken great strides in recent years, the brick-and-mortar retail hasn&rsquo;t managed to keep pace.\r\nArtificial intelligence now permeates every aspect of ecommerce platforms, especially where customer interactions are involved. </p> ","h1": "","type": "","outcome": [""]},{"id": "bdf9ecfd0125c1ad192afff30c8f17ac","url": "here-s-our-sneak-peak-of-the-definitive-iot-landscape","title": "Here’s our sneak peak of the definitive IoT landscape","published": "2017-08-21T14:14:54Z","source": "ReadWrite","pop": 57,"age": 7,"rank": 3, "topics": ["San Francisco"],"authors": ["Philippe Cases"],"images": ["https://images1.newscred.com/Zz0zOGM3MGRlNDMxOTlhMjFjNWRiYmE4OGRiOTNjNzQyYw=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">After four years of investing, incubating, discovering, gathering and researching the field, we believe that the Internet Of Things, commonly referred to as IoT or the industrial Internet, will represent the most powerful force for business transformation since the birth of the Internet itself.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "a4017cab942f96e6b2329acd643f7caf","url": "malware-spotlight-the-ransomware-evolution","title": "Malware spotlight: The ransomware evolution","published": "","source": "Verizon Enterprise Solutions","pop": 42,"age": 7,"rank": 6, "topics": ["Verizon Communications Inc.", "Malware", "Education"],"authors": ["Darren Windham"],"images": [],"category": [],"industry": [],"summary": "<p thirtyword=\"secondpart\">The weekend of May 13th the ransomware front roared loud with the 'WannaCry' ransomware outbreak. </p> ","h1": "","type": "","outcome": []},{"id": "66b01f8823a813e28b74f7ecc6f0d763","url": "bryan-sartin-on-the-data-breach-investigations-report","title": "Bryan Sartin on the Data Breach Investigations Report","published": "2008-06-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Podcast", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Bryan Sartin, Director of Investigative Response for Verizon Business Security Solutions, was recently interviewed by Michael Johnson at PodTech. Visit the links below to listen.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c057d39aa1e7c2b63d1740d50a9e8567","url": "dns-facts-and-scenarios","title": "DNS facts and scenarios","published": "2008-07-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Peter Tippett and Russ Cooper There is a huge amount of angst, discussion, testing and endless worry about the “new DNS vulnerability” whose existence was published a few weeks ago concurrent with a coordinated patch release. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "aa862229e25a2a81782c54c5c3c199af","url": "do-the-findings-of-the-2008-data-breach-investigations-report-differ-among-industries","title": "Do the findings of the 2008 Data Breach Investigations Report differ among industries?","published": "2008-08-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Financial Services"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> By Wade Baker   Since releasing the 2008 Data Breach Investigations Report (DBIR) in June, we’ve frequently been asked some form of the following question: “Do the findings presented in the report differ among industries?” It’s a good question, and one we’re working on answering at length in a supplemental report contrasting the four most frequently breached industries (Financial Services, Tech Services, Retail, and Food &amp; Beverage) using the original dataset. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "70f0bce7d344244a1ac203d1acabba97","url": "2008-data-breach-investigations-supplemental-report","title": "2008 Data Breach Investigations Supplemental Report","published": "2008-10-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["State of the Union", "Data Breach", "Financial Services", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Wade Baker Today, we released a supplement to our 2008 Data Breach Investigations Report (DBIR) that focuses on four major industry groups. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f31c0af8a6abfaa1e85fd97711a6f710","url": "peter-tippett-on-the-data-breach-investigations-supplemental-report","title": "Peter Tippett on the Data Breach Investigations Supplemental Report","published": "2008-10-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Dr. Peter Tippett, VP of Research and Risk Intelligence for Verizon Business Security Solutions, was recently interviewed by Robert Richardson at Information Week about the Data Breach Supplemental Report. Visit the links below to listen.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a386300fb2ccf3da5274af8167d0ef8c","url": "a-non-sequitur-that-should-not-endure","title": "A non sequitur that should not endure","published": "2008-10-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Risk Management"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Wade Baker “Attacks vary, therefore risk management doesn’t work.” To be fair, that’s not a direct quote from a recent Dark Reading article entitled “Why Risk Management Doesn't Work”, but it is an accurate expression of its message. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "bb4b8fdcc080ad5091706da3f52518fb","url": "economic-crisis-could-dramatically-improve-security-in-2009","title": "Economic crisis could dramatically improve security in 2009","published": "2008-12-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Defense Industry", "Financial Crisis", "InSecurity", "Information Security", "Security", "Security and Investigations", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > No – it’s not a typo, and, as far as I know, I haven’t lost my marbles (yet) either. The title is intended to read exactly as it appears. I suppose some explanation is in order…</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3d40c9b8d296640cd99bf777b73c7a93","url": "antivirus-on-os-x-is-it-time","title": "Antivirus on OS X: Is it time?","published": "2008-12-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Mountain Lion OS", "Apple", "Antivirus", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Peter Tippett and Kevin Long What's a Mac user to do? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5941c0fd9842cf7ecd4075ba6ad73ff3","url": "antivirus-on-os-x-the-risk-equation","title": "Antivirus on OS X: The risk equation","published": "2008-12-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Equation", "Verizon Communications Inc.", "Business Interruption", "Political Risk", "Frequency"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Peter Tippett and Kevin Long This is Part II of a three-part series on OS X security. Please read Part I if you haven't already. Before we go further, a review of the Verizon Business RISK Team’s risk equation is in order. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7793d41523f59aff460f3f7837272fca","url": "antivirus-on-os-x-total-cost-of-ownership","title": "Antivirus on OS X: Total cost of ownership","published": "2008-12-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Amtrak", "International Security", "Antivirus", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Peter Tippett and Kevin Long This is Part III of a three-part series on OS X security. Please read Part I and Part II if you haven't already. If you ran Amtrak, would you install a missile defense system on your trains? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9da6c2929f4214b31e0c72706136a4e6","url": "what-are-we-on-the-lookout-for","title": "What are we on the lookout for?","published": "2009-01-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A number of organizations take the end of the year as an opportunity to publish predictions about what will happen in the security space during the subsequent year. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "22f498b3ab0a67647f899b68ff5559f0","url": "initial-assessment-of-rogue-certificate-authority-risk","title": "Initial assessment of rogue certificate authority risk","published": "2008-12-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Communications", "Berlin", "Lafayette IN", "Princeton University", "Cryptography", "Adventurer", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Bottom line up front: Risk has not changed significantly as a result of research into rogue Certificate Authority attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "27753e8b71668c243550eb5fa94ef522","url": "what-is-an-effective-control","title": "What is an \"effective\" control?","published": "2009-01-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">An interesting question went out to one of my favorite mailings lists a few days ago (SecurityMetrics.org) regarding a definition for “effectiveness”. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1888a969ad26eba628f8ce8e12e6488f","url": "antivirus-vs-egress-firewall","title": "Antivirus vs. egress firewall","published": "2009-02-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Firewall (computing)", "Antivirus", "Computer Software"],"authors": ["KLong"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In a recent blog post at ZDNet, Jason O'Grady mentioned the benefits of running an application that monitors outgoing (egress) traffic on your Mac. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ff2b6d5f61618dabc00a807e59144898","url": "285-million","title": "285 million","published": "2009-02-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Adventurer", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">  Normal 0   false false false        MicrosoftInternetExplorer4       st1:*{behavior:url(#ieooui) }  If you’re thinking “What is the population of the United States near the turn of the millennium?” your collection of trivial knowledge is truly impressive and I wouldn’t want to oppose you in Final Jeopardy. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c7339d1dc4aaea72621505963ab584c4","url": "what-s-with-all-the-glowing-apples","title": "What's with all the glowing Apples?","published": "2009-03-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["MacBook", "Mountain Lion OS", "Apple", "Weird", "Personal Computer"],"authors": ["KLong"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > When I began attending security conferences several years ago, PowerBooks were a rare sight. In the years since the release of OS X, however, it's not unusual to find more MacBooks than Windows systems in rooms populated by security professionals.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "de6ace73036b7f1b1b76761e3cea44a5","url": "tiny-media","title": "Tiny media","published": "2009-03-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "IBM", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">  Normal 0   false false false        MicrosoftInternetExplorer4        /* Style Definitions */ table.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9850620687465d44b4f1873dc2d60e63","url": "pdf-security-through-minority","title": "PDF security through minority","published": "2009-03-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["JavaScript", "Sleep"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">PDF Security through Minority by Dave Kennedy &amp; Kevin Long With so many defensive mitigations available, losing sleep over the latest Adobe Acrobat and Reader vulnerability just doesn't add up. Threat:  Indeed there are malicious PDFs in the wild. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "421e1d0ecf15e6bdcff69a6043ef3f31","url": "this-blog-post-was-written-in-seconds*","title": "This blog post was written in seconds*","published": "2009-03-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Hacker", "Personal Computer"],"authors": ["KLong"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > It was easy to find fault with the coverage and hacker worship that accompanied a recent exploit-writing contest held at a security conference, but it was tough to decide on a title for this post. A few came to mind, such as the following:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "02b40fbb6cc64131d0d94177f87a2c08","url": "risk-group-think-and-the-conficker-worm","title": "Risk, group think and the Conficker worm","published": "2009-03-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Verizon Business customers, and security professionals generally, should resist succumbing to a herd mentality and fear of the unknown surrounding the Conficker worm. In most respects, Conficker (a.k.a. Downadup or Kido) is just another piece of crimeware threatening Windows computers. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4af511db36460ddf6b606e2caa2a06bc","url": "there-s-nothing-wrong-with-the-pci-dss","title": "There's nothing wrong with the PCI DSS","published": "2009-04-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Defense Industry", "UN Security Council", "PCI Compliance", "Cyber Security", "Cybercrime", "Security", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I've been reading, with no small amount of interest, about the congressional hearings surrounding the Payment Card Industry Data Standards (PCI DSS) that took place on March 30th. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "36f26449b5db94c592f52a5edaac7a65","url": "the-grid-is-vulnerable-get-over-it","title": "The grid is vulnerable - get over it","published": "2009-04-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Aqueduct", "Power Grid"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By William H. Murray This week sparked the latest round of buzz around the security of the power grid. We've been here before and we will be again. Civilization began with the well and the aqueduct, i.e., infrastructure. That is why we call it civilization. Get over it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2b52c6e8fc9e3fa8926afe4d3e1b9c07","url": "the-2009-data-breach-investigations-report","title": "The 2009 Data Breach Investigations Report","published": "2009-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Get it free of charge with no sign-up requirements here. Creating the single-year sequel to a four-year report on over 500 breach investigations is a daunting prospect. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cd76c6abca65f1c9241ab16ccf937f76","url": "2009-dbir-unknown-unknowns","title": "2009 DBIR: Unknown unknowns","published": "2009-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I am totally fascinated that, as sophisticated as our enterprises are, computer crime follows the same basics as water (seeks the lowest point, leaks from the softest spot) and chains (that break at their weakest link). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "587bea6fbc9664f33c019205fbacb806","url": "2009-dbir-pci-dss","title": "2009 DBIR: PCI DSS","published": "2009-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["PCI Compliance", "Podcast", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Start or join a conversation about the PCI DSS and you're going to get a broad range of opinions on the subject. It can be a sensitive topic that people tend to get very passionate about.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1d3fb63e2f6d9c1e08fb5ecfe295564e","url": "2009-dbir-attack-difficulty","title": "2009 DBIR: Attack difficulty","published": "2009-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Chris Porter The relative difficulty of attacks leading to data compromise is an excellent indicator of both the current threat environment and the state of modern security programs. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "00a5019eb6b05ac31d70628c35c5043e","url": "2009-dbir-sources-of-data-breaches","title": "2009 DBIR: Sources of data breaches","published": "2009-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I've been reading reviews of the 2009 DBIR today and I gotta say - I'm surprised at the lack of snarling and teeth gnashing over our stats on who's behind all these breaches and lost records. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "227cd07cb468421ec7bf9d8212b29b90","url": "2009-dbir-conclusions-and-recommendations","title": "2009 DBIR: Conclusions and recommendations","published": "2009-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Chris Porter Take care of the low hanging fruit!  That seems to be the concluding mantra of analysis of over 600 cases from 2004-2008. At the conclusion of the original DBIR, we made a number of recommendations based on the findings from the 2004-2007 breach investigations.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8d22795807367214906053ebad1d324f","url": "2009-dbir-attack-targeting","title": "2009 DBIR: Attack targeting","published": "2009-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Organized Crime"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In our report we found it helpful to further break down the standard classifications of attacks, opportunistic and targeted, into three categories: Random opportunistic - victim randomly selected Directed opportunistic - victim selected, but only because they were known to have a particular exploitable weakness Fully targeted - victim was chosen and then attack planned In 2008, fully targeted attacks rose to a 5 year high, and accounted for 90% of total records compromised in 2008 (by comparison, it was 14% in last years model).  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "11999d39840b54fffae82d01dde75fec","url": "2009-dbir-time-span-of-breach-events","title": "2009 DBIR: Time span of breach events","published": "2009-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Modeling", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The Time Span of Breach Events section is particularly interesting to me because there is a significant applicability of this sort of information to threat, control, and risk modeling/analysis (I think time-framing is a critical element that many models tend to overlook or minimize the importance of).</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e255db90f8918743406324e1c810a4d3","url": "to-dbir-show-me-the-money","title": "To DBIR: Show me the money!","published": "2009-04-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Puzzles", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > One of the most common questions/criticisms we get regarding the Data Breach Investigations Report is the lack of data on financial losses experienced by organizations in our sample. We can understand the frustration. There are, however, several reasons that the report does not contain such information:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "71d672546906383bd231464d2fd0dd93","url": "when-you-re-pwned-you-re-pwned-any-questions","title": "When you're pwned, you're pwned. Any questions?","published": "2009-04-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Quality Assurance", "Information Technology and Services", "Security", "Computer & Network Security", "Sleep"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Multiprotocol Label Switching (MPLS) security is not for the faint hearted. However, like most information technology, understanding basic principles and having a policy founded on sound principles allows an administrator to sleep at night knowing the networks are secure.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f40f4e79f79ded6c5e2113bd6d616d6e","url": "what-s-the-deal-with-anti-forensics","title": "What's the deal with anti-forensics?","published": "2009-05-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Despite the release of numerous tools intended to make things easier for forensic investigators, there's also development on the other side of the law. I've personally given multiple presentations on the topic of anti-forensics at various conferences and have also attended my fair share as well. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7a8bc8ee46cafac78a4224830e7d20dd","url": "on-clouds-and-the-evolving-role-of-the-ciso","title": "On clouds and the evolving role of the CISO","published": "2009-05-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity", "Information Security", "Security Management", "Sales", "Security", "Computer & Network Security", "Accountant"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">One of the fun things about being in Information Security is the amount of change our profession goes through. In a sense, we might pity the accountant, the sales person, or others whose role in the corporation has been well defined for many years. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cddda9839debc8c8797a38a585a06819","url": "security-s-possible-path-to-maturity","title": "Security's possible path to maturity","published": "2009-06-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Memes", "Fine Art", "Consciousness", "InSecurity", "Risk Management", "Information Security", "Security", "Computer & Network Security", "Zombies"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At times, there are topics in information security discussions that get a lot of attention, fall out of interest, only to be resurrected again and reemerge as a hot topic. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5ccee535cc204f7ba97d20de407fd044","url": "yr-puvsser-vaqrpvssenoyr","title": "Yr puvsser vaqrpvssenoyr?","published": "2009-06-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Inscription", "Puzzles", "Easter", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Some readers of our 2009 Data Breach Investigations Report have inquired about this odd inscription on page 48. Is it a printing mistake? An easter egg? A secret message? Random gibberish from an insane mind? Hmmm...</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2d9f6d8d08974c39c7d1f529fa150f38","url": "blog-from-bryan-sartin","title": "Blog from Bryan Sartin","published": "2009-07-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Bryan Sartin, our Director of Investigative Response, has a post over on Verizon's \"Think Forward\" blog. If you've got the time, it's an interesting read and related to many of our discussions here.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ff1d2ec0e00815d25d8ce58005db5713","url": "talking-about-risk","title": "Talking about risk","published": "2009-07-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Fine Art", "Adventurer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> by William Murray  Not so long ago, but in a different era, the rogue hackers were building tools to automate the creation of viruses and worms to exploit newly publicized vulnerabilities.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "50dda419b480b3d516b4e5e201e168fe","url": "atl-activex-issues-are-not-the-end-of-the-world","title": "ATL/ActiveX issues are not the end of the world","published": "2009-07-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["International Security", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Executive Summary Security-related issues exist in some of the programs written using the Microsoft Active Template Library (ATL) that could allow code execution by browsing to a web site under criminal control. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e834b2f9df0716bfc0b659b534572eea","url": "preparation-for-internet-attacks","title": "Preparation for internet attacks","published": "2009-08-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Social Networking", "Enterprise IT", "Weather", "Flood", "South Korea", "Weather Impact"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by William Murray Headlines this week have reported on denial of service attacks against  Twitter, Facebook and several other social networking sites.  These follow attacks in July against various government sites in the US and South Korea.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "88dc0dea053da88e70c16a2de4695032","url": "security-concerns-in-a-diy-economy","title": "Security concerns in a \"DIY\" economy","published": "2009-09-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Do It Yourself", "Cartoon"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">  A few months ago C|Net published an article claiming current economic conditions have resulted in greater enterprise use of free and open source technologies.  This sparked an internal discussion about whether the supposed tendency would have an impact on risk to the enterprise.   </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4c16a4361f5024bca2dcd58d61ea3215","url": "re-imagining-information-security-standards","title": "Re-imagining information security standards","published": "2009-09-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hollywood", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Hollywood calls it \"Re-imagining\".  The creative types call it \"rebooting\".  We might settle for \"re-thinking\". But since it seems to be all the rage these days to take a second look at a subject, I thought I'd apply the concept to one of our favorite topics, Information Security Standards.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3745f441a7998720acef5866f20348a3","url": "security-decisions-how-do-you-make-them","title": "Security decisions - how do you make them?","published": "2009-09-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Education (International)", "Information Technology and Services", "Wikipedia", "Information Security", "Security Management", "Security", "International Security", "Computer & Network Security", "Security Technology"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As a student of both the fields of Information Technology/Security and Management Science (http://en.wikipedia.org/wiki/Management_science), I often find myself looking at security issues through a “decision-oriented” lens. For the most part, these two disciplines make good bedfellows – especially when one considers that engineers dominate the Information Security field. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d6dbc3e9fec9372832beb3330213ee2f","url": "rss-url-change","title": "RSS URL change","published": "2009-10-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Feedburner"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fd80d542c7a3f92f292edd77ca86037e","url": "rss-url-change-complete","title": "RSS URL change complete","published": "2009-10-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Feedburner"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7f9ac50bd982e9bd2441853ab4d77490","url": "security-decision-methods-poll-results","title": "Security decision methods poll results","published": "2009-10-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Defense Industry", "InSecurity", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A couple of weeks ago, I wrote a post on how we in the security industry make decisions. After a bit of waxing philosophical, I proposed a list of decision “methods” I regularly see in use among organizations. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2150ba3117fcb0041e15642446627ce4","url": "weekly-intelligence-summary-2009-10-16","title": "Weekly Intelligence Summary: 2009 - 10-16","published": "2009-10-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Threat Watch and Virus Alerts", "Snow", "T-Mobile USA, Inc.", "Google Plus", "Sweden"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The following is the executive summary paragraph to the weekly Intelligence Summary report Verizon Business Cybertrust Security’s Risk Team provides. The purpose is to capture in one paragraph the most risk-significant events, over the past week, from an enterprise perspective. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d1b9a910d09222ce4c264cb6deb5aabb","url": "weekly-intelligence-summary-2009-10-23","title": "Weekly Intelligence Summary: 2009 - 10-23","published": "2009-10-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Verizon Communications Inc.", "India", "NASA", "Space Exploration"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The following is the executive summary paragraph to the weekly Intelligence Summary report Verizon Business Cybertrust Security’s Risk Team provides. The purpose is to capture in one paragraph the most risk-significant events, over the past week, from an enterprise perspective.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ced3ff60aee1dbc9be4486911dbdd6db","url": "on-asset-valuation","title": "On asset valuation","published": "2009-10-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Last week on Twitter, Jeremiah Grossman, Whitehat Security, asked if there was a simple way to perform asset valuation. Since then there have been posts from Russell Cameron Thomas, Andrew Jaquith, and Gunnar Peterson on the subject that have all been very interesting. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b48e81f0ee44504a45e2e6fdd7afeff8","url": "weekly-intelligence-summary-2009-10-30","title": "Weekly Intelligence Summary: 2009 - 10 - 30","published": "2009-11-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["The Guardian", "Jobs (profession)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Most of the threat activity for this week was directed towards Facebook and Twitter users. Large e-mail campaigns for password reset confirmations led to compromised Facebook accounts and Trojan installations, with the primary goal of stealing bank account information. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a4a576b2b76f92db497db62fe9dda681","url": "weekly-intelligence-summary-2009-11-06","title": "Weekly Intelligence Summary: 2009 - 11 - 06","published": "2009-11-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Zeus", "Wordpress", "Pharmaceuticals"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most risk significant development this week was Microsoft's Advance Notification for release of six security bulletins on 2009-11-10. Sun released an update to Java addressing seventeen vulnerabilities, but none are presently the target of attack. Historically, Java vulnerabilities are ignored by criminals or attacked months after patching. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3516b03e2a1a43d5f41ada0fd8a5d18f","url": "icsa-labs-product-assurance-report","title": "ICSA Labs Product Assurance Report","published": "2009-11-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Today ICSA Labs (an independent division of Verizon Business) released a report based on testing results and observations taken during its 20-year history certifying security products. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e909e7fde6f3e6e51d5239310db430ab","url": "weekly-intelligence-summary-2009-–-11-–-13","title": "Weekly Intelligence Summary: 2009 – 11 – 13","published": "2009-11-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Latin America", "Central & South America", "Data Breach", "U.S. Congress", "Privacy", "Brazil", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most significant impact on risk over the last week was November's Microsoft Tuesday security bulletins, and most developments this week had a positive impact on risk. Kerfuffles over another SMB issue is of little consequence as was the news of SCADA hacking in Brazil. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "33b65a2c1c2793a5c230a2ae1164b69f","url": "verizon-at-sans-incident-detection-summit","title": "Verizon at SANS Incident Detection Summit","published": "2009-11-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Washington D.C.", "Verizon Communications Inc.", "Intelligence Service", "Intel"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The SANS WhatWorks in Incident Detection Summit 2009 will be held on December 9-10 in Washington, D.C. It follows the 2008 and 2009 editions of the SANS WhatWorks in Forensics and Incident Response Summits. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "78ec8eaedee8d2ec128f683c6375f71d","url": "weekly-intelligence-summary-2009-–-11-–-20","title": "Weekly Intelligence Summary: 2009 – 11 – 20","published": "2009-11-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Latin America", "Blackout", "Central & South America", "Terrorism", "Thunderstorm", "Brazil", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Availability failures dominate risk developments this week.  The regional blackout in  Brazil at the end of last week’s report occurred on Tuesday, 9 November.  First reports pointed to a thunderstorm, but this week technical details emerged suggesting an electronic attack was at least possibly to blame.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "61f5c99c1e314d813c0b338879309b80","url": "2009-data-breach-investigations-supplemental-report","title": "2009 Data Breach Investigations Supplemental Report","published": "2009-12-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Compendium", "Data Breach"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Verizon Business released the 2009 Data Breach Investigations Supplemental Report today. As you may know, the supplemental report addresses requests, issues, and questions that arise from our readers regarding the annual Data Breach Investigations Report (April, 2009). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "671a9a9b5b5aba439de6a33a03e76edd","url": "weekly-intelligence-summary-2009-12-04","title": "Weekly Intelligence Summary: 2009- 12- 04","published": "2009-12-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Novell, Inc.", "VPN", "Blackberry Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Advance Notification Services (ANS) from Microsoft for December’s security bulletins had the greatest impact on risk for Verizon Business customers. Adobe also made a pre-release notification for an update to Flash that took place on 2009-12-08. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1d7f552af611eed0519afb01feb17213","url": "ram-scrapers-the-sky-isn-t-falling","title": "RAM scrapers: The sky isn't falling","published": "2009-12-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Data Breach", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In the last day or so, we've seen several articles and web chatter on RAM scraping malware as described in our 2009 Data Breach Investigations Supplemental Report. Some of this discussion seems to be heading in a bit of a sensationalist direction. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c7bc75df05350c86e007c5a3319957b3","url": "weekly-intelligence-summary-2009-12-11","title": "Weekly Intelligence Summary: 2009-12-11","published": "2009-12-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Zeus", "InSecurity", "Risk Management", "legal compliance", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft and Adobe security bulletins and a surge in malicious PDF files lead the InfoSec issues relevant to risk in enterprises this week.  Two of this month’s Microsoft patches are in critical security infrastructure and so have received our 30-day recommendation, as has the Internet Explorer cumulative update.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "02f4c9f458f57b651fdc1b2fbe86ee69","url": "operation-chokehold-is-unquestionably-irresponsible","title": "\"Operation Chokehold\" is unquestionably irresponsible.","published": "2009-12-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Motivation", "Business Interruption", "Wireless Networks"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A \"flash mob\" effort threatens to attack AT&amp;T's wireless network later today. This is simply wrong. Nice people do not do this. Professionals do not engage in this sort of behavior. The purported motivation or provocation is irrelevant. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f47d4ea8c57f8027f9cc90b7d107aad0","url": "weekly-intelligence-summary-2009-12-18","title": "Weekly Intelligence Summary: 2009-12-18","published": "2009-12-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "JavaScript", "Blackberry Inc.", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Reports surfaced this week of a previously unknown vulnerability in Adobe Acrobat and Reader in targeted attacks and one report of a \"drive-by-download\" from a \"normal\" web site. Once again, Acrobat and Reader and their interaction with JavaScript have resulted in compromises. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a3c28ed83a5c1dab49b72ca628b8525b","url": "weekly-intelligence-summary-2010-01-01","title": "Weekly Intelligence Summary: 2010-01-01","published": "2010-01-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "New Year's Eve", "Wal-Mart"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Targeted attacks using the most-recent Adobe PDF vulnerability are the most significant issue in the risk environment this week for Verizon Business enterprise customers. The Waledac (aka Storm II) botnet went active last Wednesday evening with New Years messages leading to Trojans. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0cad46de85e02c5c3fea9e010717c663","url": "weekly-intelligence-summary-2010-01-08","title": "Weekly Intelligence Summary: 2010-01-08","published": "2010-01-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Iran", "Bacteria & Viruses", "Microsoft", "Symantec Corporation", "Assassin", "Board of Directors", "Pakistan", "Microsoft Office"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A second attack in as many weeks targeted a large, well-resourced DNS array; on Wednesday, InterNexX a host for 2.9 million domains was attacked and became intermittently available.  This follows the attack on UltraDNS on 2009-12-23.  Criminal manipulation of search engine optimization resulted in office.microsoft.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a94a2a3a5b1e389680f1c6a8303616d6","url": "weekly-intelligence-summary-2010-1-15","title": "Weekly Intelligence Summary: 2010-1-15","published": "2010-01-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Google Plus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Reports of targeted malicious code attacks on Google, Adobe, Dow and at least 31 others have boosted consumption of Tylenol, Tums and electricity among InfoSec professionals this week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c400873503a623ab3102ec8f97481aec","url": "7safe-security-breach-investigations-report","title": "7Safe Security Breach Investigations Report","published": "2010-01-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Police", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The UK Security Breach Investigations Report 2010 has been released. It is the joint work of 7Safe, the University of Bedfordshire, SOCA (Serious &amp; Organised Crime Agency) and the Metropolitan Police Service. Quite a lineup.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "beb7193c6785f43d8f08fd3d787d76cc","url": "weekly-intelligence-summary-2010-01-29","title": "Weekly Intelligence Summary: 2010-01-29","published": "2010-01-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Denver", "Cambridge", "InSecurity", "Faith & Religion", "Christian Science", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Researchers at the University of Cambridge found design errors in 3-D Secure, the technology behind Verified by Visa and MasterCard SecureCode. The short-term risk is negligible, but the impact on trust in these systems may be the most significant InfoSec risk issue of the week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "63c6f1649e8c6552270792a56b214f46","url": "weekly-intelligence-summary-2010-02-05","title": "Weekly Intelligence Summary: 2010-02-05","published": "2010-02-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Washington D.C.", "Verizon Communications Inc.", "Carbon"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Criminals attacked Twitter and European carbon exchange markets using a similar modus operandi: Multiple Bit Torrent sites used a common template that has been found to include a backdoor to harvest login ID and passwords. Similarly, bogus carbon exchange registries harvested other ID/PW. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fe97720ba27a8a833e6bb3124c3247bf","url": "recently-published-data-breach-studies","title": "Recently published data breach studies","published": "2010-02-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In a recent blog post we mentioned that 7Safe had published a security breach report in the UK. Over the last week or so there have been two more major data breach reports to be published here in the US. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6ce949076d0e913efd0a39b1b3846f7c","url": "a-comparison-of-dbir-with-uk-breach-report","title": "A comparison of DBIR with UK breach report","published": "2010-02-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Dave Hylender and Christopher Porter A week or so ago, we posted a quick heads up about the UK Security Breach Investigations Report. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7f68626abfcd26c407c3b3510b0ab083","url": "weekly-intelligence-summary-2010-02-12","title": "Weekly Intelligence Summary: 2010-02-12","published": "2010-02-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Thirteen Microsoft Security Bulletins lead risk developments this week simply because of their prevalence and mission criticality in most enterprises. The Risk Team belives that we will not experience attacks on any of those 26 vulnerabilities in less than 30 days. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c250d52aaec3c1b4b61b4e4720ca673b","url": "verizon-incident-metrics-framework-released","title": "Verizon Incident Metrics Framework released","published": "2010-02-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Many of you who read our blog regularly are familiar with our ‘Data Breach Investigations Report’.  We hope that you've found past reports informative, useful, and above all, actionable.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "09e363cc140ac3a8201c98a214eb8f7d","url": "weekly-intelligence-summary-2010-02-19","title": "Weekly Intelligence Summary: 2010-02-19","published": "2010-02-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Zeus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Lions, and tigers, and bears! Oh my! APT, and Kneber and Zeus! Oh my! Malicious code, crimeware, is among the greatest challenges InfoSec professionals face daily. Headlines and press releases not withstanding, malcode risk hasn't changed very much this year so far. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "00d9f28f8f25d75baf208e23d7383612","url": "thoughts-on-mapping-and-measuring-cybercrime","title": "Thoughts on mapping and measuring cybercrime","published": "2010-02-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Cybercrime", "Oxford"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The following was submitted by request to the Oxford Internet Institute’s forum on Mapping and Measuring Cybercrime held in January 2010. It is posted here with their permission.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d2e8d4f61fc1425e1db87ebd45da8aea","url": "verizon-business-professionals-to-speak-at-upcoming-rsa-conference","title": "Verizon Business professionals to speak at upcoming RSA Conference","published": "2010-02-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Will Hutton", "San Francisco", "Security and Investigations", "United States"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Security professionals from Verizon will be presenting or participating in panel discussions at RSA USA 2010 and at Mini-Metricon 4.5 in San Francisco, CA next week.  The presentations are as follows:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "addc5eba415f6fc0e42aeb47a8ecb5b0","url": "weekly-intelligence-summary-2010-02-26","title": "Weekly Intelligence Summary: 2010-02-26","published": "2010-02-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Denver", "Intel", "Symantec Corporation", "Bullying", "Google Plus", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft, using lawyers and a team of researchers from universities and Symantec, took out the command and control nodes for the Waledac botnet. Waledac almost certainly has an affinity to Conficker, if it is not controlled by the same criminals.  This was the week's good news.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "979a52bfca741ad632937c1b21de4e11","url": "verizon-incident-metrics-framework-released","title": "Verizon Incident Metrics Framework released","published": "2010-03-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Many of you who read our blog regularly are familiar with our ‘Data Breach Investigations Report’.  We hope that you've found past reports informative, useful, and above all, actionable.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5e989e88b0caaf276ddab4109e36b22e","url": "i-m-outta-here","title": "I'm outta here!","published": "2010-03-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Plus", "Careers"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > I am so done!  It's time to go back to working at a gas station, my first job.  Whiplash and the Advanced Persistent Threat (APT) have terminated my InfoSec career.  Here's why:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1b3079361b7c5efa7ee483f90e4fdf25","url": "weekly-intelligence-summary-2010-03-05","title": "Weekly Intelligence Summary: 2010-03-05","published": "2010-03-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Panda", "Zeus", "Ratio"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft announced they would issue two security bulletins patching eight vulnerabilities next week. Microsoft will not be patching a newly reported vulnerability in VBScript, known as \"the F1 hole,\" and the wailing of banshees has begun. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "64eea632f29acbe3b69289541ec92e45","url": "let-s-talk-about-the-end-in-end-to-end-trust-part-i","title": "Let’s talk about the \"end\" in end-to-end trust, part I.","published": "2010-03-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Let’s talk about End in End-to-End Trust, or, in other words, the Human Being. Focus on the human subject – the beneficiary of technology We’re pretty good at dealing with everything from the digital perimeter through to the protected resources the person wants to access. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2eff6eb0c2a93ac807672713c33b9464","url": "plane-crashes-and-security-breaches","title": "Plane crashes and security breaches","published": "2010-03-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Faith & Religion", "Food Stamps"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Christian Moldes   In Outliers, Malcom Gladwell analyses how plane crashes are the result of a combination of errors. I found this analysis very interesting because of the similarity with most security breaches. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "97c5d37a4a371fce9e9ddcd0f4e6f17e","url": "weekly-intelligence-summary-2010-03-12","title": "Weekly Intelligence Summary: 2010-03-12","published": "2010-03-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Zeus", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A new vulnerability in Internet Explorer already in use for targeted attacks leads this week's Risk intelligence summary.  Exploit code has been published and a Metasploit module makes weaponization trivial.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a16bdb63f730bc3e64b3b23fa4196cf0","url": "veris-incident-classification-mindmap","title": "VERIS Incident Classification Mindmap","published": "2010-03-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As many of you know, we released the Verizon Incident Sharing framework a couple weeks ago. The framework has 4 main sections: Demographics, Incident Classification, Discovery and Mitigation, and Impact Classification. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9747cd72fcb940ca75abbaba54635293","url": "weekly-intelligence-summary-2010-03-19","title": "Weekly Intelligence Summary: 2010-03-19","published": "2010-03-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Austin", "Malware", "Automobiles", "Automotive", "Austin MN", "Vodafone", "Shopping", "Online Shopping", "Texas", "Advertising"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In hindsight, this would have been a good week to catch our breath with some vacation, as little changed in the risk environment.  The latest IE vulnerability has yet to manifest itself as a more significant risk.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8725eac124c9f8258f69517405a253f9","url": "let-s-talk-about-the-“end”-in-end-to-end-trust-part-ii","title": "Let’s talk about the “end” in end-to-end trust, Part II.","published": "2010-03-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Pediatrics"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The following post is the second part of a blog entry that was posted on this site on March 10, 2010. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8c2a3ab53449eaaca6b7a24b652b319d","url": "is-compliance-stifling-information-security-innovation","title": "Is compliance stifling information security innovation?","published": "2010-03-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity", "Risk Management", "legal compliance", "Information Security", "Security", "Computer & Network Security", "Innovation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > A blog post by the incurably brilliant Rich Mogull started off a discussion about innovation and compliance in InfoSec.  The gist of the argument on twitter was this: regulatory compliance in Information Security stifles innovation.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c4942cc681b3bfcf9da65b903b56faad","url": "weekly-intelligence-summary-2010-03-26","title": "Weekly Intelligence Summary: 2010-03-26","published": "2010-03-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Philippine Earthquake", "Cybercrime", "Earthquakes"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Risk Team had a rare face-to-face meeting this week. The meeting is perhaps why we feel out of touch. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8a134c1824c42545e958faecc323ba6b","url": "infosec-scavenger-hunt","title": "InfoSec scavenger hunt!","published": "2010-04-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Smoking", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Welcome to the 2010 InfoSec Scavenger Hunt!  We would like encourage all security professionals to participate - even if you aren’t CISSP certified.  Below you will find a list of well-known industry personas.  Associated with each is a task worth one or more points.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a959b23955fc53b366d66229e1f452f2","url": "weekly-intelligence-summary-2010-04-02","title": "Weekly Intelligence Summary: 2010-04-02","published": "2010-04-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Renault", "Verizon Communications Inc.", "Mountain Lion OS", "Automotive", "China", "Yahoo"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The top risk event this week was the release of another out-of-cycle Microsoft security bulletin, MS10-018, mitigating risk for ten vulnerabilities, but only one that is known to be being used for attacks in the wild. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d5c94ab6eea784eeff4c5f93b2e43bc3","url": "weekly-intelligence-summary-2010-04-09","title": "Weekly Intelligence Summary: 2010-04-09","published": "2010-04-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["China", "Toronto", "Information Security", "Security", "US Department of Defense", "Computer & Network Security", "Canadian Universities", "Espionage", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most significant risk event of the week happened late in the week, and assessments are still ongoing. Thursday morning a data center belonging to China Telcom announced BGP prefixes  for about 37,000 networks for which they were not authoritative.   </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "bac662608f21a8e6cabb0fa8015d659c","url": "weekly-intelligence-summary-2010-04-16","title": "Weekly Intelligence Summary: 2010-04-16","published": "2010-04-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Inc.", "Mountain Lion OS", "InSecurity", "Aircraft", "Google Plus", "Iceland", "Personal Computer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">InfoSec gray-beards were trippin this week; flashing back to 1962 and Dickey Lee's #6 teen tragedy hit, \"Patches.\"  Microsoft gave us 11 bulletins.  Adobe dropped one bulletin  with 15 vulnerabilities, all of them credited to external researchers.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "57ff8912450693d05482cd9566a1e092","url": "redefining-security-researcher","title": "Redefining \"security researcher\"","published": "2010-04-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "Theft", "Information Security", "Security", "Security and Investigations", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Have you ever heard of a terrorist referred to as a “demolition engineer?” How about a thief as a “locksmith?” No? Well, that’s because most fields don’t share the InfoSec industry’s ridiculous yet long-standing inability to distinguish the good guys from the bad guys. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "66215e5ca858ed59b1fe8e4df8a7912a","url": "weekly-intelligence-summary-2010-04-23","title": "Weekly Intelligence Summary: 2010-04-23","published": "2010-04-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "PricewaterhouseCoopers", "Boots", "Antivirus", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The leading risk event this week happened when McAfee issued an anti-virus update on Wednesday with a false positive detection of w32/wecorl.a in the SVCHOST.EXE file in Windows XP SP3, and the result was BSOD and looping boots.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f90feaff30e159fa3440fa14dfaf5d7a","url": "weekly-intelligence-summary-2010-04-30","title": "Weekly Intelligence Summary: 2010-04-30","published": "2010-04-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Zurich", "Oil Rig", "Switzerland", "Temperature", "IBM", "Oil", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If risk were represented by an analog gauge like the fuel or temperature gauge on a 1977 Pontiac Trans Am, the needle moved very little this week. There were only two new and remarkable events related to enterprise InfoSec risk.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fe6d4a42a5bd164069b3f114e929924b","url": "paradigms-for-“stellar”-security","title": "Paradigms for “stellar” security?","published": "2010-05-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Universe"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I don’t get a chance to read purely for pleasure as often as I’d like to but I do manage to squeeze in a good sci-fi book every now and then. One series I enjoy for some light reading is Orson Scott Card’s “Ender” saga. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5785baa321972d90cce2a5927f9bd2bc","url": "2010-dbir-to-include-cases-from-u-s-secret-service","title": "2010 DBIR to include cases from U.S. Secret Service","published": "2010-05-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Pets", "Data Breach", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">When we released the VERIS framework back in March, we hinted that something big was in the works for the 2010 Data Breach Investigations Report. As of today, we can finally let the proverbial cat out of the bag. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "db34ca5c4ef73b0df2a2a4b1e6085e4f","url": "weekly-intelligence-summary-2010-05-07","title": "Weekly Intelligence Summary: 2010-05-07","published": "2010-05-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Renault", "Automotive", "Go Daddy Group", "Wordpress", "Web Hosting", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Something happened in the technology space on Thursday, but it remains to be seen precisely what caused it and if there was an InfoSec component, even if a \"fat-fingered\" error was the proximate cause.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "af225e93cf53d1887d6321ab86d5771b","url": "weekly-intelligence-summary-2010-05-14","title": "Weekly Intelligence Summary: 2010-05-14","published": "2010-05-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Facebook Privacy", "Automobiles", "Automobile", "E-mail", "Cold Fusion", "Virgin Media"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most remarkable risk-related event in InfoSec this week was when a cloud was involved in an automobile wreck. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4bee531c2dd9907e586a62c67ad78080","url": "weekly-intelligence-summary-05-21-2010","title": "Weekly Intelligence Summary: 05-21-2010","published": "2010-05-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Russia", "Retail", "Identity Theft", "Wal-Mart", "Federal Trade Commission", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The chances are excellent that risk has undergone a game-changing event this week when retail giant Wal-Mart announced they were going to adopt Chip-and-Pin capable Point of Sale terminals.  This has the potential to virtually exterminate credit card fraud in the brick-and-mortar world.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e91acbbf53e534e7586c3b72bab5ed43","url": "weekly-intelligence-summary-2010-05-29","title": "Weekly Intelligence Summary: 2010-05-29","published": "2010-06-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Media Temple", "Malware", "LiveJournal", "Trinity Mirror plc"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The only development this week impacting risk for most enterprises was a significant denial of service attack on the DNS infrastructure for Media Temple, the host for many commercial web properties as well as Live Journal.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7b7e69e0efd09b249272f7ab08cb925f","url": "on-asset-value-impact-and-veris-modeling","title": "On asset value, impact and VERIS modeling","published": "2010-06-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Modeling"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Friends of the Blog, Rich Mogull and Pete Lindstrom, are talking asset value again.  Rich, in the context of why he's not particularly fond of ALE but wants risk models that measure impact, Pete in response that true value of assets are difficult to peg.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a9b6810f6d77be1f618b2cc92154bb31","url": "nyt-article-drilling-for-certainty","title": "NYT article: \"Drilling for Certainty\"","published": "2010-06-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Hat tip to Dave Kennedy for bringing this one to my attention. Great article and very relevant to those of us charged with managing security and reliability in complex systems.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5cac598635bcf85e73f9382a234d50e5","url": "weekly-intelligence-summary-2010-06-04","title": "Weekly Intelligence Summary: 2010-06-04","published": "2010-06-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Japanese", "Japan ", "Word-processing"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Friday evening, Adobe issued a new security advisory for a vulnerability in Flash, Acrobat and Adobe Reader and reported it is being actively exploited in the wild against both Adobe Flash Player, and Adobe Reader and Acrobat. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "987278b054a9580ee5817cdca69372dd","url": "weekly-intelligence-summary-2010-06-11","title": "Weekly Intelligence Summary: 2010-06-11","published": "2010-06-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Inc.", "Google News", "Google Plus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">On the heels of last week's \"news\" that Google was purging the Windows OS, as if that decision was independent of the forthcoming roll-out of the Chrome OS, we have more Google versus competitor security pseudo-news. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f25da44f57650414da6e4ba6fae966ea","url": "risk-appetite-counting-risk-calories-is-all-you-can-do","title": "Risk appetite: Counting risk calories is all you can do.","published": "2010-06-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Telecommunications", "Equation", "Security and Investigations", "British Telecom", "Max Born"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Risk Appetite: Counting Risk Calories is All You Can Do “If it is impossible to deduce a wave equation strictly logically, then the formal steps carrying on to it, are, as a matter of fact, only witty guesses.” - Max Born Jim Tiller of British Telecom has published a blog post called \"Risk Appetite, Counting Security Calories Won't Help\".  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "afa48156996f076d483f7165041a6aca","url": "weekly-intelligence-summary-2010-06-19","title": "Weekly Intelligence Summary: 2010-06-19","published": "2010-06-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Media Temple", "Verizon Communications Inc.", "LiveJournal", "Financial Services", "Taxes", "Good News", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It was a tough week in the risk domain of availability. Intuit (Quicken, TurboTax), Twitter, Media Temple (Live Journal), NameCheap (domain registrar) and Virgin Blue (airline) suffered outages. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3ea8de6e2c178fbf47e7bf4ffb4c3715","url": "weekly-intelligence-report-2010-06-25","title": "Weekly Intelligence Report: 2010-06-25","published": "2010-06-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Personal Data Security", "Malware", "World Cup 2010", "Fraud", "Apple", "Tablets", "Cybercrime", "Enterprise IT", "Apple iPhone", "iPad", "Computer & Network Security", "Weird", "Sophos", "Melbourne", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The top news in IT this week was iOS4 and iPhone 4. Verizon Business Cybertrust Security customers should feel little impact from Apple's releases as the enterprise support for iPhone is still maturing. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b649f85e595ced5cba1a543cfc4eb4c8","url": "forget-trying-to-color-the-swan-focus-on-what-you-do-know","title": "Forget trying to color the swan, focus on what you do know.","published": "2010-07-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Weather", "Hurricanes"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Recently, there's been no small amount of discussion about how the government can help defend cyber-space from catastrophic cyber-risks.  Many folks are saying that we (infosec) could have our own \"Black Swan\" moment and a sortof \"kill switch\" might provide a defense against attack. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3995bfee166289ea9293490364984822","url": "weekly-intelligence-summary-2010-07-02","title": "Weekly Intelligence Summary: 2010-07-02","published": "2010-07-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Pets", "Symantec Corporation", "Russia", "KGB", "Parenting Products and Services", "Cold war", "Good News", "Parenting", "Espionage", "United States", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">\"Wanted: Eleven power users for international espionage positions in the United States; parenting skills and fluency in English and Russian a plus.\" The Russian spies' IT issues have distracted the technology media like a cat and a laser pointer. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5f280bd9f188f3f3341e50d380e4ad66","url": "weekly-intelligence-summary-2010-07-09","title": "Weekly Intelligence Summary: 2010-07-09","published": "2010-07-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Russia", "Ratio", "Wikipedia", "YouTube", "Online Video", "Cloud Music", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The week kicked off with attacks on YouTube , Wikipedia, iTunes, Russian banks and their customers and at least two attacks on Facebook users.  Hindsight may remember the most risk-significant development this week was EMC began shutting down their Atmos Online cloud. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2eb6819daa6d268cfdca20e87ba3d756","url": "weekly-intelligence-summary-2010-07-16","title": "Weekly Intelligence Summary: 2010-07-16","published": "2010-07-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Zeus", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Researchers at CA have an analysis for an update to the Zeus Trojan/Kit, and Kaspersky has an analysis of the Black Energy DoS malware and they are the most useful risk intelligence updates this week. Malware and other InfoSec blogs are buzzing about a new rootkit that uses \".</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "df542c19cf7cc7e75c2cee0a47be83ba","url": "successful-evidence-based-risk-management-the-value-of-a-great-csirt","title": "Successful evidence-based risk management: The value of a great CSIRT","published": "2010-07-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Gartner", "InSecurity", "Risk Management", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > I was reading Richard Bejtlich’s blog today on Computer Security Incident Response Teams and he quoted the following from Gartner’s report “How to Build a Computer Security Incident Response Team”:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5ca38b1cd9aa15c62db72496cf5918af","url": "veris-framework-moves-from-beta-to-v1","title": "VERIS framework moves from beta to v1","published": "2010-07-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As you may remember, we released a beta version of the VERIS framework back in March. Since then, we've received helpful feedback from the public as well as organizations that have begun to implement and use VERIS. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "19d7357a2ffc139f8f4ce4626afbdee1","url": "intelligence-summary-2010-07-23","title": "Intelligence Summary: 2010-07-23","published": "2010-07-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Google Plus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Tuesday, September 21st, 1976: The classic M*A*S*H* hour-long \"Bug Out\" episode aired. What's that got to do with InfoSec risk this week? Not a blessed thing, and that's the point. There's a new vulnerability in Windows and there's malware in the wild exploiting it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5b767dd31acf4d88ab237d124f6e0ab7","url": "2010-data-breach-investigations-report-released","title": "2010 Data Breach Investigations Report released","published": "2010-07-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Get it here. As many of you know, we publish a series of reports covering forensic engagements worked by Verizon's Investigative Response team. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "37ba9e6bb6461f6d60334c4426af148b","url": "weekly-intelligence-summary-2010-07-30","title": "Weekly Intelligence Summary: 2010-07-30","published": "2010-07-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "Zeus", "Data Breach", "Anxiety", "Flood", "Weather Impact"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Babel, (Genesis 11:1-9) is a good analogy for this past week. Imagine the cacophony that could be heard after the language was confused. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "037e91fac787b76788a1b3a545a5ee79","url": "misinterpretation-alert-insider-breaches-are-not-increasing","title": "Misinterpretation alert - Insider breaches are NOT increasing.","published": "2010-08-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > We're seeing some commentary on our 2010 DBIR that says something to the effect of \"insiders are #1 threat\" or \"internal breaches are increasing.\" Neither of these are true.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f4bb6d38acc0410960ca4e095042ab54","url": "weekly-intelligence-summary-2010-08-06","title": "Weekly Intelligence Summary: 2010-08-06","published": "2010-08-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Blackberry Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The risk environment improved this week with the publication of MS10-046 to patch the .LNK vulnerability first reported with the discovery of the Stuxnet Trojan. Regarding all of the fussing over governments demanding access to BlackBerry traffic, the risk environment has not seen significant changes. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "089794a654e3ecd2489525dc8de1e14f","url": "who-wants-500","title": "Who wants $500?","published": "2010-08-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Some of you may remember that the 2009 Data Breach Investigations Report had an enciphered message embedded in the cover and a $500 prize for the first person to crack it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5c3322c377f16f6cbc057d826cb76ce7","url": "dbir-cover-challenge-clues","title": "DBIR cover challenge clues","published": "2010-08-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">------------------ UPDATE: OK, seriously.  Whomever is dropping these hints off to Ryan Naraine http://www.zdnet.com/blog/security/verizon-dbir-challenge-clue-2/7148 at ZDNet:  You’re giving away too much. ------------------ There’s been quite a bit of activity about the DBIR Cover Challenge on Twitter today (#DBIR). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1bbf6cbc5068e6af3567d300ba2f20c6","url": "weekly-intelligence-summary-2010-08-13","title": "Weekly Intelligence Summary: 2010-08-13","published": "2010-08-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Sun", "Cold Fusion"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Patch frenzy!?! Ah,...nope. Our To-Do list got longer this week, but our concerns last week about curtailed August vacations appear to be unfounded, and I'll cop to it. Microsoft issued 14 bulletins and Verizon Business Cybertrust Security customers have had our recommendations since Wednesday. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "39dbed68d056932baa0c06e0a2d3c6e0","url": "2010-dbir-podcasts","title": "2010 DBIR podcasts","published": "2010-08-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Podcast", "Data Breach", "Wordpress", "YouTube", "Sweden"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If you like podcasts and you like our 2010 Data Breach Investigations Report, then this is your lucky day. Below you'll find links to some podcasts we've done following the publication of the report in late July. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5fc457b1dc09e4ddb70909df76c2acf9","url": "cloud-computing-and-polycentric-risk-tolerances","title": "Cloud computing and polycentric risk tolerances","published": "2010-08-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Cloud Security", "Private and Public Clouds", "InSecurity", "Cloud Computing", "Computing"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Recently, I've seen two cloud computing advocates significantly dismiss the notion of a private cloud.  Basically, the complaint the cloudies offered was this: \"I'm a fan of private clouds, I just think that 90% of the corporate rationale for thinking private cloud is (bull).  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b7cdf135abda2c295e7919ea2dd5544a","url": "weekly-intelligence-summary-2010-08-20","title": "Weekly Intelligence Summary: 2010-08-20","published": "2010-08-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Aches & Pains", "Headache"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Whoopee! We are so lucky this week! We all get to patch our Adobe Acrobat and Adobe Reader instances and race the criminals to see if we can patch faster than they can add it to their other Adobe sploits. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "27a69884664fc14c990cb69f03a6a846","url": "weekly-intelligence-summary-2010-09-03","title": "Weekly Intelligence Summary: 2010-09-03","published": "2010-09-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Lottery"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">(SET CHANT=ON) Any vulnerability, no matter how severe, is zero risk if there is zero threat taking advantage of it. (SET CHANT=OFF) There is great angst and hand-wringing over untrusted DLL search path vulnerabilities but the fact remains, we haven't seen attacks exploiting it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "eecb5c282db5a58c3a468b1bce3430f5","url": "2010-dbir-webinars-this-week-and-new-data","title": "2010 DBIR webinars this week (+ new data)","published": "2010-09-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Small Business"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I realize it's short notice but there are a couple of 2010 DBIR webinars happening this week that you may find interesting. On Wednesday, Peter Tippett and I will present the main findings of the 2010 DBIR.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ea4fb8fd92ca8977b1e5920f3da934f3","url": "weekly-intelligence-summary-2010-09-10","title": "Weekly Intelligence Summary: 2010-09-10","published": "2010-09-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Thought & Cognition", "Internet", "David Smith", "Internet", "Adventurer", "Personal Computer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We all witnessed an old-fashioned, mass-mailing Visual Basic worm this week. Woot!  But PC Magazine's headline may have gone a bit too far: \"'Here You Have' Malware Preys on the Incompetent.\" Untold numbers of computer users weren't around for Lovebug or Kournikova or even Sasser and Sober. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "068502af9aa971197906396f030e6606","url": "arriving-soon-new-study-on-pci-dss","title": "Arriving soon: New study on PCI DSS","published": "2010-09-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "PublishThis", "PCI Compliance", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The PCI Council's 2010 Community Meeting is going on this week, which reminds us - we've got a new study on the PCI DSS due out on October 4. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e73477b6c93fe2853fa8b69feed5da41","url": "weekly-intelligence-summary-2010-09-17","title": "Weekly Intelligence Summary: 2010-09-17","published": "2010-09-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["JP Morgan Chase & Co. "],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It's been years since we last had to pass a drug test, but we're wondering if we should routinely be screened. This was a week that called for some bi-polar meds. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "723c9085fe3323ffa698176826e5ad53","url": "weekly-intelligence-summary-2010-09-24","title": "Weekly Intelligence Summary: 2010-09-24","published": "2010-09-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Russia", "Cybercrime", "Perennial", "Nuclear Energy", "Renewable Energy", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Stuxnet worm is not hiding in our closets with Sulley. The reliable primary source for the \"Stuxnet targeted the Bushehr nuclear plant \" highlighted the fact it was \"completely speculative\", but you'd never know it from this week's news.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1bd593ad8f033cc7778d6f24b62b07c5","url": "facts-first-on-stuxnet-from-icsa-labs","title": "\"Facts first\" on Stuxnet from ICSA Labs","published": "2010-09-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Andy Hayter, a colleague of ours from ICSA Labs (an independent division of Verizon Business) posted some information on the Stuxnet worm late last week. If you're looking for some FUDless facts, it's a good place to start.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "39862fa37a0b50489f30dba7fa1f2630","url": "evidence-based-risk-management-and-applied-behavioral-analysis","title": "Evidence-based risk management and applied behavioral analysis","published": "2010-09-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Modeling", "Allison Miller", "Risk Management"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">To begin with, let me freely admit that I am not the fastest runner off the line. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f590962f9f1551a485ea030421b38847","url": "weekly-intelligence-summary-2010-10-01","title": "Weekly Intelligence Summary: 2010-10-01","published": "2010-10-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "VoIP", "Zeus", "Internet Protocol", "Comcast"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Because \"APT\" is no longer generating the desired emotional response, technical media and the marketing departments of security and anti-virus companies will be blowing the Stuxnet vuvuzela until a new specter can be targeted for exploitation.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8c558ab8ac561611fc907d3eb2a0772e","url": "just-released-2010-pci-compliance-report","title": "Just released: 2010 PCI Compliance Report","published": "2010-10-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["PCI Compliance", "Validation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > A couple of weeks ago, we mentioned a new report due on on PCI DSS assessment findings. It's out today and you can get it here.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a774d0d8313a8bbc9a294cb4815e64b8","url": "national-cyber-security-awareness-month","title": "National Cyber Security Awareness Month","published": "2010-10-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Verizon Communications Inc.", "Cyber Security", "InSecurity", "National Security", "Information Security", "Security", "International Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Marcus Sachs Today is the kick-off of National Cyber Security Awareness Month, the seventh year that those of us in the security profession take extra time to focus on raising awareness of cyber security issues with our customers, families, friends, and associates. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4f067986145a1279c368b478c0e716dc","url": "verizon-and-451-group-dbir-webinar","title": "Verizon and 451 Group DBIR Webinar","published": "2010-10-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Security", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I am very pleased that the 451 Group is sponsoring a webinar/discussion about the Data Breach Investigations Report next Thursday, October 14, from 2-3 PM EST. Josh Corman and I are working hard to give the content a serious and thorough discussion about the data and interpretations. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a6bd02372be3b5bea8385c45e3796c29","url": "weekly-intelligence-summary-2010-10-08","title": "Weekly Intelligence Summary: 2010-10-08","published": "2010-10-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Zeus", "Alabama", "International Law", "Law Enforcement", "Birmingham AL", "University of Alabama", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Vulnerabilities and bad actors competed for the lead in risk intelligence for the last week. Adobe patched Acrobat and Adobe reader for 23 vulnerabilities including one they report is being actively exploited in the wild. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "980f9320a90dfc3b59ecc4fde5126a17","url": "weekly-intelligence-summary-2010-10-15","title": "Weekly Intelligence Summary: 2010-10-15","published": "2010-10-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Georgia", "Sun", "Federal Energy Regulatory Commission", "Federal Energy Regulatory Commission", "Volume 9", "Smart Grids"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This is one of those recurring weeks when it would have really been useful to have gone to Evelyn Wood's speed reading because the most important risk intelligence development this week was Microsoft's 136-page Security Intelligence Report Volume 9.  Microsoft set a new record with sixteen security bulletins. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "42afd8daeef643ad722b58e8758c3d76","url": "weekly-intelligence-summary-2010-10-22","title": "Weekly Intelligence Summary: 2010-10-22","published": "2010-10-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Bacteria & Viruses", "Cybercrime", "Pearl Harbor", "National Security", "Computer Virus", "Weird"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">What a weird week. We found ourselves in a tempest in a teapot over IDS/IPS evasion that failed to cause anyone in the Risk Team to use the word \"advanced.\" Two months ago, we tracked speculation a computer virus might have contributed to an airliner crash in 2008. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "19231cf71b637ea3bf0608f8dc8a8bec","url": "weekly-intelligence-summary-10-28-2010","title": "Weekly Intelligence Summary: 10-28-2010","published": "2010-10-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["North Carolina"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">On reflection, we may regard the most risk-significant event this week to be a US Federal court ruling that Amazon did not have to turn over customer purchase records to North Carolina’s Department of Revenue. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "acaee758f52ba4dbdaf927208c3082f4","url": "weekly-intelligence-summary-2010-11-05","title": "Weekly Intelligence Summary: 2010-11-05","published": "2010-11-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Linux", "Application Lifecycle Management", "Linus Torvalds", "Android", "Japan ", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Ohmygosh! Another week, another surprise attack. Last week, the civilized world was stunned to learn of a new Adobe Flash vulnerability under attack (which Adobe fixed), and this week we were floored upon learning Internet Explorer has another drive-by-download vulnerability. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d9e8457b37d5c97550c76ba8dd9ddcbc","url": "veris-community-application-launched","title": "VERIS Community application launched","published": "2010-11-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "Verizon Communications Inc.", "Data Breach", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Today marks another milestone in our long-term VERIS project to collect incident data and make it more available to the security community. For the past few years, we've published the Data Breach Investigations Reports, which present statistics based on forensic investigations conducted by our IR services. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "adb123d82036c5389dcfd134cf20f0db","url": "weekly-intelligence-summary-2010-11-12","title": "Weekly Intelligence Summary: 2010-11-12","published": "2010-11-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Black Friday", "Amnesty International", "Hong Kong", "Cyber Monday", "Shopping", "Financial Services"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most-recent, and unpatched, Internet Explorer vulnerability showed up in the Eleonore exploit kit and on Amnesty International’s Hong Kong website. To be sure, this risk is very low now, but this issue leads the Risk Team’s “on watch” list for issues we watch closely.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d0a0f1e88079a590e51e49162758d9ec","url": "veris-project-update-one-week-in","title": "VERIS project update, one week in","published": "2010-11-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > A *lot* of people have asked us how the Verizon Enterprise Risk and Incident Sharing (VERIS) community project is going one week later, and so we thought a small update was in order.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "95cc821edef8c7bdab962e4fd07dd82d","url": "weekly-intelligence-summary-2010-11-19","title": "Weekly Intelligence Summary: 2010-11-19","published": "2010-11-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Russia", "China", "Hacker", "Cryptography", "Computer & Network Security", "Education", "Symbian"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">One of the alarms I have set on my computer went off yesterday and I couldn’t remember why I had set it.  Today I realized it was my “cyclic hyperbole over cryptography research” alarm. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "572980a0d9d66dc496a36bc529c416d6","url": "enabling-the-healthcare-ecosystem","title": "Enabling the healthcare ecosystem","published": "2010-11-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Health IT", "InSecurity", "Ecosystem", "Data Breach", "Health Insurance Industry"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As you may know from reading our annual Data Breach Investigations Report (DBIR), authentication issues often play a role in security incidents. Verizon Business has been working on this issue within the medical community and recently created the Healthcare Provider Portal. The portal will provide U.S. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f111c0e39a2290d399edd6600809e887","url": "evaluating-protected-mode-in-internet-explorer","title": "Evaluating Protected Mode in Internet Explorer","published": "2010-12-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Business Interruption", "Adventurer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Tom Keetch The level of protection offered by Protected Mode Internet Explorer is not well understood.  As such, there are common misconceptions about the level of additional protection it provides.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "64b03ff84b042d65e35d0b3368e4480e","url": "weekly-intelligence-summary-2010-11-26","title": "Weekly Intelligence Summary: 2010-11-26","published": "2010-11-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Monroe Community College", "FireEye, Inc.", "Automotive", "Internet", "Gambling", "Ford Motor Company", "Internet", "India", "Taiwan ", "Education", "London"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Targeted and insider attacks lead this week’s risk intelligence. Neil Schwartzman reported targeted attacks on e-mail service providers, direct mailers and gambling sites. FireEye reported on a cunning new backdoor that exploits CVE-2010-3962, the unpatched vulnerability in Internet Explorer. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "88a59394863152d5434e035bc2460661","url": "catch-today-s-twitter-interview-with-the-risk-team-s-alex-hutton","title": "Catch today's Twitter interview with the RISK team's Alex Hutton.","published": "2010-12-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f3a3cf37c05d860d3cc97ef9852799c9","url": "security-cannot-be-addressed-by-technology-alone","title": "Security cannot be addressed by technology alone.","published": "2010-12-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Bacteria & Viruses", "Military", "Weird", "The Pentagon", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Today I was going about my usual business of analyzing IR case reports for the 2011 DBIR when I clicked over to CNN to see what was going on in the real world. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cd880b0ed29da099879a898552e7e9e9","url": "weekly-intelligence-summary-2010-12-3","title": "Weekly Intelligence Summary: 2010-12-3","published": "2010-12-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Best Buy Co. Inc", "Black Friday", "Cyber Monday", "Victoria's Secret", "American Eagle Outfitters, Inc.", "Australia", "National Australia Bank", "Spam (Electronic)", "Wikileaks", "Comcast", "Australian Companies"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Ok, who broke the Internet this week? Come on, own up. That’s a bit of an exaggeration, but it’s about the only headline we didn’t see. Reports of outages were the most common risk theme this week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8cf2078ced37acec630e16bf9e1c3770","url": "wikileaks-anonymous-fallout-more-regulation-on-the-way","title": "Wikileaks/Anonymous fallout; more regulation on the way?","published": "2010-12-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Regulation", "Financial Regulation", "Information Security", "Security", "Computer & Network Security", "Wikileaks"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Not to be overdramatic, but I wonder if we really aren’t in the middle of (another) watershed event in InfoSec today. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "167f99cb2dbd8b0ff5ad6e2ad2dd7189","url": "weekly-intelligence-summary-2010-12-10","title": "Weekly Intelligence Summary: 2010-12-10","published": "2010-12-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "NASA", "Space Exploration", "Christmas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We were reminded this week that with no standard curriculum for InfoSec professionals (or the journalists covering us), we must not assume everyone recognizes the shoulders we stand upon today. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7659cd9337aede73b353b0533e0455f3","url": "weekly-intelligence-summary-2010-12-17","title": "Weekly Intelligence Summary: 2010-12-17","published": "2010-12-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Fraud", "Cybercrime", "Attack!", "Silverpop"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Forbes has a must read article about the attack on Gawker Media by a group self-identifying as \"Gnosis.\" Included in the compromise was disclosure of the account registration details for 1.3 million Gawker users, writers and employees. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2215f74583e0a4353b598ff2792976fc","url": "qanda-with-author-of-white-paper-on-protected-mode-in-internet-explorer","title": "Q&A with author of white paper on Protected Mode in Internet Explorer","published": "2010-12-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Business Interruption", "Adventurer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Answers by Tom Keetch Recently, Verizon Business' Threat and Vulnerability Practice released a white paper, \"Escaping from Protected Mode Internet Explorer – Evaluating a potential security boundary”.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1edcf9de54b26ce4e056b6470c91c0df","url": "weekly-intelligence-summary-2010-12-24","title": "Weekly Intelligence Summary: 2010-12-24","published": "2010-12-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Berkman Center", "Christmas", "Skype"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Many people were hoping for a nice quiet week leading up to the Christmas holiday.  But “hope is not a method” and it’s been anything but quiet.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "885262e60eb06a9abb408ea728f32d9b","url": "weekly-intelligence-summary-2010-12-31","title": "Weekly Intelligence Summary: 2010-12-31","published": "2011-01-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Russia", "Automotive", "Internet", "Bank of America", "Data Breach", "Internet", "Payments Industry", "New Year's Eve", "New Year", "Honda", "United States", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The domain name records for ChronoPay.com, an online payment processor in Russia, were hijacked to point to a look-alike site where several hundred customers became data breach victims.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a8f2d95af20fa55d2eda2b808ddf2cdc","url": "william-h-murray-editorial-on-wikileaks","title": "William H. Murray editorial on Wikileaks","published": "2011-01-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Secure Email", "Opinion Journalism", "New Year's Eve", "Security", "New Year", "Wikileaks"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Happy New Year all. I know Wikileaks is \"so last year's news,\" but I wanted to point out an Infragard editorial that I enjoyed over the break by our former colleague and current friend, William H. Murray. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3ddebcd8c056e0fe4777d194adc16444","url": "weekly-intelligence-summary-2011-01-07","title": "Weekly Intelligence Summary: 2011-01-07","published": "2011-01-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Fraud", "Zeus", "Sophos", "Adventurer", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s been an ominous start to 2011: Microsoft released a new security advisory for a vulnerability in Windows Graphics Rendering Engine. Of greater concern is a revision to December’s advisory for Internet Explorer to add targeted attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1f83f90d9821452f4f14dd161c387bed","url": "weekly-intelligence-summary-2011-01-14","title": "Weekly Intelligence Summary: 2011-01-14","published": "2011-01-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Renault", "Tucson", "Automotive", "Kenya", "Perth", "Vodafone", "Flood", "NASA", "Space Exploration", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Risks Team tracked a spasm of incidents due to malice or error from insiders and partners this week. NASA, Vodafone, the US’ Transportation Security Administration, Perth Police, University Medical Center (Tucson, Arizona), Bank of Kenya and Renault all popped up on our screens. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1b2be4d389d387587cf6e124c6ccf1f6","url": "partner-agent-clarification-in-the-veris-framework","title": "Partner agent clarification in the VERIS Framework","published": "2011-01-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Since the release of VERIS this past year, we have fielded many questions regarding the classification of incidents that organizations respond to on a daily basis.  Quite a few of these relate to partner threat agents and the nature of their involvement in various circumstances. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a82f4540b2bdaf053bdaf5d5ab31d920","url": "weekly-intelligence-summary-2011-01-21","title": "Weekly Intelligence Summary: 2011-01-21","published": "2011-01-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Intel", "Symantec Corporation", "Panda", "ESET", "Cybercrime", "Sophos", "Christmas", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week in Risk Intelligence was strangely reminiscent of college. Reports were due after coming back from Christmas break, and these all deserve at least a B+ and don’t require registration: Cisco’s Annual Security Report, Sophos’ Security Threat Report 2011,and Panda’s Cyber Crime Black Market. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "087394694e3d8d6069c42757b84d8a6d","url": "trustwave-releases-its-2011-global-security-report","title": "Trustwave releases its 2011 global security report.","published": "2011-01-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Theft", "Financial Services"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This past week, security vendor Trustwave® released their 2011 Global Security Report (registration is required). We’re always pleased when organizations share their data because it gives us an opportunity to compare our data and see the similarities and differences. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "40311ef288bcf2e8b93737c15f71911f","url": "weekly-intelligence-summary-2011-01-28","title": "Weekly Intelligence Summary: 2011-01-28","published": "2011-01-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Mark Zuckerberg", "Facebook Privacy", "Google Plus", "Facebook", "Data Protection"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In spite of several high-profile pwnages this week, the most significant developments in InfoSec risk related to Privacy. The US Government seeks ISP data retention (Ob Disclosure: We are an ISP). But a German study found data retention didn’t help fight crime. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c4928dc095c2d40ea3d731f95b48f797","url": "weekly-intelligence-summary-2011-02-04","title": "Weekly Intelligence Summary: 2011-02-04","published": "2011-02-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Inc.", "Novell, Inc.", "Symantec Corporation", "Google Chrome", "Google Plus", "Data Breach"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We’re all spending too much emotional energy and time worrying about patching because of the latest headline or cries from Henny Pennies. Vulnerability-related developments led the InfoSec risk discussions on our team conference call this week. We routinely review vulnerabilities with a CVSS of 8.0 and greater. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "31497dd280e52ad425fab508f106e668","url": "veris-incident-metrics-at-rsa","title": "VERIS incident metrics at RSA","published": "2011-02-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Hey folks. We understand that everyone out there is busy informing the world what they'll be doing and saying at RSA next week. At the risk of over-committing your to-do list for the show, we'd like to let you know about a few VERIS-related activities. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "416fac0c11a748cb7fb9946fd1ba6c15","url": "weekly-intelligence-summary-2011-02-11","title": "Weekly Intelligence Summary: 2011-02-11","published": "2011-02-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["NASDAQ", "Sleep"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Anecdote: (n) A previously untold secret account of an incident. Axiomatic: (adj) Evident without proof or argument. The vocabulary review is especially useful this week after reports of intrusions at Nasdaq, eHarmony and an unnamed energy company.  Those are three data points.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "999e8b9bffe6abecd45ea29b64052d9d","url": "weekly-intelligence-summary-2011-02-18","title": "Weekly Intelligence Summary: 2011-02-18","published": "2011-02-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Oracle issued a Critical Patch Update for Java this week. Java has become a very popular target for criminals to attack and exploit systems. The Risk Team recommends deploying Java updates with a high priority equal to similar targets like Adobe and browser updates. That’s it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "478822c766c95c3c6fb8a1d0dbeb0d3e","url": "dr-tippett-gives-a-password-prescription","title": "Dr. Tippett gives a password prescription.","published": "2011-02-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b1998856879faa7a0aa9ef2f9ab44e3b","url": "weekly-intelligence-summary-2011-02-25","title": "Weekly Intelligence Summary: 2011-02-25","published": "2011-02-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Dragon", "Mobile Platforms"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">More details emerged this week regarding both “Night Dragon” attacks on energy companies and attacks on Canadian government systems. In neither case does it seem the attacks require revolutionary thinking or new defensive strategies. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d0ddfd475929550c52ddda2651536641","url": "weekly-intelligence-summary-2011-03-04","title": "Weekly Intelligence Summary: 2011-03-04","published": "2011-03-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Plus", "Bank of America", "Vodafone", "America Online", "Commonwealth Bank of Australia", "Electronic Banking", "Banking", "Commonwealth Bank", "United States", "The Americas", "Australian Companies"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The word or the week in risk intelligence was “down.” Forty sites in the Republic of Korea were the target for DDoS attacks. DDoS criminals targeted WordPress.com, host for 25 million blogs including many corporate and media sites. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7318350e18748c504e678a74bc90751b","url": "data-dump-an-old-survey-on-sasser","title": "Data dump: An old survey on Sasser","published": "2011-03-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">You may have picked up on the fact that Verizon's RISK team is quite fond of data. We all spend an enormous amount of our time finding, assessing, collecting, organizing, examining, pondering, preparing, visualizing, and distributing it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "53d3d454173f86117e56a6a68ec9d9c2","url": "weekly-intelligence-summary-2011-03-18","title": "Weekly Intelligence Summary: 2011-03-18","published": "2011-03-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Timber Products"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">RSA notified their customers and the InfoSec community that they had suffered a data breach which they attribute to an Advanced Persistent Threat. What followed was a disturbing volume of SWAG. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0997a7cd966aef97fd488aa5a3da2d2a","url": "weekly-intelligence-summary-2011-03-25","title": "Weekly Intelligence Summary: 2011-03-25","published": "2011-03-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["European Commission", "Dragon", "Cross-site scripting (XSS)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We all constantly make adjustments to what we regard as “normal” in life. In InfoSec, these adjustments are usually subtle, e.g. “there’s a new cross-site scripting vulnerability in foo;” wow, big deal.  Are we experiencing an abrupt shift in “normal” over the first three months of 2011? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b7144a39ceadf78367639194f6a068c9","url": "weekly-intelligence-summary-2011-04-01","title": "Weekly Intelligence Summary: 2011-04-01","published": "2011-04-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Renault", "NASDAQ", "Dragon", "Automotive", "Antivirus", "McAfee, Inc.", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">“Second verse same as the first!” It seems fitting somehow that Peter Noone’s memorable contribution to the British Invasion should come to mind the week ending on April Fool’s Day. “Night Dragon” burned the Australian Prime Minister, cabinet and MPs and Inspector Renault visited Oz just in time for “sources” to conjecture the Chinese did it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "737bf3442fb418612ffdc7454616417e","url": "weekly-intelligence-summary-2011-04-08","title": "Weekly Intelligence Summary: 2011-04-08","published": "2011-04-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Communications", "Architecture", "Fraud", "Cybercrime", "Data Breach", "Silverpop"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There are significant risks to the reputations of all companies involved in a data breach, including breaches of information belonging to the customers of other companies.  Customer communications will almost certainly suffer, to some extent, for an indefinite period. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0201a602c8c6e0bfc052b80821119bed","url": "veris-community-project-update","title": "VERIS Community Project update","published": "2011-04-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Verizon Enterprise Risk and Incident Sharing (VERIS) framework provides a common language for describing security incidents in a structured and repeatable manner. The VERIS community application provides the means by which VERIS-classified incidents can be anonymously reported and shared with others. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c63ef602bb057cc8b8cdd232d2f69dd0","url": "weekly-intelligence-summary-2011-04-15","title": "Weekly Intelligence Summary: 2011-04-15","published": "2011-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Byzantine", "Data Breach", "Wordpress", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Adobe announced new surprise targeted attacks on yet another authplay.dll vulnerability in Flash Player, Acrobat and Adobe Reader; the ninth in 2+ years. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c87d35d644aebb9761677f4c1755f949","url": "weekly-intelligence-summary-2011-04-29","title": "Weekly Intelligence Summary: 2011-04-29","published": "2011-04-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Iran", "Malware", "Google Inc.", "Communications", "Video Games", "Intel", "MSNBC", "Sony", "Google Plus", "Cloud Computing", "Sony Corp Ord", "Cloud Music", "PlayStation Network"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Customer communications was the significant theme in InfoSec risk intelligence this week. The data breach at Sony’s PlayStation Network took the “kick me” signs away from Amazon for their cloud outage and from EMC/RSA for post-breach communications shortcomings. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fcbe23b4583b39f089d0f94b9db55d91","url": "weekly-intelligence-summary-2011-05-06","title": "Weekly Intelligence Summary: 2011-05-06","published": "2011-05-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Microsoft", "Crime & Law", "Organized Crime", "Sony", "Windows Phone", "PlayStation Network", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft will begin rolling out a security update to Windows Phone 7 that will prevent the device from accepting fraudulent digital certificates issued after Comodo had an intrusion. In terms of new InfoSec risk intelligence, that’s just about it for this week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e4b9fddd3ee3a7b8e79728bac99a4332","url": "weekly-intelligence-summary-2011-05-13","title": "Weekly Intelligence Summary: 2011-05-13","published": "2011-05-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Inc.", "Google Chrome", "Google Plus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">“Zebras don’t change their stripes.” K-OTiK, a group of “researchers” known for producing more problems than solutions changed their name about five years ago to FrSIRT and tried to reimage themselves as an incident response team. Almost no one bought it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b94052ca443758e5f87bde05c2611746","url": "2011-dbir-cover-challenge-winners-and-recap","title": "2011 DBIR cover challenge winners and recap","published": "2011-05-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Coffee", "Puzzles", "Maryland", "Oklahoma"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > We would like to congratulate all of the 2011 cover challenge winners!  For those of you who are still working through the puzzle, or have not yet started, spoilers lurk ahead.  The winners are:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "14b92a3d3e20009e78b4b577c81c48d7","url": "weekly-intelligence-summary-2011-05-20","title": "Weekly Intelligence Summary: 2011-05-20","published": "2011-05-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Inc.", "Apps", "Massachusetts Institute of Technology (MIT)", "Google Android Phone", "Android", "ESET", "Mobile Devices", "Google Plus", "Antivirus", "MIT", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Mobile devices were the closest thing we had to a trend or theme this week. ESet tried to calm some of the hand-wringing over a No Threat configuration in Android, and Google is promising to push out a fix. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4929f26d7d7a9de1d310116239e07597","url": "it-s-time-to-consider-mac-antivirus","title": "It's time to consider Mac antivirus.","published": "2011-05-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Malware", "Antivirus", "Computer Software"],"authors": ["KLong"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In 2008, we wrote a three-part series advising against the use of antivirus software on systems running Mac OS X. In those posts, we suggested that the cost of running antivirus software on OS X was often higher than the cost of not running it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1ef23c5dba3707e70e51760a731ce4e1","url": "weekly-intelligence-summary-2011-05-27","title": "Weekly Intelligence Summary:2011-05-27","published": "2011-05-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Thought & Cognition", "Lockheed Martin Corporation", "United Nations", "Pets", "Education (International)", "Data Breach"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Education in one of the hard physical sciences can benefit a risk intelligence analyst later in life by providing structured thinking. This is especially useful when detecting ones own cognitive biases and those of others. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f58e5d65a00ff3fe0bd674542a7bd2a8","url": "an-alternative-open-source-analysis-of-the-lockheed-martin-network-breach","title": "An alternative open source analysis of the Lockheed Martin network breach","published": "2011-06-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Lockheed Martin Corporation"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Tuesday, Jeffrey Carr posted “An Open Source Analysis Of The Lockheed Martin Network Breach.’ Carr literally wrote the book on Cyber Warfare and his analysis is probably spot on. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4235eebf0d121f22344678c5f95a6243","url": "weekly-intelligence-summary-2011-06-03","title": "Weekly Intelligence Summary: 2011-06-03","published": "2011-06-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Iran", "PBS", "Lockheed Martin Corporation", "Northrop Grumman Corp.", "NATO", "Sony", "Google Plus", "International Monetary Fund", "Wikileaks"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">InfoSec news this week was dominated by reports that Lockheed Martin, L3 and Northrop Grumman recently suffered attacks on their SecurID I&amp;A. Wait: Northrop reportedly replaced their SecurID back in March. And neither Lockheed nor L3 have announced SecurID has anything to do with their network activities. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "35e5d03173f44de514ed714cc4cd129c","url": "weekly-intelligence-summary-2011-06-10","title": "Weekly Intelligence Summary: 2011-06-10","published": "2011-06-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Stocks", "Cadence", "Stock Market"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Planning to take a little time off in August? You might want to re-think that decision. In March 2010, Andrew Stroms reported Microsoft had established a big-little cadence for security bulletins. The pattern has continued with the exception of last Aug-Sep-Oct, when we went 15-10-16 with two out-of-cycles. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a4041e460e373842c0b60e099c719b50","url": "weekly-intelligence-summary-2011-06-17","title": "Weekly Intelligence Summary: 2011-06-17","published": "2011-06-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["ADP Employer Services", "Video Games", "U.S. Senate", "Symantec Corporation", "CIA", "Knoxville", "Tennessee", "Japan ", "International Monetary Fund", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Are we having fun yet? Microsoft rolled out sixteen security bulletins. Adobe issued five bulletins including the second Flash Player update in as many weeks in which the vulnerability has already been found in the wild. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1a6f53201089ed1a17ce7bb33f91007d","url": "new-views-into-the-2011-dbir","title": "New views into the 2011 DBIR","published": "2011-06-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Numbers and charts courtesy of Marc Spitler Since publishing the 2011 DBIR back in April, we&rsquo;ve received a lot of questions about the dataset presented in the report. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "946e239a3a1dbbf2ee76545d33adfa07","url": "updated-recommendations-for-rsa-token-users","title": "Updated recommendations for RSA token users","published": "2011-06-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team tries to put events into context consistent with our doctrine of risk being the product of threat, vulnerability, and impact.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "35c85c6efadd82815c821ccd6d2a82ef","url": "weekly-intelligence-summary-2011-07-08","title": "Weekly Intelligence Summary: 2011-07-08","published": "2011-07-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Founding Fathers", "Thomas Jefferson", "San Francisco", "InSecurity", "Futures Market", "Data Breach"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Although it’s not an official activity, several members of the Risk Team are involved with developing security metrics, and those activities were this week’s central theme. We’re looking forward to the next Metricon on 2011-08-06 in San Francisco. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "39ed0105d351f204e94c4e5d43b421ad","url": "weekly-intelligence-summary-2011-8-12","title": "Weekly Intelligence Summary: 2011-8-12","published": "2011-08-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Google Inc.", "Wisconsin", "Symantec Corporation", "Hong Kong", "University of Wisconsin-Milwaukee", "Google Chrome", "Google Plus", "Milwaukee", "Japan ", "Blackberry Inc.", "Stock Exchange", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Hong Kong stock exchange was attacked at least twice this week. The first was probably an intrusion attempt. The second almost certainly was a DDoS attack. Symantec reported a “huge run” of Bredolab-related malware and FireEye reported resurgence in Harnig, a pay-per-install Trojan. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "22c1868d3113e11b515e99c81254c396","url": "weekly-intelligence-summary-2011-08-19","title": "Weekly Intelligence Summary: 2011-08-19","published": "2011-08-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Some weeks the RISK Team’s efforts result in the collection and assessment of a wide variety of new risks. This week however, we collected a variety of problems that are not risks, nor are they likely to become risks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "94941afde946fe74428d9bee082ff964","url": "weekly-intelligence-summary-2011-08-26","title": "Weekly Intelligence Summary: 2011-08-26","published": "2011-08-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Zeus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">“Correlation does not imply causation.” Two or more events may appear to have a temporal or physical connection, but that does not mean they share the same cause until other evidence confirms it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f94dfb8cc630197349c9d26f4deda5c1","url": "weekly-intelligence-summary-2011-09-02","title": "Weekly Intelligence Summary: 2011-09-02","published": "2011-09-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Fraud", "Cybercrime"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Morto who? On Sunday the InfoSec world was all atwitter (I just couldn’t help myself) over the Morto RDP worm. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "36abea1e93ae1dd8cf18813005a111c5","url": "thank-goodness-for-fraud","title": "Thank goodness for fraud","published": "2011-09-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Odd title, I know, but there's an element of truth there. Allow me to explain. If you've read our Data Breach Investigations Report, you'll probably remember that we're not overly encouraging about the ability of organizations to detect and respond to security incidents. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "157dff82700977abc36978af0b606ba9","url": "enterprise-anti-forensics","title": "Enterprise anti-forensics","published": "2011-09-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Malware", "Crime & Law", "Enterprise IT"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s no longer uncommon for forensic investigators to come across remnant evidence of anti-forensic measures taken by criminals during the course of a forensic engagement. The purpose of such measures, obviously, is to keep both the crime and the criminal hidden from detection. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1e16eade85082e18aed5b10c61145bc5","url": "2011-pci-compliance-report-released","title": "2011 PCI Compliance Report released","published": "2011-09-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "PCI Compliance", "Data Breach", "Risk Management", "legal compliance", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">About this time last year, we published the &lt;add link here to first PCI release blog entry&gt; first Verizon PCI Compliance Report &lt;/link&gt; (PCIR).  It’s that time again - you can &lt;add link to download new PCIR&gt; get the new 2011 PCIR here &lt;/link&gt;. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "79b040793f907ccb2deb5718b8c4eb62","url": "weekly-intelligence-summary-2011-09-30","title": "Weekly Intelligence Summary: 2011-09-30","published": "2011-10-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">B+7 (seven days since BEAST was released) and as Airman Dougherty told General Beringer in 1983, “We’re still here!” On reflection, the last SSL/TLS vulnerability that was going to put an end to the Internet, SSL renegotiation, has had almost two years and we’re still waiting for the earth-shattering “KABOOM!” After more than three years, we’re all still waiting for DNS cache poisoning to put us out of business. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fadadd24196d11514e6cf1c56acbe63b","url": "weekly-intelligence-summary-2011-10-07","title": "Weekly Intelligence Summary: 2011-10-07","published": "2011-10-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Google Inc.", "VoIP", "Intel", "Google Chrome", "Google Plus", "Bank of America", "Weather", "Streaming Music", "Outdoor Sports", "Computer & Network Security", "Weird", "Hurricanes", "Cloud Music", "NYSE", "SoundCloud", "United States", "The Americas", "Internet Protocol"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It was a busy week for tracking vulnerabilities. Microsoft pre-announced eight security bulletins for next Tuesday. Cisco released three advisories, all for security infrastructure components. Check Point and SonicWALL responded to vulnerabilities in their respective firewalls. Google updated Chrome. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c05a7f9f4d8940dbb4426f270ef66a53","url": "weekly-intelligence-summary-2011-10-14","title": "Weekly Intelligence Summary: 2011-10-14","published": "2011-10-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Blackberry", "Blackberry Inc.", "Education", "Mobile Phone", "App Store (iOS)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Unplanned work. BlackBerry users, especially in EMEA, certainly didn’t plan on a 3+ day outage, and obviously, neither did Research in Motion. Snarky comments comparing BlackBerry to iPhone 4S are trivial. The InfoSec world was prepared for this week’s Microsoft Tuesday. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "652214c3686ce208528cc9e6ddb2efff","url": "weekly-intelligence-summary-2011-10-21","title": "Weekly Intelligence Summary: 2011-10-21","published": "2011-10-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Winston Churchill", "Zeus", "Information Security", "Security", "Computer & Network Security"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Winston Churchill, acknowledging the heroism of the Royal Air Force in the Battle of Britain, said, “Never in the field of human conflict was so much owed by so many to so few.” Forgive me. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "36b5a6ac388fd81e52979551401bf211","url": "weekly-intelligence-summary-2011-10-28","title": "Weekly Intelligence Summary: 2011-10-28","published": "2011-10-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Cloud Security", "European Commission", "Ptolemy", "Education (International)", "Amazon EC2", "Cloud Computing", "Security", "Amazon Web Services", "Eucalyptus", "Cloud Music", "Mechanics"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">No single word describes risk intelligence this week better than: lame. “Researchers” came out of the woodwork announcing new problems—not solutions to existing problems. Several hundred companies joined RSA as victims,  but not a shred of actionable defensive information was forthcoming. Zilch! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "82f3a775a8266a3664d6a4b2172677dd","url": "weekly-intelligence-summary-2011-11-04","title": "Weekly Intelligence Summary: 2011-11-04","published": "2011-11-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation", "Hungary", "China", "Bangladesh", "InSecurity", "Act-On", "Cryptography", "Computer & Network Security"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We may be entering another bi-polar phase in InfoSec intelligence.  We’ve cycled from last week’s abundance of lame collections to this week’s abundance of useful, but generally not actionable, risk intelligence reports.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "101b359f5caba802829a4017abd12720","url": "weekly-intelligence-summary-2011-11-11","title": "Weekly Intelligence Summary: 2011-11-11","published": "2011-11-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Mitsubishi Group", "Google Inc.", "Crime & Law", "Automotive", "Data Management", "Alabama", "Google Chrome", "Cybercrime", "Sony", "Google Plus", "Mitsubishi Heavy Industries", "Birmingham AL", "University of Alabama", "Data Governance", "Education"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">More than a dozen organizations collaborated to bring about Operation Ghost Click: six arrests and four million bots no longer under criminal control.  Gary Warner at the University of Alabama Birmingham’s posted a very good one-stop summary and he links to other reliable and detailed reports. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0c69a1e74e0c0518eec8e25864d49a6a","url": "quick-response-to-thoughts-on-the-2011-dbir-and-apt","title": "Quick response to \"Thoughts on the 2011 DBIR and APT\"","published": "2011-11-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Over on the New School Security blog [link], Adam Shostack recently wrote an interesting piece [link] on APTŠbut not the kind you¹re thinking of. He was referring to ³Authorization Preservation Threats,² and his subject matter was the 2011 DBIR [link]. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3501f16569b1cffb539cf935d6ae87fa","url": "weekly-intelligence-summary-2011-11-18","title": "Weekly Intelligence Summary: 2011-11-18","published": "2011-11-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Illinois", "Software", "Springfield IL", "Data Centers", "Traffic", "Computer Software", "Lemming"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Wednesday, technical media in the US were busy exercising their jumping to conclusions skills over a bug in Bind DNS software.  Open source intelligence collections reflect about two dozen DNS servers experienced outages due to the bug; no one has reported any malicious traffic. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d41680a96333f42b9bb27a3f287a8f4b","url": "weekly-intelligence-summary-2011-11-25","title": "Weekly Intelligence Summary: 2011-11-25","published": "2011-11-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Illinois", "Springfield IL", "Google Inc.", "App Economy", "Android", "Google Plus", "Data Breach", "U.S. Department of Homeland Security"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In the Republic of Korea, Nexon reported a massive data breach affecting as many as 13 million users in the MMORPG MapleStory. The Department of Homeland Security sent a go-team to Springfield, Illinois and determined every significant piece of last week’s report of SCADA hacking was baseless. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c6730f8a20c25d2f50448d5c27705e4a","url": "weekly-intelligence-summary-2011-12-02","title": "Weekly Intelligence Summary: 2011-12-02","published": "2011-12-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Illinois", "New Jersey", "Sergey Brin", "Terrorism", "Zeus", "Norway", "Larry Ellison", "Antivirus", "Steve Ballmer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">From the same source that informed us that Sergey Brin and Steve Ballmer cooked up a “new and frightening Stuxnet” on Larry Ellison’s barbecue, we now hear about West Milford New Jersey’s  “water plant victim of ‘Terrorism.'”  After the “comedy of errors” at an Illinois water plant, stirred up by Joe Weiss, we had expectations that the irrational hyperbole might be tempered; apparently not. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4dd70856047351b5f00797905048ebd9","url": "weekly-intelligence-summary-2011-12-09","title": "Weekly Intelligence Summary: 2011-12-09","published": "2011-12-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Lockheed Martin Corporation", "Symantec Corporation", "Information Security", "Parkour", "Security", "Extreme Sports", "Computer & Network Security"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Adobe announced a previously unreported vulnerability in Adobe Reader and Acrobat, and acknowledged Lockheed Martin and the Defense Security Information Exchange for reporting it. Mila Parkour and Symantec have additional details on targeted attacks exploiting the vulnerability. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6642a6e511b58a42f469353b4cbf135b","url": "weekly-intelligence-summary-2011-12-16","title": "Weekly Intelligence Summary: 2011-12-16","published": "2011-12-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Video Games", "Symantec Corporation", "Data Breach", "Square Enix"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Adobe released updates for Adobe Acrobat and Reader version 9 for a vulnerability reported last week which was being used for targeted attacks. Enterprises that have not migrated to Adobe Reader X should test and deploy this patch within 30 days.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b0e2f0e3877491e9cf1eb21b52931ca1","url": "announcing-2012-dbir-participants","title": "Announcing 2012 DBIR participants","published": "2011-12-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Culinary Travel", "Security", "New Year", "Christmas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Ah, the week between Christmas and New Year's Day: lots of folks out enjoying \"use or lose\" vacation time, the pace of work a bit slower than normal, significantly fewer emails and other distractions demanding attention. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5aa025afa7f0db8e4d09f974e27d08b6","url": "weekly-intelligence-summary-2011-12-30","title": "Weekly Intelligence Summary: 2011-12-30","published": "2012-01-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["New Year's Eve", "New Year"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft issued an out-of-cycle security bulletin for four vulnerabilities in ASP.NET. Recall that large scale ASP.NET attacks took place recently (using unrelated vulnerabilities). It’s not too great a leap to give Microsoft a “trust me” and roll the bulletin out in 30 days or less.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8d9c361b0d27334dc184f8da51d241cf","url": "weekly-intelligence-summary-2012-01-06","title": "Weekly Intelligence Summary: 2012-01-06","published": "2012-01-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">0.006 Percent. Technical media headlines exploded Thursday night after Seculert blogged that the Ramnit worm had compromised 45,000 Facebook users. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6273d8905fc2a1c6c3a51d5d80d07b19","url": "weekly-intelligence-summary-2012-01-13","title": "Weekly Intelligence Summary: 2012-01-13","published": "2012-01-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Sony Pictures", "Rheumatology", "Immune system", "Sony", "Autoimmune Disease"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Paraphrasing Lenin: the last couple weeks nothing has happened; in all likelihood, we’ll soon pay for them with a week when decades happen. The significant InfoSec risk data point this week was Microsoft Tuesday with seven bulletins and one Adobe bulletin. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7af6ea70acbd7ac1b47ebbdcc5def933","url": "weekly-intelligence-summary-2012-01-20","title": "Weekly Intelligence Summary: 2012-01-20","published": "2012-01-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The period of tedium in risk intelligence ended last week. An already busy week was capped when Digital Bond announced serious, but non-specific vulnerabilities in six control systems. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "bad5884005302ca58a43c316b3a33e0d","url": "considering-vulnerability-disclosure-in-the-realm-of-scada-systems","title": "Considering vulnerability disclosure in the realm of SCADA systems","published": "2012-01-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Every once in a while, a vulnerability disclosure incident occurs that significantly changes the game. Recently, Digital Bond released vulnerability information in conjunction with exploit code packaged in Metasploit for 6 different SCADA system devices. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "dc3138fd015129af97a751b759238127","url": "weekly-intelligence-summary-2012-01-27","title": "Weekly Intelligence Summary: 2012-01-27","published": "2012-01-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Skepticism", "Intel", "Symantec Corporation", "Anonymous (group)", "Data Protection", "Personal Computer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In terms of risk to Verizon Security customers, the most significant developments this week revolve around governance issues in Europe. Data protection, privacy and anti-piracy laws, regulations and agreements are in flux and regardless of the final outcomes, the changes themselves are costly. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a8481718fbc5e6bacd247ab6362fa240","url": "weekly-intelligence-summary-2012-02-03","title": "Weekly Intelligence Summary: 2012-02-03","published": "2012-02-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Intel", "Fraud", "Cybercrime", "Domain Name System (DNS)", "VeriSign"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Best InfoSec risk intel this week: please read Imperva's Business Logic Attack report. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "792485df6f3528a95e119cd340ac8c44","url": "weekly-intelligence-summary-2012-02-10","title": "Weekly Intelligence Summary: 2012-02-10","published": "2012-02-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Google Inc.", "Microsoft", "Symantec Corporation", "Android", "Zeus", "Google Plus", "Microsoft Office"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A Zeus variant some AV's call \"Citadel\" has received considerable attention recently, but we know that malware criminals are almost constantly modifying their wares to avoid detection and to add features. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "079bb9fee3f2df57c7b6d1efd67d81f2","url": "weekly-intelligence-summary-2012-02-17","title": "Weekly Intelligence Summary: 2012-02-17","published": "2012-02-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Intel", "Russia", "Electronic Medical Records", "Stock Exchange", "Electronic Health Records"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Updates, attack reports and superb intel reports galore this week: Microsoft, Adobe, Adobe again, Mozilla, Chrome, Java and Real Player. DoS attacks caused intermittent connectivity on at least five stock exchange web sites without interrupting trading.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6e9a5b033faadb44e1bcaf06254d7b1f","url": "weekly-intelligence-summary-2012-02-24","title": "Weekly Intelligence Summary: 2012-02-24","published": "2012-02-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hacking", "Data Breach", "Social Media", "Anonymous (group)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Your iron(y) for the week:  Anonymous, without hacking or DoSing, hijacked the Wall Street Journal's Facebook page Tuesday to express their criticism of a WSJ article on the power of Anonymous.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2592a205f139ef2148ac2527c9f7288e","url": "a-look-back-on-2011-from-the-verizon-risk-team","title": "A look back on 2011 from the Verizon RISK team","published": "2012-02-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We're going to try something new.  As you may or may not know, it takes us quite a bit of time to put together our annual Data Breach Investigations Report (DBIR). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "94a64685fc30d647d57c9a002a04ca6b","url": "weekly-intelligence-summary-2012-03-02","title": "Weekly Intelligence Summary: 2012-03-02","published": "2012-03-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "Infographics", "InSecurity", "Vatican City", "Ratio", "Black Hole", "Cybercrime", "Julian Assange ", "Wikileaks"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week, Imperva succeeded in improving the risk intelligence signal-to-noise ratio. Worth reading: Imperva's report on an Anonymous attack on the Vatican's web site that was highlighted in the New York Times. Their infographic for the attack is here. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "27dbda8fb32f03e642ce306dfb08b280","url": "breaking-down-the-wall-of-words-or-at-least-hanging-some-pictures-on-it","title": "Breaking down the wall of words (or at least hanging some pictures on it)","published": "2012-03-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Modeling", "San Francisco", "Risk Management", "Pilgrimage"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This past week, several RISK Team members descended upon the lovely city of San Francisco for the annual RSA/Mini-Metricon/B-Sides pilgrimage. On Monday, we did a quick lightening talk at Mini-Metricon on some of the things we've been doing lately with respect to attack modeling and analysis. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c821aaf49d053b7a7aa3aa727ea57123","url": "weekly-intelligence-summary-2012-03-09","title": "Weekly Intelligence Summary: 2012-03-09","published": "2012-03-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Matthew Broderick", "Library", "Linode", "Panda", "Cybercrime", "Chicago", "Security", "Computer & Network Security", "Library of Congress"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At the very end of the credits for the film \"Ferris Bueler's Day Off\", Matthew Broderick's character, a Chicago native, shoo's the audience home.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2e18e39b9f2699a8a55d99b6e1ff9a7c","url": "weekly-intelligence-summary-2012-03-16","title": "Weekly Intelligence Summary: 2012-03-16","published": "2012-03-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Denver", "Lockheed Martin Corporation", "China", "Bae Systems", "Northrop Grumman Corp.", "Telephone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Cyber warfare was the dominant theme in risk intelligence this week.  The BBC reported a denial of service attack on both Internet and telephone systems with indications of Iranian involvement. Alienvault reported targeted attacks on Tibetan dissidents. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "abaaba32367290a47782bc3a7156f4e7","url": "2012-data-breach-investigation-s-report-released","title": "2012 Data Breach Investigation's Report released","published": "2012-03-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Information Security", "Police", "Security", "Computer & Network Security", "London"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It's hard to believe, but it's time again for another installment of Verizon's annual Data Breach Investigations Report. This year's report represents our largest dataset ever, with 855 confirmed security breaches accounting for a combined 174 million compromised records. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "236dfbceeb0e3b765a2d582c046d5c43","url": "weekly-intelligence-summary-2012-03-23","title": "Weekly Intelligence Summary: 2012-03-23","published": "2012-03-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "University of Tampa", "Student Finances", "Data Breach", "Flowers", "Tampa Bay", "Tampa, FL", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s that time of year again. Spring is upon us, flowers are budding, and The RISK Team and Verizon have released the 2012 Data Breach Investigations Report. Be sure to add it to your reading list. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ef5e4dcbf93bd7aaebba8cc469c94535","url": "weekly-intelligence-summary-2012-03-30","title": "Weekly Intelligence Summary: 2012-03-30","published": "2012-03-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Blackout", "Intel", "Chief Financial Officer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">\"Keep Calm and Carry On\" was a classic propaganda poster in the UK during the Second World War. InfoSec professionals: consider dusting it off and posting it in your office because intel collections this week paint a dire picture. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1b38780015198d8745a2ed9325ec8414","url": "weekly-intelligence-summary-2012-04-06","title": "Weekly Intelligence Summary: 2012-04-06","published": "2012-04-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "Mountain Lion OS", "Russia", "China"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The reported breach of 1.5 million credit card records from payment processor Global Payments leads this week's OSINT. Adobe pre-announced security advisories for Acrobat and Adobe Reader, and their new priority ratings indicate Reader and Acrobat version 9 on Windows is already under attack. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "109e45fca2df25c7025266b01f5eef3a","url": "weekly-intelligence-report-2012-04-13","title": "Weekly Intelligence Report: 2012-04-13","published": "2012-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Google Inc.", "Linux", "Linus Torvalds", "Google Plus", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Vulnerabilities and patches dominated the InfoSec environment this week. Microsoft, Adobe, and Cisco all released major security bulletins. Google released another update to Chrome. Over the last couple weeks, patches have been released for almost every Mac and Windows computer on earth. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "699044190ae6d9a0c1dfa05c88d918ee","url": "weekly-intelligence-summary-2012-04-20","title": "Weekly Intelligence Summary: 2012-04-20","published": "2012-04-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Malware", "Mountain Lion OS", "Pets", "Hacking", "California", "Antivirus", "Chinese", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">An Iranian engineer threw a tantrum and dumped the credit card information of 3 million of his countrymen and women on his blog and fled the country. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2a1b55c4b90f2beadc492889c7e49afe","url": "weekly-intelligence-summary-2012-04-27","title": "Weekly Intelligence Summary: 2012-04-27","published": "2012-04-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Iran", "Malware", "Automotive", "South China Sea", "China", "Hacker", "North America", "United States", "Chinese", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Required reading: Microsoft Security Intelligence Report 12 for the last half of 2011.  The SIR is second to none as an InfoSec intell source and has few equals. The Microsoft Security Blog has begun running weekly summaries most of our readers should find useful. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "26251d56ebc8b94967e686b1f1b49e23","url": "ask-the-data-a-new-series","title": "Ask the data: A new series","published": "2012-05-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "New Year's Eve", "New Year"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Every once in a while we get questions that go above and beyond the information provided in our data breach investigations report.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8bec72b2e5a5a113c12339a3c8071cba","url": "ask-the-data-log-analysis","title": "Ask the data: Log analysis","published": "2012-05-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Hello World. I’m Jay Jacobs and I joined the Verizon RISK Intelligence team in January of this year.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3a08829bd4005597ee148114195e54db","url": "weekly-intelligence-summary-2012-05-04","title": "Weekly Intelligence Summary: 2012-05-04","published": "2012-05-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["TNS", "Malware", "Google Inc.", "OpenX", "Symantec Corporation", "Android", "Google Chrome", "Google Plus", "Computer & Network Security", "Weird"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">InfoSec risk was substantially unchanged this week.  Intell collections generally fell under the categories of \"more of the same,\" or \"vulnerability without a problem.\" Ransomware, drive-by-downloads of known Trojans, and Android malware reports were simultaneously new and not new. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2703e5d2a4b6dbf6f3ca1c197005930a","url": "weekly-intelligence-summary-2012-05-11","title": "Weekly Intelligence Summary: 2012-05-11","published": "2012-05-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Illinois", "Springfield IL", "CGI", "CGI Group Inc.", "U.S. Department of Homeland Security"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Apple, Adobe, and Microsoft dominated InfoSec headlines this week by releasing multiple security updates to patch dozens of vulnerabilities. Microsoft led the pack with 7 bulletins for 23 vulnerabilities. Last week’s Adobe Flash Player vulnerability continues to be exploited in targeted attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "96845fa0750c914b44e3846f27b79154","url": "ask-the-data-justification-for-screen-timeouts","title": "Ask the data: Justification for screen timeouts?","published": "2012-05-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Question: Do you happen to have any metrics on internal breaches caused by employees not locking their screens, or failure to implement an idle/inactivity screen saver lock? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0c7f2adb0a158a3f0c8759b4d7b5d323","url": "weekly-intelligence-summary-2012-05-18","title": "Weekly Intelligence Summary: 2012-05-18","published": "2012-05-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bernard Madoff", "United Nations", "Activist", "Facebook IPO", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">I don't think anyone on the RISK Team is lining up today to get in on Facebook's IPO. Although Facebook probably provided the most interesting InfoSec risk development this week with their new \"LilyJade\" worm. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7a988eb9c55ae48d589814153b0ae326","url": "weekly-intelligence-summary-2012-05-25","title": "Weekly Intelligence Summary: 2012-05-25","published": "2012-05-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["U.S. Department of Justice", "Malware", "Google Inc.", "Intel", "Android", "NATO", "Google Plus", "Chicago", "Data Centers", "Anonymous (group)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week’s intel in the InfoSec space can be summed up with a simple phrase: more of the same. Anonymous hacked the U.S. Department of Justice’s Bureau of Justice Statistics and stole 1.7 GB of data, most of which were crime statistics. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b1e4481792991ffdc4bc5400651b01cf","url": "weekly-intelligence-summary-2012-06-01","title": "Weekly Intelligence Summary: 2012-06-01","published": "2012-06-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 16,"age": 6,"rank": 16, "topics": ["U.S. Congress", "Employment", "Jobs (profession)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If W32/Flamer really was the product of the US government, Congress would have named it: \"The Full Employment of Tech Journalists and Pundits Act of 2012, and 2013\". FETJPA? Flame is another example of the discovery of an unknown-unknown. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c72af2ef98683308cce5045a9b9a1191","url": "ask-the-data-threat-actions","title": "Ask the data: Threat actions","published": "2012-06-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Sometimes we can learn new things from the data by answering a question we’ve already asked in a different way. That’s what we’re doing with this installment: we’re re-asking about the difference in threat actions between large and small organizations. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "092f130de1aeb9662f7d32c4ab87d1d0","url": "weekly-intelligence-summary-2012-06-08","title": "Weekly Intelligence Summary: 2012-06-08","published": "2012-06-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "LinkedIn Corporation", "Malware", "Data Breach", "Streaming Music"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It has been an unusually tough week for leaked passwords. LinkedIn, eHarmony, and Last.fm all reported data breaches with users’ passwords being posted online. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8e55612cfee281da0b700f6e18acb16e","url": "weekly-intelligence-summary-2012-06-15","title": "Weekly Intelligence Summary: 2012-06-15","published": "2012-06-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mountain Lion OS"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">InfoSec professionals who are also partial to country-western classics were probably caught humming Dickie Lee's \"Patches\" this week as we're managing more than a dozen patch and vulnerability announcements.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "16de7f7c93b16e878d468c6854cbacc5","url": "weekly-intelligence-summary-2012-06-22","title": "Weekly Intelligence Summary: 2012-06-22","published": "2012-06-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Myanmar", "Myanmar Conflict", "Hacking", "Burma", "Bangladesh", "Hacker", "Sophos", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Last week’s vulnerability headlines became this week’s exploit headlines. Reports of state-sponsored attacks against Microsoft’s unpatched XML Core Services vulnerability continued this week as Sophos blogged about two compromised European websites serving up exploits. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e70af55bdf284b59f9ce3262edf6b474","url": "six-weeks-and-60-000-passwords-later","title": "Six weeks and 60,000 passwords later","published": "2012-06-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There were quite a few statistics that jumped out at me in this year’s data breach report, however one of them stuck in my head: 79% of all attacks were classified as “opportunistic”. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5eab216922347d9f2625576b0cda6da4","url": "weekly-intelligence-summary-2012-06-29","title": "Weekly Intelligence Summary: 2012-06-29","published": "2012-07-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Russia", "Zeus", "Cybercrime", "Identity Theft", "International Security", "Antivirus", "Power Grid", "Computer & Network Security", "Smart Grids", "McAfee, Inc.", "Security Technology"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">McAfee hit the exacta in risk intelligence this week with two reports:  the first half of their \"Technology Security Assessment for Capabilities and Applicability in Energy Sector Industrial Control Systems\" report captures security issues in the power grid including smart grid technologies.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "983f32d82605669b6cca311b609718e9","url": "weekly-intelligence-summary-2012-07-06","title": "Weekly Intelligence Summary: 2012-07-06","published": "2012-07-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Black Hole", "United States", "Chinese", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The United States celebrated Independence Day on Wednesday but some of the fireworks continued Thursday as Microsoft pre-announced 9 bulletins patching 16 vulnerabilities. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7c7dda86228bee9200716d4c7d55b8a6","url": "ssh-passwords-by-source","title": "SSH passwords by source","published": "2012-07-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Sexually transmitted disease", "Sexual Health", "Composition", "Visualization"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The last post I did was on SSH passwords from a honeypot and their character composition. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "95695aafa794d7be3ec3589c473b8bd7","url": "weekly-intelligence-summary-2012-07-13","title": "Weekly Intelligence Summary: 2012-07-13","published": "2012-07-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Yahoo", "Cybercrime", "NVIDIA", "Keith B. Alexander"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At least two million passwords are overdue to be reset following this week's reported breaches including Yahoo!, Nvidia and Formspring with more than 400,000 each. Phandroid reported a million user ID's were at risk.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c489fc3b06cdb1d4e04cf53ea6d99e88","url": "ask-the-data-do-“hacktivists”-do-it-differently","title": "Ask the data: Do “hacktivists” do it differently?","published": "2012-07-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Readers of the 2012 DBIR may remember that the report featured quite a bit of discussion around breaches attributed to various “hacktivist” groups (not using quotes from here on out, but add them in your mind as you read). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b9cef733874eb1af8b8a289960fc625a","url": "passwords-attackers-vs-users","title": "Passwords: Attackers vs. Users","published": "2012-07-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Yahoo"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A few weeks ago, I wrote up some analysis on characters sets used in 60,000 passwords, which were collected in an SSH honeypot. This data set represents the passwords that the attackers are trying to brute force (SSH) with.  With the recent breach of the Yahoo! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7d7c5e1cf7c6333a26452f4375c38a9b","url": "weekly-intelligence-summary-2012-07-20","title": "Weekly Intelligence Summary: 2012-07-20","published": "2012-07-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Occupy Movement", "Latin America", "Employment", "Jobs (profession)", "Wall Street", "Middle East", "Good News", "Anonymous (group)", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Good news or bad news first? Let's lead with the good: The world’s third-largest botnet was taken down this week and the infamous Dave and Buster’s hacker who stole details on 240,000 credit cards will sit behind bars for 7 years. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1adca73bc1e9219dc860a68095d4c50c","url": "veris-and-the-cloudflare-hack","title": "VERIS and the CloudFlare hack","published": "2012-07-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cloud Security", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">One of our tasks here with the Verizon RISK Team is taking case reports regarding security incidents from various sources and extracting metadata so that we can publish the wonderful statistics in the Data Breach Investigations Report. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2976e674c880c8f39be7024e20e9829d","url": "weekly-intsum-lead-paragraph-2012-07-27","title": "Weekly INTSUM Lead Paragraph: 2012-07-27","published": "2012-07-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Hotels", "Data Breach", "Antivirus", "Anonymous (group)", "Las Vegas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Black Hat and DEFCON are upon us dominating the InfoSec headlines. Reverse-engineering irises to thwart biometric scanners, exploiting NFC to infect phones with malware and hacking hotel room keycard readers are just a fraction of the monsters in the closet coming from Las Vegas this week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "633c9b9216275fede39b994c4352aa32","url": "announcing-veriscommunity-net","title": "Announcing veriscommunity.net","published": "2012-08-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "Verizon Communications Inc.", "Enterprise Risk Management", "Civil Rights Law", "Risk Management"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We have three announcements to make concerning VERIS. The first announcement is easy and more of an amendment than something new; we’re redefining the VERIS acronym. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3d1e67f2160d7000b66ae133df3c47d1","url": "ask-the-data-spotlight-on-small-businesses","title": "Ask the data: Spotlight on small businesses","published": "2012-08-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation", "New Year's Eve", "New Year"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Bryan Krebs released a post last week talking about the “Uptick in Cyber Attacks on Small Businesses” and cites Symantec’s June Intelligence report.  Both do a great job covering the topic and  their work is further supported by the data we’ve collected over the past few years.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ff2ecf8d058e7ec2a45f1da27acd5296","url": "weekly-intelligence-summary-2012-08-03","title": "Weekly Intelligence Summary: 2012-08-03","published": "2012-08-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Iran", "Blackout", "Theft"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If it sounds too good to be true...Last week's Iranian nuke plants infected with virus that plays AC/DC should have set off the olfactory alarms, but it was so conveniently cool to buy into it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e80f9fe89ed0a1cb28ffc6faf81d45ab","url": "verisizing-the-black-hat-email-incident","title": "VERISizing the Black Hat email incident","published": "2012-08-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Fraud", "Cybercrime", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Now that the excitement of Black Hat has passed, we thought it was time for another blog post on how to categorize a security incident using VERIS. You probably saw some of the coverage of the suspicious email message that was sent to people registered for Black Hat. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "381562d06f8f1ec74ca47c7a42035851","url": "weekly-intelligence-summary-2012-08-10","title": "Weekly Intelligence Summary: 2012-08-10","published": "2012-08-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Verizon Communications Inc.", "Malware", "Bacteria & Viruses", "Hacking", "Lebanon", "Nuclear Energy", "Renewable Energy", "Antivirus", "Middle East", "Anonymous (group)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Fool me once, shame on you. Fool me twice... Kaspersky Labs discovered the Gauss malware campaign affecting countries across the Middle East with the majority of infections centered in Lebanon. \"State-sponsored\" started trending worldwide.  Gauss phones-home to its command and control servers using xOR encryption.  The key? 0xACDC.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "912ce022a7292decb24fccf013b3ab55","url": "weekly-intelligence-summary-2012-08-17","title": "Weekly Intelligence Summary: 2012-08-17","published": "2012-08-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["London 2012 Olympics", "Olympics", "Intel", "Symantec Corporation", "Cyber Security", "InSecurity", "Cybercrime", "Google Plus", "Security", "Antivirus", "McAfee, Inc.", "London"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">\"London Takes Gold in Cybersecurity\" in Core Security's blog, Mark Hatton sticks the landing. We hyper-focus on failures and weaknesses and seldom pause to celebrate our successes and strengths. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f249dee48d93f61e0741c13345296361","url": "weekly-intelligence-summary-2012-08-24","title": "Weekly Intelligence Summary: 2012-08-24","published": "2012-08-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Travel", "Malware", "Latin America", "Hacking", "Ecuador", "Hacker", "Julian Assange ", "Anonymous (group)", "The Americas", "Philips"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">What does 32kb of data get you these days (that’s right 32 KILOBYTES)? A place atop this week’s InfoSec headlines. Newly formed hacking crew r00tbersec breached AMD’s blog site and stole 32kb of usernames and hashed passwords. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "69af2579a15dfa3fbba2523792c50dd0","url": "ask-the-data-on-opportunistic-attacks-part-1","title": "Ask the data: On opportunistic attacks, part 1","published": "2012-08-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This post will be the first of three on this data set.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "96d33a79821d46a8f3df1bf597fe7090","url": "insider-partner-or-external-verisizing-toyota","title": "Insider, partner or external? VERISizing Toyota","published": "2012-08-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Toyota", "Automotive"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">When we consider publicly disclosed incidents that we can model for the blog using VERIS (a process we call VERISizing), we look for completeness of the information available, uniqueness of the case, and whether or not there are any interesting discussions that we can have about the VERIS classifications.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "53508af9fbd884a2a0d29b769d0dcfba","url": "ask-the-data-on-opportunistic-attacks-part-2","title": "Ask the data: On opportunistic attacks, part 2","published": "2012-09-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Frequency"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This post is the second of three on this data set.  “On Opportunistic Attacks, Part 1” talks broadly about where opportunistic attacks begin: Where are we seeing attempted connections and where are they coming from?  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "460e346b9e1c43369da252dec25b09d8","url": "weekly-intelligence-summary-2012-08-31","title": "Weekly Intelligence Summary: 2012-08-31","published": "2012-09-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Mountain Lion OS"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Give Oracle an \"attaboy\" for their speedy reaction and patch issue for three newly publicized vulnerabilities in Java, one of which is already being used in targeted attacks. If only they hadn't been reported to Oracle in April. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7f4d9da917c9aa61045501bf26d00670","url": "concepts-in-sharing-threat-intelligence","title": "Concepts in sharing threat intelligence","published": "2012-09-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Elephant"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">An ancient parable tells of blind men who try to describe an elephant. The first man feels the elephant’s tusk and declares that an elephant is long, smooth, and sharp. The second feels the ear and declares that it is broad, soft, and flexible. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7caf82ef8ce38a10e04fa3abe15ddd55","url": "weekly-intelligence-summary-2012-09-07","title": "Weekly Intelligence Summary: 2012-09-07","published": "2012-09-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Skepticism", "2012 Presidential Election", "Taxes", "Mitt Romney"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This was a week when our skepticism resupply deliveries used dump trucks like these.  AntiSec says they stole 12 million records, published 1 million Apple iOS UDID's, said they're from the FBI, and we should believe them why?  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "71b5305ee9682095f330890eb920f290","url": "ask-the-data-on-opportunistic-attacks-part-3","title": "Ask the data: On opportunistic attacks, part 3","published": "2012-09-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> This post is the third and final post on this data set.&nbsp; &ldquo;On Opportunistic Attacks, Part 1&rdquo; talked broadly about where opportunistic attacks begin: where are we seeing attempted connections and where are they coming from?&nbsp; The second post, &ldquo;On Opportunistic Attacks, Part 2&rdquo; looked at the typical attack pattern: are we seeing patterns in the scans of hosts or a &ldquo;light touch&rdquo; of isolated checks?&nbsp; Finally, this post will attempt to understand timing: How long can a host or service be on the Internet before it experiences the beginning of an opportunistic attack? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5dec66ae0ef3bdf5d56e2b981e84f643","url": "initech-insiders-malware-and-staplers","title": "Initech: Insiders, malware and staplers","published": "2012-09-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Malware", "Computer Software", "Software development"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Today we’re going to dip into the archives and VERISize a well-known case: the Initech incident of 1999 from the movie “Office Space.”  A few people had asked me to VERISize the Blue Toad hack, but there just isn’t enough information in the public domain to do it well.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "93313ea449213e9ff876b87e69a2a2f7","url": "weekly-intelligence-summary-lead-paragraph-2012-09-21","title": "Weekly Intelligence Summary Lead Paragraph: 2012-09-21","published": "2012-09-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation", "Innocence of Muslims", "Bank of America", "YouTube", "Online Video", "Stock Exchange", "United States", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s déjà vu all over again. There’s another previously undiscovered vulnerability being actively exploited in the wild and this time it belongs to Internet Explorer. Microsoft released a Security Advisory and issued an out-of-cycle bulletin on Friday 21 September to address the flaw. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d37f2092bbc221a78450f06870c7cd78","url": "weekly-intelligence-lead-paragraph-2012-09-28","title": "Weekly Intelligence Lead Paragraph: 2012-09-28","published": "2012-09-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Financial Services", "Personal Computer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Hmmm...which was the more important risk intelligence collection this week?  Continued denial of service attacks on US financial services companies or Adobe's announcement of a pwned code-signing system?  /flip=Tails. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9649a242dc6baa723e314bbd2ae46df6","url": "weekly-intelligence-lead-paragraph-2012-10-05","title": "Weekly Intelligence Lead Paragraph: 2012-10-05","published": "2012-10-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Lawsuit", "White House", "InSecurity", "Cybercrime", "Federal Trade Commission", "Scams", "United States", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Every week there seems to be winners and losers in the security space. This week’s big winner is the U.S. Federal Trade Commission. Not only did it crack a global tech support scam, it also won a 163 million dollar lawsuit against a scareware ring. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "86c80d3a04327a2b13ca49e6d62cc42d","url": "weekly-intelligence-summary-lead-paragraph-2012-10-12","title": "Weekly Intelligence Summary Lead Paragraph: 2012-10-12","published": "2012-10-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["U.S. House of Representatives", "Colin Powell", "Financial Institutions", "Capital One Financial Corporation", "SunTrust Banks, Inc.", "Chinese", "Political Risk"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Fundamentally, intelligence supports a decision maker by providing factual information.  Colin Powell sucinctly captured the challenge of decision making based on partial information.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "83798e6cc662a60e05595922046e33d4","url": "over-the-rainbow-and-through-should-could-woulds-to-the-echo-chamber-we-go","title": "Over the rainbow and through should/could/woulds, to the Echo Chamber we go.","published": "2012-10-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Risk Management", "Rainbow"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > I just read a very curious blog post from titled “Somewhere Over The Rainbow – A Story About A Global Ubiquitous Record of All Things Incident”. Thanks to Jelle Niemantsverdriet (@jelle_n) for calling my attention to it.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "612613f5c557594c3f332061809ef3ee","url": "ask-the-data-more-on-opportunistic-attacks","title": "Ask the data: More on opportunistic attacks","published": "2012-10-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Visualization"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> I couldn&rsquo;t just let this go.&nbsp; Even though I just finished up a three-part blog series looking at opportunistic attackers (part 1, part 2 and part 3), there was one more perspective that I thought was missing.&nbsp; The notion of time is interesting in this data and I tried to get at that in my last visualization where I plotted the range of time a service could be on the Internet before it was discovered.&nbsp; However, it felt like the analysis was missing a &ldquo;yeah but show me!&rdquo; angle so I wanted to communicate incoming opportunistic packets with this notion of time. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ed984b3190f7067c3699b91790dd39ef","url": "weekly-intelligence-summary-lead-paragraph-2012-10-19","title": "Weekly Intelligence Summary Lead Paragraph: 2012-10-19","published": "2012-10-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Russia", "Education (International)", "Cybercrime", "Wordpress", "San Jose"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Brian Krebs, who has exposed several Russian cyber criminals and Internet cesspools may have finally put himself in serious jeopardy with his recent article in which he dares to assert some smart people working in the education and private sectors are more effective at combating cyber crime than assembled choruses of baby-kissers.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c222bcdf66a4a3964f6d6b1c85379875","url": "verizon-risk-team-releases-industry-specific-dbir-snapshots","title": "Verizon RISK team releases industry-specific DBIR snapshots","published": "2012-10-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Security and Investigations"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In the past, we have, from time to time, released supplemental reports based on the data from our annual Data Breach Investigations Report (DBIR) to shed light on some particular area of interest to our readers. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "11c7b948ecb82af009aed64ec7a65230","url": "ask-the-data-do-bots-discriminate-on-income","title": "Ask the data: Do bots discriminate on income?","published": "2012-10-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Civil Rights Law", "Visualization", "Latitude and longitude"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > I’ve been having fun working with Bob Rudis on some data released by F-Secure last month and I want to start by thanking F-Secure for releasing their data and also thanks goes to Bob for working with me on this data.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0843fd4206925b80cd7fd15d52640d51","url": "weekly-intelligence-summary-lead-paragraph-2010-10-26","title": "Weekly Intelligence Summary Lead Paragraph: 2010-10-26","published": "2012-10-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Financial Institutions", "Aldi", "Barnes & Noble, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">What do Michaels, Aldi, and Barnes &amp; Noble have in common? They’ve all suffered data breaches as a result of compromised point-of-sale terminals. Barnes &amp; Noble this week announced malware designed to swipe payment information had been installed on card readers in 63 of its stores. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7c9ef00149cec50a76746d59b044a90e","url": "hurricane-sandy-serves-as-lure-to-deliver-sykipot","title": "Hurricane Sandy serves as lure to deliver Sykipot","published": "2012-10-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Frankenstorm", "Fraud", "Cybercrime", "Weather", "Hurricane Sandy", "Hurricanes", "2012 Hurricanes", "Weather Impact"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As others have stated, natural disasters often serve as timely and effective topics for both opportunistic and targeted attacks. We recently discovered a new link delivering a Sykipot variant in a file called Disaster_Relief_Info.ZIP, which contains Disaster_Relief_Info.scr. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6e507c8ed8a854264d60485f71e0ac32","url": "everyday-i-m-ciffling","title": "Everyday I'm CIFfling","published": "2012-11-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Indiana", "National Science Foundation", "Indiana University", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > So as we’ve talked about before, preventive controls by themselves do not provide sufficient defense in today’s threat environment. Instead, defenders must continually adapt to their adversaries, and this includes sharing threat intelligence with trusted partners.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "81e200b60f715217f829f23b4d7c3fd9","url": "weekly-intelligence-summary-lead-paragraph-2012-11-02","title": "Weekly Intelligence Summary Lead Paragraph: 2012-11-02","published": "2012-11-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["South Carolina", "Georgia", "Computer Emergency Response Team", "Frankenstorm", "Georgia (country)", "Nevada", "Russia", "Data Breach", "California", "General Electric", "2012 Hurricanes", "Education", "Weather Impact"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Hurricane Sandy and the data breach at the South Carolina Department of Revenue dominated the risk intelligence collections this week. Trend Micro released a very good report on the Russian Underground. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3c08a74b2c6619572d8ccb0c7a6b464e","url": "freeing-tactical-intelligence-from-pdfs-with-iocextractor","title": "Freeing tactical intelligence from PDFs with IOCextractor","published": "2012-11-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "International Olympic Committee"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Stephen Brannon An indicator of compromise (IOC) is one of the basic units of information sharing in tactical intelligence. Simple examples are IP addresses of known command-and-control servers and MD5 hashes of know malware. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fb6ecee2258d039b308bde2bad28248b","url": "weekly-intelligence-summary-lead-paragraph-2012-11-09","title": "Weekly Intelligence Summary Lead Paragraph: 2012-11-09","published": "2012-11-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "China Corporate Acquisitions", "Symantec Corporation", "Russia", "Mergers and Acquisitions", "China", "Russia Corporate Acquisitions", "UNESCO", "Anonymous (group)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The 5th of November has come and gone. Is there anything for us to remember? The answer is yes if you’re Imageshack, Symantec, ZPanel and NBC. Hacktivists with affinity to Anonymous carried out attacks against those organizations and others as part of OpJubilee’s commemoration of Guy Fawkes Day. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6fa12e6ca126ea684f58f0c2f6487157","url": "dangerous-thinking-on-complexity-and-breaches","title": "Dangerous thinking on complexity and breaches","published": "2012-11-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "InSecurity", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > We recently read with interest a report from AlgoSec entitled “Examining the Dangers of Complexity in Network Security Environments. This report analyzed survey data “to study the impact of complexity in network security environments”.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5017c8dfea0d1f6a00e9b2af8eaf31e3","url": "gluing-our-stuff-together","title": "Gluing our stuff together","published": "2012-11-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Recently, Kyle Maxwell blogged about how we use the Collective Intelligence Framework (CIF) to collect indicators of compromise (IOCs) that come from feeds on the Internet.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "836a1a3d699129cf7340bfa494b2cc4c","url": "weekly-intelligence-summary-lead-paragraph-2012-11-16","title": "Weekly Intelligence Summary Lead Paragraph: 2012-11-16","published": "2012-11-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Blitzkrieg", "Intel", "Black Hole", "PayPal"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Regretably, there was no significant new risk intelligence this week.  We collected several new instances of old problems that remain unsolved. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "346e24f5a43ac9f651584fc567bb9b7b","url": "recent-improvements-to-cifglue","title": "Recent improvements to CIFGlue","published": "2012-11-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Two weeks ago I introduced the CIFGlue tool that we developed to easily add indicators to CIF using a browser interface.  CIFGlue takes indicators that are found in various sources and presents them as a structured feed which CIF can ingest.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f33416b391d07d1bf296f0e20f720f61","url": "weekly-intelligence-summary-lead-paragraph-2012-11-30","title": "Weekly Intelligence Summary Lead Paragraph: 2012-11-30","published": "2012-12-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "International Atomic Energy Agency", "International Affairs", "Personal Data Security", "Foreign Affairs", "United Nations", "Fraud", "Romania ", "Go Daddy Group", "Cybercrime", "Pakistan", "Web Hosting", "Renewable Energy", "Antivirus", "Anonymous (group)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">DNS hijacking was all the rage this week as evidenced in incidents from Pakistan and Romania. Visitors to a number of sites in both countries were redirected to pages set-up by the hactivists to take responsibility for the hijackings. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d69d4c740d63c4db8db03d12f051ca42","url": "cif-looking-under-the-hood","title": "CIF: Looking under the hood","published": "2012-12-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Database Design", "FriendFeed"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Nathan Buesgens CIF is a framework for exchanging intelligence about many of the most important indicators of compromise. We have written about CIF on this blog previously because CIF has a lot going for it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2456279aab38342b12e93ad261b3c74e","url": "weekly-intelligence-summary-lead-paragraph-2012-12-07","title": "Weekly Intelligence Summary Lead Paragraph: 2012-12-07","published": "2012-12-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Japanese", "Malware", "Android", "Theft", "Personal Finance", "Zeus", "Blackberry Inc.", "Personal Computer", "Symbian"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Intelligence collections this week captured some big numbers, but fortunately no big risks.  Probably the most risk-significant report this week was about some 30,000 customers of European banks who were victims of \"Eurograbber,\" both a PC Trojan and mobile malware infecting Android, BlackBerry and Symbian devices. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0975a1b9744a78d3a0f9c20810d9be97","url": "dexter-more-of-the-same-or-hidden-links","title": "Dexter: More of the same, or hidden links?","published": "2012-12-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Communications"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> If your organization makes use of Point-of-Sale (POS) systems to process credit or debit cards, you may have heard of a new piece of malware dubbed &lsquo;Dexter&rsquo;.&nbsp; Seculert coined the name, reportedly from strings within the malware and its online parsing tool. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a5914c2472a4ce31fbf727408e6678b4","url": "weekly-intelligence-summary-lead-paragraph-2012-12-14","title": "Weekly Intelligence Summary Lead Paragraph: 2012-12-14","published": "2012-12-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Egypt", "Israel Attack", "Malware", "Blitzkrieg", "Russia", "Financial Services", "Ars Technica", "Antivirus", "Arab-Israeli Wars", "Anonymous (group)", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week we collected a number of high-quality open source intelligence reports. McAfee released a report lending credibility to Project Blitzkrieg, and FireEye analyzed a targeted malware attack against Russian targets. Brian Krebs provided interesting profiles on the operators of two well-known botnets.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9cfee9564d54afa0db59ed6db4fbc318","url": "weekly-intelligence-summary-lead-paragraph-2012-12-21","title": "Weekly Intelligence Summary Lead Paragraph: 2012-12-21","published": "2012-12-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Linux", "Linus Torvalds", "ESET", "Skype"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team sent an advisory about VOBFUS to Verizon's clients on Monday evening. Trend Micro added to the available OSINT on this malware at almost the same time. We expect to hear more infection reports. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d713ca62fe33e4dab6d55d93bc8ad3ad","url": "weekly-intelligence-summary-2012-12-28","title": "Weekly Intelligence Summary: 2012-12-28","published": "2013-01-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Renault", "Automotive", "Hacking", "ESET", "Hacker", "Indonesia", "Financial Institutions", "Cybercrime", "Bulgaria", "New Year's Eve", "New Year", "Antivirus", "Anonymous (group)", "McAfee, Inc.", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As 2012 comes to a close, year-in-review articles and predictions for 2013 lead intelligence collections this week. Noteworthy reports include Trend Micro’s blog post about the trends it discovered in 2012’s targeted attacks and McAfee’s threat predictions for 2013. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f1bbeddcba6bfa4f21b12a1af2608e06","url": "microsoft-patch-summaries-–-2011-to-2012-comparison","title": "Microsoft patch summaries – 2011 to 2012 comparison","published": "2013-01-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Computer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Every “Microsoft Tuesday” the RISK Team will review the Security Bulletins released by Microsoft and the vulnerabilities addressed by each of them. The goal is to provide recommendations on patch strategies and target dates for each bulletin. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a3ed4041c8ad4ee3349270ddc43557bb","url": "weekly-intelligence-summary-lead-paragraph-2013-01-04","title": "Weekly Intelligence Summary Lead Paragraph: 2013-01-04","published": "2013-01-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Foreign Affairs", "Turbine", "Symantec Corporation", "China", "Forestry", "Financial Services", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> We ended 2012 and began 2013 with news of a breach at the Council on Foreign Relations leading to a drive-by-download caused by a previously unreported vulnerability in Internet Explorer. Symantec has tied this attack to the Elderwood Project linked to the People's Republic of China. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6dd94fd6ae8343ca1e75e340b1d74b18","url": "introducing-malformity-your-malware-and-malicious-infrastructure-osint-assistant","title": "Introducing Malformity: Your malware and malicious infrastructure OSINT assistant","published": "2013-01-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Internet Protocol"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> What happens when you come across a suspicious file, IP address, or domain? Where do you go to find out more information about that potential indicator? If you know an indicator is malicious, what tools do you use to find out more about it? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4c8c5d76362872fb85785887cb217fad","url": "e-discovery-readiness-engagements","title": "e-discovery readiness engagements","published": "2013-01-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["E-discovery", "Litigation and Trial Practice", "Class Action", "Netflix", "Electronic Discovery", "Liability", "Online Video", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Daniel Pelc Organizations seek to mitigate risk. These activities are interwoven into the daily objectives of corporate executives. As much as companies try to defend their positions, the ground can erode beneath their feet. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8e1ff1fe2e370206456bc0f2260bd630","url": "weekly-intelligence-summary-lead-paragraph-2013-01-11","title": "Weekly Intelligence Summary Lead Paragraph: 2013-01-11","published": "2013-01-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Cold Fusion"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> The RISK Team hates to be the bearer of bad news, but we have collected three separate reports confirming a previously undiscovered vulnerability in Java being exploited by the multiple exploit kits. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "356fa5525b370ebf5969d6cb43cb04ce","url": "case-study-proactive-log-review-might-be-a-good-idea","title": "Case study: Proactive log review might be a good idea","published": "2013-01-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["New Year's Eve", "New Year"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7fa18bddced36af8f6b3a4ad4eb2f9db","url": "weekly-intelligence-summary-lead-paragraph-2012-01-18","title": "Weekly Intelligence Summary Lead Paragraph: 2012-01-18","published": "2013-01-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Symantec Corporation", "Organized Crime", "Cybercrime", "New Year's Eve", "New Year", "Antivirus", "Adventurer", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> The first couple weeks of the new year have been almost enough to lead one to seek therapy for triskaidekaphobia. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a4986dbeb1aa39975da280b547793159","url": "clarification-on-recent-blog-post-case-study-proactive-log-review-might-be-a-good-idea","title": "Clarification on recent blog post - Case study: Proactive log review might be a good idea","published": "2013-01-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "China"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We on the RISK team were somewhat surprised by the amount of buzz created by our recent post: Case Study: Pro-active Log Review Might Be A Good Idea. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5fac1ddaf664d39a27a6fd81691902d3","url": "official-v1-json-schema-released-for-veris","title": "Official v1 JSON schema released for VERIS","published": "2013-01-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Those of you familiar with the Vocabulary for Event Recording and Incident Sharing (VERIS) framework might have reviewed or experimented with the beta schema (XML) we released last year. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "278043b45fbd198aa0a5b96dc586f47a","url": "weekly-intelligence-summary-lead-paragraph-2013-01-25","title": "Weekly Intelligence Summary Lead Paragraph: 2013-01-25","published": "2013-01-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Financial Institutions", "Antivirus"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> The term &lsquo;actionable intelligence&rsquo; nicely sums up this week&rsquo;s open source collections.&nbsp;Kaspersky released part 2&nbsp;of its analysis of the Red October campaign and teamed with AlienVault to&nbsp;publicly release indicators of compromise&nbsp;(IOCs) related to the attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8e90ea2dc9564cccf6db19b685c60429","url": "share-your-code-but-don-t-share-your-keys","title": "Share your code but don’t share your keys.","published": "2013-01-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Verizon Communications Inc.", "Intel", "Civil Rights Law", "Open source software (OSS)", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Many of us on the Verizon RISK team produce open source software, and all of us use it. This blog itself runs on a stack of software components mostly licensed under the GNU Public License, and we’ve published and/or contributed to a number of projects under varying licenses. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c7dc8a64c8b7f1891c68f31a3b370aa8","url": "weekly-intelligence-summary-lead-paragraph-2013-02-01","title": "Weekly Intelligence Summary Lead Paragraph: 2013-02-01","published": "2013-02-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Personal Data Security", "China", "Fraud", "Cybercrime", "Project Management", "Security Management", "Universal Plug and Play (UPnP)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> The RISK Team assesses there were no significant changes in the risk environment this week for Verizon Enterprise clients.&nbsp; Tuesday (US time) we published our assessment of Rapid7's UPnP vulnerabilities. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2f0800c0c0cb907b881c9aca6f0a26a0","url": "weekly-intelligence-summary-lead-paragraph-2013-02-08","title": "Weekly Intelligence Summary Lead Paragraph: 2013-02-08","published": "2013-02-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["International Affairs", "Foreign Affairs", "Intel", "Symantec Corporation", "Japan ", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> The really bad news: &nbsp;Adobe released Security Bulletin ASPSB13-04 with patches to Flash Player for two attacks already spotted in the wild, one targeted DOCs and one web-hosted. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "eb83e75e4ce7e764b499e3176d02be93","url": "investigating-unknowns-with-malformity","title": "Investigating unknowns with Malformity","published": "2013-02-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In our previous post about Malformity, we presented a scenario in which using Malformity could be useful. Today, we’ll step through one of those examples in order to demonstrate how Malformity may be used to quickly identify maliciousness and related indicators. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f5ff6f598d23cebe460dc4ff4a025648","url": "weekly-intelligence-summary-lead-paragraph-2013-02-15","title": "Weekly Intelligence Summary Lead Paragraph: 2013-02-15","published": "2013-02-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "The Goldman Sachs Group, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> How time flies. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f38179ea16eafb615f37f38a0aa7f257","url": "risk-labs-is-the-macbook-air-a-viable-forensic-laptop","title": "RISK Labs: Is the MacBook Air a viable forensic laptop?","published": "2013-02-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Laptops", "MacBook", "MacBook Air", "Apple", "Critical Infrastructure Security", "Airport Security", "Personal Computer"],"authors": ["KLong"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In addition to managing the back end of the RISK Team's operations and delivering Labs Services to our On Demand and Rapid Response Retainer customers, the RISK Labs team evaluates and tests forensic solutions for our investigators in the field. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "40bb2fd640cb0552e0b45ea0f6c74552","url": "a-good-week-for-good-intel-for-the-good-guys","title": "A good week for good intel for the good guys","published": "2013-02-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Intel", "International Olympic Committee", "Espionage", "Chinese"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It's been a busy week for those of us in the Incident Response and intel community. &nbsp;On Monday, a closed source dropped a bulletin that included one of the largest TLP:Green indicators of compromise (IOC) dumps on state-affiliated actors we&rsquo;ve ever seen. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "57fe133899a62ecc1f91d21146511214","url": "weekly-intelligence-summary-lead-paragraph-2013-02-21","title": "Weekly Intelligence Summary Lead Paragraph: 2013-02-21","published": "2013-02-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "China", "Fraud", "InSecurity", "Apple", "Cybercrime", "Apple iPhone", "Mobile Phone"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> Mandiant&rsquo;s report on China&rsquo;s Unit 61398 and APT1 represents the most significant intelligence collected this week by the RISK Team. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2fdc482006c307f7d7a1c3578c872d76","url": "announcing-contributors-to-the-2013-dbir","title": "Announcing contributors to the 2013 DBIR","published": "2013-02-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Monkey", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s that time of year again when those of us on the RISK Team are spending inordinate amounts of our professional and personal time analyzing data and drafting sections toward the Data Breach Investigations Report (DBIR). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a870a83c30055c334a2d075b86218c4e","url": "weekly-intelligence-summary-lead-paragraph-2013-03-01","title": "Weekly Intelligence Summary Lead Paragraph: 2013-03-01","published": "2013-03-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Apple", "Data Breach", "Apple iPhone", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> \"It's like d&eacute;j&agrave; vu all over again.\" Three weeks ago, Bit9 reported a data breach almost certainly intended as a stepping-stone to attack their customers, and Oracle released their second of three Java updates in 2013. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "68f2f832c85e46528140384100992139","url": "2012-intsum-word-cloud","title": "2012 INTSUM Word Cloud","published": "2013-03-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s DBIR writing season for the Verizon RISK Team which means that we’re all getting together to go over this years data, analyze the changes, and examine the data in light of significant events from 2012.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "038071ad0023635c3d5f31193f758ca0","url": "weekly-intelligence-summary-lead-paragraph-2013-03-08","title": "Weekly Intelligence Summary Lead Paragraph: 2013-03-08","published": "2013-03-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Intelligence Service", "Identity Theft", "Pakistan"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> This has been an active week for risk intelligence operations, and overall, risk is substantially unchanged.&nbsp; Reducing risk, Oracle released a Java patch on Monday for vulnerabilities being exploited in the wild (ITW).&nbsp; But the Izz ad-Din al-Qassam Cyber Fighters returned with DoS attacks on US financial sector companies. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "df332f8c46c819f22000855af69c20b2","url": "weekly-intelligence-summary-lead-paragraph-2013-03-22","title": "Weekly Intelligence Summary Lead Paragraph: 2013-03-22","published": "2013-03-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Malware", "Skepticism", "Hungary", "Fraud", "Cybercrime", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> On Wednesday afternoon, local time, the&nbsp;Republic of Korea&nbsp;suffered a cyber attack, perhaps&nbsp;more than one. Analysis is still ongoing, but at this writing a&nbsp;phishing attack&nbsp;spread malware that contained a&nbsp;logic bomb&nbsp;with a trigger set for 2:00 p.m.The hard disks of infected systems were&nbsp;corrupted. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9c28b39ca84a13e8858dbf8b606cb6ae","url": "weekly-intelligence-summary-lead-paragraph-2013-03-29","title": "Weekly Intelligence Summary Lead Paragraph: 2013-03-29","published": "2013-03-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Cloud Security", "Hacker", "Africa", "Bulgaria", "South Africa", "Banking", "Spam (Electronic)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> CloudFlare and the New York Times found themselves in a quarrel with security researchers and skeptical journalists over a record-breaking 300 GBPS DDoS attack against Spamhaus. While CloudFlare claimed the attack nearly broke the Internet, other observers aren&rsquo;t sold. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fcac577f2fabec407df0778185689b67","url": "the-2013-dbir-is-out","title": "The 2013 DBIR is out!","published": "2013-04-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">April Fools. You should be careful about what the Interwebs tell you today (any other day, they’re entirely trustworthy, of course). In all seriousness, we wish it were out today because we’re ready to share our findings and analysis with you. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cfa51521d5de020e8140ccecc48e6367","url": "weekly-intelligence-summary-2013-04-05","title": "Weekly Intelligence Summary: 2013-04-05","published": "2013-04-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation", "MSNBC", "Cybercrime", "Financial Services", "Ars Technica", "South Korea"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> Three months ago, we&nbsp;noted&nbsp;\"(t)here is something fishy going on with a malicious Apache module.\"&nbsp; Dan Goodin at&nbsp;Ars Technica&nbsp;got closer to the bottom of it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "986cc071c8924842aad094cee0b82501","url": "weekly-intelligence-summary-2013-04-13","title": "Weekly Intelligence Summary: 2013-04-13","published": "2013-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Video Games", "Intellectual Property Law", "Antivirus", "Online Video", "Cold Fusion", "Espionage", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> Microsoft and Adobe hit the security space with 1-2 punch on Tuesday by releasing patches multiple vulnerabilities in their product lines. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4bdde0159fc0689ba33bcdb79b06be5d","url": "weekly-intelligence-summary-2013-04-19","title": "Weekly Intelligence Summary: 2013-04-19","published": "2013-04-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Symantec Corporation", "ABN AMRO", "Financial Institutions", "Data Breach", "Computer & Network Security", "Rabobank"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> It's that time again to organize an office pool for how many days it will be until one of the 42 vulnerabilities in Tuesday's Java CPU shows up in exploit kits and malware. &nbsp;While everyone is in an Oracle sort of mood, there's a new CPU &nbsp;for the rest of their products too. &nbsp;If those keep you up at night, you can load up your ereaders with Microsoft's Security Intelligence Report Vol 14 and Symantec's Internet Security Threat Report 2013 &nbsp;hot off the press this week. &nbsp;Better read them quickly! &nbsp;You're going to need 2930Kb in your reader for the Verizon Data Breach Investigations Report RSN. &nbsp;ABN-Amro, SNS Bank and Rabobank joined ING among the European financial institutions recently targeted for DDoS attacks. &nbsp;The Izz ad-Din al-Qassam Cyber Fighters (QCF) haven't taken credit for them, but they're on the top of almost everyone's the list of suspects. &nbsp;QCF is also on the suspect list for the WordPress brute force attacks. &nbsp;They need to cultivate their brobot networks for DoS attacks and a little SEO poisoning helps pay for it, that's assuming you don't think they're state-sponsored. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "952d99dfdc294edf4b90f160d1ad852d","url": "at-long-last-–-the-2013-dbir-is-out","title": "At long last – the 2013 DBIR is out!","published": "2013-04-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Activist", "New Year's Eve", "New Year", "Activism"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">2012. Perhaps more so than any other year, the large scale and diverse nature of data breaches and other network attacks took center stage. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a27f6aa7bf98846573bf6b3b7d122575","url": "weekly-intelligence-summary-2013-04-25","title": "Weekly Intelligence Summary: 2013-04-25","published": "2013-04-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "White House", "Data Breach", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> It&rsquo;s finally here. The RISK Team, Verizon and our 18 partners are proud to announce the release of the 2013 Data Breach Investigations Report. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "91ae80e4d59966031bd209682ef94f6a","url": "adaptive-defense","title": "Adaptive defense","published": "2013-05-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Defense Industry", "InSecurity", "Employment", "Information Security", "Jobs (profession)", "Security", "US Department of Defense", "Security and Investigations", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The term “active defense” (or “active response”) has gotten some attention in the information security industry lately, and this has led to a lot of controversy. This occasionally happens when terms migrate from one large community to another, and something gets lost in translation. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cf5735013688c1783f359fbc97d1e1ed","url": "weekly-intelligence-summary-lead-paragraph-2013-05-03","title": "Weekly Intelligence Summary Lead Paragraph: 2013-05-03","published": "2013-05-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["QinetiQ Group plc", "Malware", "NTT DoCoMo", "China", "ESET", "The Guardian", "Data Breach", "Data Centers", "Ars Technica", "Espionage", "U.S. Army"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> And some week's the bear gets you. Fifty million or so users of LivingSocial have been resetting their passwords following a data breach. &nbsp;But they have company; users from NTT DoCoMo and Reputation.com also had their credentials compromised. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5104fc46670ff279abdeca267ce9c1f8","url": "fud-watch-fud-watchers","title": "FUD Watch: FUD watchers","published": "2013-05-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Being a co-author of the Data Breach Investigations Report has certainly been a great experience this year. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "04911f1fdf4437421575bc7a23d1834e","url": "weekly-intelligence-summary-lead-paragraph-2013-05-10","title": "Weekly Intelligence Summary Lead Paragraph: 2013-05-10","published": "2013-05-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">May 7, 2013 was touted by Anonymous and its allies as the day they would hit the United States where it hurt by carrying out #OpUSA. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "95a413c095a0238780a7de27a449e6ee","url": "weekly-intelligence-summary-lead-paragraph-2013-05-17","title": "Weekly Intelligence Summary Lead Paragraph: 2013-05-17","published": "2013-05-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["The Goldman Sachs Group, Inc.", "Podcast", "Taxes", "Tax Return"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">One of the recurrent themes in risk intelligence this week was misuse of ICT, both intentional and unintentional resulting in losses. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "45b4c861a0730d4b3c61548344d25797","url": "join-us-in-the-n-crowd","title": "Join us in the \"n\" crowd.","published": "2013-05-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Management", "Data Governance"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The 2013 DBIR has been released and it represents an amazing amount of work by a great number of organizations and people. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "293d77ad599af69a9da8811507b15e7c","url": "weekly-intelligence-summary-lead-paragraph-2013-05-24","title": "Weekly Intelligence Summary Lead Paragraph: 2013-05-24","published": "2013-05-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Defense Industry", "Intel", "Military", "The Financial Times", "Attack!", "India", "Espionage", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The recurring theme of this week&rsquo;s intel collections is very simple: targeted attacks. Trend Micro, FireEye and Norman all released reports on targeted attack campaigns they&rsquo;ve been investigating over the past several weeks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9bf4fb08b7980b6dd6650ba1b561c2c9","url": "syrian-electronic-army-left-teary-eyed-after-hacking-into-the-onion","title": "Syrian Electronic Army left teary-eyed after hacking into The Onion.","published": "2013-05-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A couple of weeks ago, the Syrian Electronic Army briefly took over the Twitter account for a popular news satire site, The Onion. The site&rsquo;s response to the entire incident has been hilarious, including several satire articles about their incident response such as this, this, and this one. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2221da55f8d75061f6325369f1d6bb0e","url": "weekly-intelligence-summary-lead-paragraph-2013-05-31","title": "Weekly Intelligence Summary Lead Paragraph: 2013-05-31","published": "2013-06-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Social Commerce", "Drupal", "U.S. Department of Justice", "Poverty", "United Nations", "Grief", "Cybercrime", "Data Breach", "Good News", "Taiwan ", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week's good news:&nbsp; The US Department of Justice seized virtual currency exchange Liberty Reserve, coordinated the arrest of five of the organization's operators and thus shut down \"a financial hub of the cyber-crime world.\" Krebs reports behaviors&nbsp;among Liberty&rsquo;s competitors/peers could be characterized as intimidating.&nbsp; We cannot confirm suicide prevention hot-lines saw a spike in calls from grief- and poverty-stricken, spammers, phishermen, extortion DoSers and botnet operators.&nbsp; Jeff Jarmoc and Cisco report server compromises due to a Ruby on Rails vulnerability reported, with a patch, in January. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c5b34b33411a04126b299289c1876fef","url": "home","title": "Home","published": "2014-04-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"thirdpart\"> \r\n<img src=\"https://pixel.newscred.com/px.gif?key=YXJ0aWNsZT1jNWIzNGIzMzQxMWEwNDEyNmIyOTkyODljMTg3NmZlZg==\" alt=\"\" height=\"1\" width=\"1\" class=\"nc_pixel\"/>...</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3f03d7c30966967346296aaeeaa14f20","url": "weekly-intelligence-summary-lead-paragraph-2013-06-07","title": "Weekly Intelligence Summary Lead Paragraph: 2013-06-07","published": "2013-06-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Zeus", "Cybercrime", "Identity Theft", "Antivirus", "Good News"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team would like to tip its hat to Microsoft, the FBI and their partners for successfully carrying out an operation to disrupt Citadel botnets responsible for stealing nearly $500 million. Another hat tip goes to U.S., U.K. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3d395f8ef36513c5d310cbea0041238c","url": "weekly-intelligence-summary-lead-paragraph-2013-06-14","title": "Weekly Intelligence Summary Lead Paragraph: 2013-06-14","published": "2013-06-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Ames Department Stores", "Espionage", "Ames IA", "Advertising"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team collected several noteworthy reports on aspects of the Snowden affair relevant to InfoSec risk in enterprises.&nbsp; John Villasenor in Forbes predicted it will lead to more economic espionage targeting US companies. Byron Acohido published a blog article on the potential impact on targeted advertising. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "782706671e6c8ace22323ac952c91135","url": "weekly-intelligence-summary-lead-paragraph-2013-06-21","title": "Weekly Intelligence Summary Lead Paragraph: 2013-06-21","published": "2013-06-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Microsoft", "Oil & Natural Gas", "Oil Industry", "Oil, Gas and Chemicals", "Adventurer", "Oil", "Computer Software", "Windows 8"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Anonymous did it again. It announced #OpPetrol and its plan to attack the oil industry on June 20 and then, as has been the case recently, didn&rsquo;t even show up to its own event. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "27938cba46cc030b59123cbbb570f846","url": "weekly-intelligence-summary-lead-paragraph-2013-07-05","title": "Weekly Intelligence Summary Lead Paragraph: 2013-07-05","published": "2013-07-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Linux", "Video Games", "Linus Torvalds", "Symantec Corporation"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most significant development in InfoSec risk this week was Microsoft&rsquo;s pre-notification for seven security bulletins on 2013-07-09. Two video game communities were affected by security incidents reported this week; Ubisoft and Eve Online. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "87076a0e11dea0b3a98b12e74b14a6eb","url": "weekly-intelligence-summary-lead-paragraph-2013-07-12","title": "Weekly Intelligence Summary Lead Paragraph: 2013-07-12","published": "2013-07-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware", "Malware", "Antivirus", "Cold Fusion", "Adventurer", "McAfee, Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If you&rsquo;re looking for a good example of how NOT to handle a security breach, look no further than the U.S. Department of Commerce&rsquo;s Economic Development Administration. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9424e4eb197679d99a3e2e71f4398ed8","url": "weekly-intelligence-summary-lead-paragraph-2013-07-19","title": "Weekly Intelligence Summary Lead Paragraph: 2013-07-19","published": "2013-07-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Sophos", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Fifteen months ago, Microsoft released MS12-027 and told us there were already targeted attacks in the wild.&nbsp; One might think that by now, everyone would be patched and this would be old news.&nbsp; Two new targeted malware campaigns are among this week's collections (Trend)(Sophos). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "80f3b66e7dba18e94a99e643423f35e5","url": "the-veris-community-database","title": "The VERIS Community database","published": "2013-07-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Information sharing is a complex and challenging undertaking.&nbsp; If done correctly, everyone involved benefits from the collective intelligence.&nbsp; If done poorly, it may mislead participants or create a learning opportunity for our adversaries.&nbsp; The Verizon RISK Team supports and participates in a variety of information sharing initiatives and research efforts. &nbsp;We continue to drive the publication of the Verizon Data Breach Investigations Report (DBIR) annually, where we have an unprecedented number of new data-sharing partners, and we are committed to keeping the report publicly available and free to download.&nbsp;&nbsp; We regularly receive inquiries about our dataset, and our ability to share further, but we are limited in what data we can share in raw format due to agreements with our partners and customers.&nbsp; The Problem: While there are a handful of efforts to capture security incidents that are publicly disclosed, there is no unrestricted, comprehensive raw dataset available for download on security incidents that is sufficiently rich to support both community research and corporate decision-making.&nbsp; There are organizations that collect&mdash;and in some form&mdash;disseminate aggregated collections, but they are either not in a format that lends itself to ease of data manipulation and transformation required for research, or the underlying data are not freely and publicly available for use.&nbsp; This gap has long hampered researchers who are studying the problems surrounding security incidents, as well as the risk managers who are starved for reliable data upon which to base their risk calculations. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b32a4c6164dd8495557434ff6f47bc4d","url": "weekly-intelligence-summary-lead-paragraph-2013-07-26","title": "Weekly Intelligence Summary Lead Paragraph: 2013-07-26","published": "2013-07-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Fine Art", "Financial Institutions", "Viber"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Following more than 2 months of silence, the Izz ad-Din al-Qassam Cyber Fighters (QCF) emerged this week to announce on Pastebin the start of Phase 4 of Operation Ababil. They even spruced up their announcement with ASCII art. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e5d6268ded112c0fb60fed9f334488e2","url": "operation-ababil-phase-4-the-return-of-the-izz-ad-din-al-qassam-cyber-fighters","title": "Operation Ababil phase 4: The return of the Izz ad-Din al-Qassam cyber fighters","published": "2013-07-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Motivation", "Financial Institutions", "Innocence of Muslims", "YouTube", "Online Video"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">They&rsquo;re back! On Tuesday July 23, 2013 the Izz ad-Din al-Qassam Cyber Fighters (QCF) announced via Pastebin their intent to launch Phase 4 of Operation Ababil as part of their ongoing campaign against U.S. financial institutions. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8631549438684d43c7e51ec6bafbdf1b","url": "destruction-of-evidence-from-a-hard-drive-crash","title": "Destruction of evidence from a hard drive crash?","published": "2013-07-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Litigation and Trial Practice", "Class Action", "Netflix", "Liability", "Online Video", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Organizations seek to mitigate risk. These activities are interwoven into the daily objectives of corporate executives. As much as companies try to defend their positions, the ground can erode beneath their feet. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ea6b32ed8844afc8c79e94ce36c4ed4c","url": "weekly-intelligence-summary-lead-paragraph-2013-08-02","title": "Weekly Intelligence Summary Lead Paragraph: 2013-08-02","published": "2013-08-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Personal Data Security", "Malware", "Communications", "Symantec Corporation", "Fraud", "Cybercrime", "Good News", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">First the good news, or great reports, collected this week: The Cyber Espionage Blueprint Understanding Commonalities in Targeted Malware Campaigns from RSA, and APWG's 1Q2013 Trends Report&nbsp;both provide situational awareness for the phishing and targeted e-mail threat environment.&nbsp;&nbsp;Dell released their report on the Comfoo RAT/APT campaign with breadcrumbs leading back to Luckycat reported by Trend and Symantec in March of last year. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "013d889f433a7be308ac63c4b13b1f21","url": "weekly-intelligence-summary-lead-paragraph-2013-08-09","title": "Weekly Intelligence Summary Lead Paragraph: 2013-08-09","published": "2013-08-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Iran", "Intel", "Joomla", "Hacker", "Heritage Foundation", "Information Security", "Wordpress", "Security", "Computer & Network Security"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A technique that boosts efficiency and effectiveness in intelligence analysis is to maximize collection of analyses by trusted and established reliable sources.&nbsp;A half dozen of those make up this week's risk intelligence highlights.&nbsp; The Information Security Media Group (bankinfosecurity.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fdad72ce061a71b5ee14b51618340efb","url": "weekly-intelligence-summary-lead-paragraph-2013-08-16","title": "Weekly Intelligence Summary Lead Paragraph: 2013-08-16","published": "2013-08-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Financial Institutions", "Gangs"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Although we collected an unusually large volume of risk intelligence this week, little of it is actionable.&nbsp;&nbsp;Actionable this week is led by Microsoft's August Bulletins,&nbsp;however Microsoft withdrew MS13-061 for Exchange 2013. Administrators who've already applied it should see a new KB article. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3365f1f7b0017c79cd0969437555793d","url": "weekly-intelligence-summary-lead-paragraph-2013-08-23","title": "Weekly Intelligence Summary Lead Paragraph: 2013-08-23","published": "2013-08-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "FireEye, Inc.", "Malware", "Nintendo", "Gartner", "Video Games", "Dating"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Data breaches involving video game companies such as Ubisoft, Nintendo and Konami have attracted significant attention in 2013. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "30e8ae6245bc786124cbf1f7dcb8a9da","url": "weekly-intelligence-summary-2013-08-30","title": "Weekly Intelligence Summary: 2013-08-30","published": "2013-09-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Russia", "China", "Petersburg", "St Petersburg", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Believe it or not, the Syrian Electronic Army's attack on the New York Times was not the most significant risk event on the Internet this week.&nbsp;&nbsp;Imagine a nationwide four-hour Internet outage; wait--you don't have to imagine it because the People's Republic of China suffered through one Sunday morning. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7c7175d33899b5938fef2edce556ce9c","url": "decisions-or-disgrace-the-purpose-of-breach-notification-and-why-i-think-we-re-doing-it-wrong","title": "Decisions or disgrace? The purpose of breach notification and why I think we're doing it wrong.","published": "2013-09-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Few would argue that mandatory notification laws have changed public and professional awareness of data breaches over the last 5 to 10 years. We hear about many more of them these days, and compiled listings are available should we wish to look further. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7328e211b5f024b93dc532829f9bb96b","url": "weekly-intelligence-summary-lead-paragraph-2013-09-6","title": "Weekly Intelligence Summary Lead Paragraph: 2013-09-6","published": "2013-09-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "New Jersey", "Japanese", "Malware", "Aviation", "ESET", "Joomla", "Banking", "Antivirus", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Reports on new developments in malicious code dominated this week&rsquo;s intelligence collections. Kaspersky blogged on the resurgence of the Red Star APT campaign and FireEye published information on a descendant of njRAT dubbed Njw0rm. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "eb61b64711eadeb10a643018fef451ce","url": "the-veris-community-database-has-more-data","title": "The VERIS Community database has more data!","published": "2013-09-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Visualization", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">When the RISK Team announced the VERIS Community Database (VCDB), we made a commitment to continue updating this data repository.&nbsp; We are pleased to let you know that we have just completed our first quarterly update to the VCDB&mdash;it now contains 1,732 incidents (up from 1,218 at initial release).&nbsp; As before, you can access the dataset in two ways&mdash;through the interactive visualization and through our GitHub Repository.&nbsp; The data has also been updated to be VERIS 1.2 schema compliant. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "628bfb7d5ff5a490a88ce9dabdd00716","url": "weekly-intelligence-summary-2013-09-13","title": "Weekly Intelligence Summary: 2013-09-13","published": "2013-09-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "ESET", "Data Breach", "Vodafone", "Identity Theft", "Financial Services", "Banking", "Antivirus", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Breaches, patches,&nbsp;malware&nbsp;purposed for financial fraud and cyber conflict and engendering trust highlight the RISK Team's&nbsp;intelligence this week.&nbsp; Unknown subjects&nbsp;hacked the systems Vodafone-Germany&nbsp;causing a data breach of the&nbsp;personal and financial data of two million customers.&nbsp;Microsoft issued only&nbsp;thirteen bulletins, one fewer than last week's prenotification forecast.&nbsp; Adobe issued&nbsp;advisories&nbsp;for Flash, Acrobat/Reader and Shockwave.&nbsp; Oracle issued a&nbsp;press release&nbsp;regarding oncoming changes in Java that seem to&nbsp;portend improved security.&nbsp; ESET and McAfee added to last week's collection on Hesperbot a newish banking Trojan.&nbsp; An old adversary, Shylock has a new variant&nbsp;targeting Italian banks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2d48681905546696aac9fe9839dd8c7f","url": "weekly-intelligence-lead-paragraph-2013-09-20","title": "Weekly Intelligence Lead Paragraph:2013-09-20","published": "2013-09-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Symantec Corporation", "China"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The&nbsp;Microsoft Security Response Center&nbsp;is once again busy trying to fix a previously undiscovered Internet Explorer vulnerability&nbsp;currently being exploited in a limited number of targeted attacks.&nbsp;Microsoft issued a security advisory&nbsp;to announce it was working to assess the threat posed by the flaw and issued a temporary fix-it solution. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1153354874fcc21ac006f1118aaeb24a","url": "threat-intelligence-modeling","title": "Threat intelligence modeling","published": "2013-09-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Verizon Communications Inc.", "Modeling", "International Olympic Committee", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Threat models are the foundation for a variety of security applications. The Verizon RISK team models threat as an important component of VERIS. Other applications of threat modeling involve evaluating software security, or automating control infrastructure. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5e6426d6408304e1af880037dd459e67","url": "weekly-intelligence-summary-lead-paragraph-2013-09-27","title": "Weekly Intelligence Summary Lead Paragraph: 2013-09-27","published": "2013-09-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Japanese", "Pets", "Symantec Corporation", "Organized Crime", "Financial Institutions", "Cybercrime", "Antivirus", "Adventurer", "Taiwan "],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At the top of the RISK Team's current list of intelligence requirements is&nbsp;CVE-2013-3893, the most recent, unpatched, vulnerability in Microsoft&nbsp;Internet Explorer. This week,&nbsp;FireEye&nbsp;reported on Operation DeputyDog,&nbsp;targeted attacks against Japanese organizations using this vulnerability. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9836d6abd9e7f2867c43e5faf142ae6a","url": "weekly-intelligence-summary-lead-paragraph-2013-10-04","title": "Weekly Intelligence Summary Lead Paragraph: 2013-10-04","published": "2013-10-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Good News", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">October&rsquo;s Patch Tuesday is shaping up to be a busy day for security personnel. Microsoft pre-announced 8 security bulletins for this month including a patch for the pesky MSHTML vulnerability in Internet Explorer currently being exploited in targeted attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "322939425479dfc4d28ee338fe70d28c","url": "handsome-and-witty-breach-report-seeks-committed-relationship-with-healthcare-and-education-datasets","title": "Handsome and witty breach report seeks committed relationship with healthcare and education datasets.","published": "2013-10-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Health Insurance Industry"],"authors": ["DBIR Team"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Most of the world thinks of our Data Breach Investigations Report (DBIR) as a &ldquo;Spring thing,&rdquo; but it&rsquo;s an &ldquo;almost all the time thing&rdquo; for those of us who work on it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3f0f2878e80ec59fbeac043924deeb57","url": "weekly-intelligence-summary-lead-paragraph-2013-10-11","title": "Weekly Intelligence Summary Lead Paragraph: 2013-10-11","published": "2013-10-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["United Continental Holdings, Inc.", "Russia", "Aircraft", "Black Hole", "Florida", "Tallahassee", "Identity Theft", "Credit Cards", "Law Enforcement", "Adventurer", "United Airlines"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The good guys had a pretty good week.&nbsp; \"Paunch\" the creator/developer of the Black Hole exploit kit, and some confederates were arrested in Russia.&nbsp;&nbsp; United Airlines and our colleagues in Florida law enforcement rolled up a credit card fraud ring after one member left his wallet at the ticket counter in Tallahassee with a baker's dozen different IDs and credit cards.&nbsp; A different baker's dozen of bad guys with affinity to Anonymous were indicted for conducting \"Operation Payback\" in 2010-11.&nbsp; We need wait no longer for patches for two vulnerabilities in Internet Explorer that are being used in targeted attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "91fbaf24f8feddacb4aab5c4c6873b94","url": "decisions-or-disgrace-the-purpose-of-breach-notification-and-why-i-think-we-re-doing-it-wrong-part-2","title": "Decisions or disgrace? The purpose of breach notification and why I think we're doing it wrong, Part 2.","published": "2013-10-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A few weeks ago, I wrote a post in which I made the assertion that typical public breach notifications are more suited to disgracing victims than supporting decisions. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "74a3d390ce6adeb6f45a1bdb75e01291","url": "weekly-intelligence-summary-lead-paragraph-2013-10-18","title": "Weekly Intelligence Summary Lead Paragraph: 2013-10-18","published": "2013-10-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "The Dun & Bradstreet Corporation", "Africa", "South Africa"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Oracle dropped a patch bombshell on the security space this week releasing&nbsp;Critical Patch Updates to address 127 vulnerabilities in a variety of its products, including 51 in Java alone. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fa6bbda1e3b8415b41359c7eb75fe01e","url": "weekly-intelligence-summary-lead-paragraph-2013-10-25","title": "Weekly Intelligence Summary Lead Paragraph: 2013-10-25","published": "2013-10-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Business Strategy", "Malware", "Intel", "Symantec Corporation", "Russia", "Zeus", "Entrepreneurship", "Google Plus", "Seattle", "Startups"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In early September, malware intelligence included &ldquo;Mevade&rdquo; a Trojan that was abusing the Tor network. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e70912b1996d2f243248ff64240b1710","url": "paunch-arrested-the-state-of-blackhole-exploit-kit","title": "Paunch arrested: The state of BlackHole exploit kit","published": "2013-10-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["LinkedIn Corporation", "Malware", "Russia", "Crime & Law", "Crime", "Black Hole"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">During the weekend of 6 October 2013, Russian authorities unceremoniously arrested a cybercriminal nicknamed Paunch.&nbsp; His crime? Being the mastermind behind the notorious BlackHole (BHEK) and Cool exploit kits. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "54fa677674b8946ffa42d36a2eb8ba12","url": "weekly-intelligence-summary-lead-paragraph-2013-11-01","title": "Weekly Intelligence Summary Lead Paragraph: 2013-11-01","published": "2013-11-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Russia", "James Bond", "Secret Service", "Espionage"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week&rsquo;s InfoSec headlines read like plot points in a modern James Bond espionage thriller. A report from the Italian newspaper La Stampa alleged that thumb drives handed out by Russia as gifts at this year&rsquo;s G20 summit contained malware designed to spy on unsuspecting world leaders. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "943c996d4eb564a8d27b0bd4c3cf144c","url": "weekly-intelligence-summary-lead-paragraph-2013-11-08","title": "Weekly Intelligence Summary Lead Paragraph: 2013-11-08","published": "2013-11-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Sun", "Intel", "Anonymous (group)"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team is delighted to report the sun came up on the morning of November 6th.&nbsp; Anonymous and their ilk failed to make true predictions by certain&nbsp;fowl experts&nbsp;forecasting&nbsp;Guy Fawkes Day&nbsp;would be the end of the world as we know it.&nbsp; However, Anonymous is making its presence felt Down Under by attacking a&nbsp;variety of enterprises&nbsp;and the&nbsp;ASIO. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "05510b6392242fdc390c368e7502c9f5","url": "weekly-intelligence-summary-lead-paragraph-2013-11-15","title": "Weekly Intelligence Summary Lead Paragraph: 2013-11-15","published": "2013-11-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Pets", "Organized Crime", "Adventurer", "Espionage"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft&rsquo;s had a rough ten days. Last week it publicly disclosed&nbsp;a previously undiscovered vulnerability in Microsoft's Graphics Device Interface (CVE-2013-3906)&nbsp;being exploited through targeted attacks. This week it announced&nbsp;a vulnerability in Internet Explorer (CVE-2013-3918)&nbsp;was being exploited via a strategic web compromise. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "dfc0318ef81f212646eeee2ae5122f6d","url": "weekly-intelligence-summary-lead-paragraph-2013-11-22","title": "Weekly Intelligence Summary Lead Paragraph: 2013-11-22","published": "2013-11-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Massachusetts Institute of Technology (MIT)", "Symantec Corporation", "Good News", "MIT"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team collected a broad range of intelligence this week, making it problematic to pick out a trend. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "93672bdf80106d8e76a09e5feb9d3af9","url": "evaluating-new-threat-data-feeds","title": "Evaluating new threat data feeds","published": "2013-12-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Real-time Data Feeds"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We recently evaluated whether to subscribe to three threat data feeds of malicious IP addresses, and we thought it would be worth sharing the comparisons we used to support our decision. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "76d026262e47c28502674f959c3b7eb3","url": "weekly-intelligence-summary-lead-paragraph-2013-12-06","title": "Weekly Intelligence Summary Lead Paragraph: 2013-12-06","published": "2013-12-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Intel", "China", "Theft", "Bitcoin", "JP Morgan Chase & Co. ", "Data Breach", "Sheep", "Ars Technica", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Falstaff (Shakespeare&rsquo;s character) perhaps said it first: there&rsquo;s no honor among thieves. So we had a little pity party for the cybercriminals on &ldquo;Sheep Marketplace&rdquo; who are out about US$100 million after the admin/operators vanished. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1fa3a0eabfc8cf5d3a4f8cf592805517","url": "weekly-intelligence-summary-lead-paragrapah-2013-12-13","title": "Weekly Intelligence Summary Lead Paragrapah: 2013-12-13","published": "2013-12-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Windows Server", "Adventurer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Tuesday was a busy for day for enterprise security personnel as both Microsoft and Adobe released patches for their various products. Microsoft published 11 bulletins to plug holes in Windows, Internet Explorer, Office and the pesky GDI vulnerability (CVE-2013-3906) currently being exploited in the wild. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "07400e58129c16b2ad6ebd8d1474122c","url": "so-you-want-to-do-intel","title": "So you want to do Intel?","published": "2013-12-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Intel", "Good News"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Over the past couple of weeks, our team has been involved in several conversations in a number of different contexts regarding the use of intelligence within an organization. Overall, this is good news. Organizations realize that the current security norm isn&rsquo;t cutting it in the modern threat landscape. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c6469b769daa14b8908882b093f5c307","url": "weekly-intelligence-summary-lead-paragrapah-2013-12-20","title": "Weekly Intelligence Summary Lead Paragrapah: 2013-12-20","published": "2013-12-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Classified Information", "Malware", "Symantec Corporation", "ESET", "National Security Agency", "Data Breach", "Identity Theft", "National Security", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team managed to collect some useful intelligence during a week when it seemed like over-application Occam&rsquo;s Razor ruled.&nbsp; Dell SecureWorks published an assessment of CryptoLocker.&nbsp; Financial fraud Trojans were assessed by Symantec, in ESET&rsquo;s report on Qadars which targets Dutch banks, and by GData&rsquo;s update on Bebloh. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3e8463c9848e1f255a72e928e0f1544a","url": "cryptolocker-to-pay-or-not-to-pay","title": "CryptoLocker: To pay or not to pay","published": "2013-12-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Massachusetts"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A few weeks ago there was a widely circulated story that the Swansea Police Department in Massachusetts suffered a CryptoLocker ransomware infection that resulted in the malware encrypting an unknown number of files. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4a3de55e2dab4653bd62d67fd7afbb2a","url": "weekly-intelligence-summary-lead-paragrapah-2013-12-27","title": "Weekly Intelligence Summary Lead Paragrapah: 2013-12-27","published": "2013-12-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Intel", "Theft", "Bitcoin", "Payment Card Breach", "Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The last full week of 2013 saw more open source intelligence released related to the Target payment card breach. Brian Krebs continued his series of reports on the incident by trying to identify individuals who are selling the stolen card data on the black market. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cde0fbecace1f45159695e4ef2f0eb02","url": "intsum-word-cloud-2013-the-year-in-review","title": "INTSUM Word Cloud 2013: The year in review","published": "2013-12-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Financial Institutions"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Earlier this year my colleague Kevin Thompson created a word cloud consisting of the most frequently used terms in 2012&rsquo;s weekly Intelligence Summaries (INTSUMs). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c080fc79b145c30e13c0581b0eede24a","url": "weekly-intelligence-summary-lead-paragraph-2014-01-03","title": "Weekly Intelligence Summary Lead Paragraph: 2014-01-03","published": "2014-01-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Snapchat", "Fraud", "Cybercrime", "Data Breach", "Japan ", "Attack!", "Skype"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The home site for OpenSSL experienced a data breach last weekend. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4df676c57f65f8879b83ca8e3da52180","url": "weekly-intelligence-summary-lead-paragraph-2014-01-10","title": "Weekly Intelligence Summary Lead Paragraph: 2014-01-10","published": "2014-01-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Russia", "Moscow", "Yahoo", "Africa", "South Africa"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The theme behind some of this week&rsquo;s most useful intelligence collections can be easily summed up in one word: malvertising. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b6f7843a281377111e7c6b39bbe3a1ec","url": "weekly-intelligence-lead-paragraph-summary-2014-01-17","title": "Weekly Intelligence Lead Paragraph Summary: 2014-01-17","published": "2014-01-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Neiman Marcus", "Malware", "Antivirus", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Cheers to Brian Krebs, McAfee, Volatility Labs and Cisco who each contributed significantly to our top priorities for intelligence collections this week.&nbsp; Krebs wrote: A First Look at the Target Intrusion, Malware and Part II. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "87352f33f755abb546d0bf08bd8a9eda","url": "weekly-intelligence-summary-lead-paragraph-2014-01-24","title": "Weekly Intelligence Summary Lead Paragraph: 2014-01-24","published": "2014-01-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Neiman Marcus", "Russia", "Hacking", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Neiman Marcus disclosed more details this week regarding the data breach it suffered in 2013. The retailer admitted 1.1 million of its customers were affected by the lengthy compromise. Be sure to add CrowdStrike&rsquo;s &ldquo;Global Threats Report: 2013 Year in Review&rdquo; to your reading list. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "16056e8fc298673ffe707863a5ba4c68","url": "weekly-intelligence-lead-paragraph-summary-2014-01-31","title": "Weekly Intelligence Lead Paragraph Summary: 2014-01-31","published": "2014-01-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["JP Morgan Chase & Co. ", "Bank of America", "United States", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There were unsuccessful attempts to push retailer breaches out of the, pardon the pun, bull&rsquo;s-eye. Seculert reported an XtremeRAT attack in the Israeli Defense Ministry. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f3904b205e8a2fd4b3b72dda15b4cc83","url": "weekly-intelligence-summary-lead-paragraph-2014-02-07","title": "Weekly Intelligence Summary Lead Paragraph: 2014-02-07","published": "2014-02-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hacking", "PayPal", "The Americas", "Comcast"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Syrian Electronic Army was up to no good again this week. Over the weekend they managed to hijack UK, French and Indian domains belonging to eBay and PayPal. They also claimed to intercept e-mails sent by eBay security staff responding to the situation. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1cbc42b15e5913b2896965c29fb6e653","url": "weekly-intelligence-summary-lead-paragraph-2014-02-14","title": "Weekly Intelligence Summary Lead Paragraph: 2014-02-14","published": "2014-02-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Intel", "Symantec Corporation", "Aerospace", "Snow", "Data Breach", "Tesco", "Identity Theft", "Ars Technica", "Antivirus", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">FireEye has reported &ldquo;Operation SnowMan&rdquo; a watering hole attack that was added to the U.S. Veterans of Foreign Wars association web site. &nbsp;Websense reports a similar attack on users with affinity to the French aerospace association, GIFAS. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fe817167f5ee85df57947090bd92d9e8","url": "error-detecting-data-visualizations","title": "Error detecting data visualizations","published": "2014-02-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Information Security", "Web Application", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Winter is in full swing and the RISK Team is hard at work gathering, validating, and analyzing data for a variety of projects that we&rsquo;re working on. One of those is the upcoming quarterly release for the VERIS Community Database.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0afd26ad3952fa3583c32611d653908d","url": "weekly-intelligence-summary-lead-paragraph-2014-02-21","title": "Weekly Intelligence Summary Lead Paragraph: 2014-02-21","published": "2014-02-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Non-Profit", "Government & Non Profits", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Last week it was a zero-day attacks using a vulnerability in Internet Explorer (CVE-2014-0322) that was making headlines. This week it&rsquo;s a new vulnerability in Flash Player that&rsquo;s getting all the attention. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0e9fbf201efec8568fa6318a49968257","url": "weekly-intelligence-summary-lead-paragraph-2014-02-28","title": "Weekly Intelligence Summary Lead Paragraph: 2014-02-28","published": "2014-03-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Intel", "Symantec Corporation", "Antivirus", "Middle East"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week, we collected intelligence from&nbsp;IntelCrawler of mobile malware&nbsp;targeting Middle Eastern bank clients. Also targeting the Middle East, from Symantec and Fidelis respectively, a&nbsp;new Java RAT&nbsp;and&nbsp;SSTEAM targeted attacks on energy and government&nbsp;sectors. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "89cfec2af19304f0f9abdb05a5dfd1a2","url": "weekly-intelligence-summary-lead-paragraph-2014-03-07","title": "Weekly Intelligence Summary Lead Paragraph: 2014-03-07","published": "2014-03-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Chicago", "Good News"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Good news, defenders! Microsoft announced it will&nbsp;patch the Internet Explorer zero-day&nbsp;currently being targeted in a limited number of attacks as part of March&rsquo;s Patch Tuesday. The update will be released alongside four other bulletins that will plug holes in Silverlight and Windows. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ba15a9a137ecfb9ee4cc02aa10c8d0f0","url": "weekly-intelligence-summary-lead-paragraph-2014-03-14","title": "Weekly Intelligence Summary Lead Paragraph: 2014-03-14","published": "2014-03-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Intel", "Symantec Corporation", "Rush (2008 TV series)", "InSecurity", "Justin Bieber", "Antivirus", "Adventurer", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fceae5f93ac6c755d2d3d9435fe3de12","url": "weekly-intelligence-summary-lead-paragraph-2013-03-21","title": "Weekly Intelligence Summary Lead Paragraph: 2013-03-21","published": "2014-03-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Linux", "Intel", "Linus Torvalds", "Symantec Corporation", "ESET", "The Guardian", "Hollywood", "Data Centers", "Cold Fusion"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">ESET&rsquo;s report on Operation Windigo is the best open source intelligence we&rsquo;ve collected this week. The group behind Windigo is responsible for compromising around 25,000 Linux-running servers over the past two years. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ae53c5186ffd6bf4461ac46ba0eeac18","url": "test-driven-development-with-json-schema","title": "Test-driven development with json schema","published": "2014-03-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">   Our team is going through the process of examining potential changes to the VERIS schema that we use to encode security incidents. As changes are accepted we have to make changes to the enumerations and in some cases the schema itself. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "df1102519cac5c905cf600b2feb6eb98","url": "weekly-intelligence-summary-lead-paragraph-2014-03-28","title": "Weekly Intelligence Summary Lead Paragraph: 2014-03-28","published": "2014-03-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Microsoft", "U.S. Senate", "Symantec Corporation", "Cybercrime", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"thirdpart\"> <p>Monday Microsoft released&nbsp;<a target=\"_new\" href=\"http://technet.microsoft.com/en-us/security/advisory/2953095\">Security Advisory 2953095</a>&nbsp;announcing attacks on a previously unknown vulnerability in Word 2010, but also affecting Outlook.&nbsp; Microsoft reported &ldquo;limited, targeted attacks.&rdquo; The&nbsp;<a target=\"_new\" href=\"http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx\">Security Research and...</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fa99c854c42233760d56535eade68d8d","url": "weekly-intelligence-summary-lead-paragraph-2014-04-04","title": "Weekly Intelligence Summary Lead Paragraph: 2014-04-04","published": "2014-04-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Intel", "Financial Institutions", "Data Breach", "Ukraine "],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"thirdpart\"> <p>The Korean National Police Agency arrested four persons involved in the&nbsp;<a target=\"_new\" href=\"http://www.theregister.co.uk/2014/03/27/south_korea_naver_hack_arrest_25_million/\">data breach of the Naver portal</a>&nbsp;and compromise of 25 million user accounts.&nbsp; A US regulator for financial institutions...</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "369d1853b7f36a94e08d68a67fa7e483","url": "weekly-intelligence-summary-lead-paragraph-2014-04-11","title": "Weekly Intelligence Summary Lead Paragraph: 2014-04-11","published": "2014-04-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Heartbleed (bug)", "Headaches", "Wordpress"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">What was supposed to be remembered as the week that XPocalypse officially began will now be known as the week that the&nbsp;OpenSSL Heartbleed vulnerability (CVE-2014-0160)brought headaches to just about everyone in&nbsp;ICT. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3fbd0e3bdb9eaa60be1992938626a400","url": "weekly-intelligence-summary-lead-paragraph-2014-04-18","title": "Weekly Intelligence Summary Lead Paragraph: 2014-04-18","published": "2014-04-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Heartbleed (bug)", "Online Storage", "Data Centers", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c0ada7e613ec157ce9352f728d6aa529","url": "weekly-intelligence-summary-lead-paragraph-2014-04-25","title": "Weekly Intelligence Summary Lead Paragraph: 2014-04-25","published": "2014-04-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Heartbleed (bug)", "Zeus", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It&rsquo;s baaaaack. We&rsquo;re pleased to announce, along with our 51 other contributors, the release of the 2014 Data Breach Investigations Report (no registration required). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e42d86779c899e0e66a3d98e23e4a6eb","url": "weekly-intelligence-summary-lead-paragraph-2014-05-02","title": "Weekly Intelligence Summary Lead Paragraph: 2014-05-02","published": "2014-05-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "China", "Internet", "Internet", "Antivirus", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "89ce995cad87ba37438c6a8d2fe19853","url": "weekly-intelligence-summary-lead-paragraph-2014-05-09","title": "Weekly Intelligence Summary Lead Paragraph: 2014-05-09","published": "2014-05-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "IBM", "Antivirus", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It&rsquo;s spring in the United States, and security reports are popping up like fresh blades of grass. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1f3e2b8b85262027bc7488ac3328f7c9","url": "weekly-intelligence-summary-lead-paragraph-2014-05-16","title": "Weekly Intelligence Summary Lead Paragraph: 2014-05-16","published": "2014-05-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Symantec Corporation", "Infographics", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": " ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f61a585de21e305da8178d3686777d13","url": "weekly-intelligence-summary-lead-paragraph-2014-05-23","title": "Weekly Intelligence Summary Lead Paragraph: 2014-05-23","published": "2014-05-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "U.S. Department of Justice", "Customer Support", "Hacking", "Data Breach", "Chinese"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">News that the&nbsp;U.S. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "75938185a251533a74b765b98cb12a6a","url": "weekly-intelligence-summary-lead-paragraph-2014-05-30","title": "Weekly Intelligence Summary Lead Paragraph: 2014-05-30","published": "2017-07-21T17:17:10Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "App Economy", "Intel", "Russia", "Tablets", "Enterprise IT", "Data Centers", "Data Storage", "Ukraine ", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": [""],"industry": [""],"summary": "<p thirtyword=\"thirdpart\"> <p>When the InfoSec risk affecting the most people in a week is&nbsp;<a target=\"_new\" href=\"http://www.troyhunt.com/2014/05/the-mechanics-of-icloud-hack-and-how.html\">abuse of their &ldquo;where&rsquo;s my iPhone/iPad&rdquo; app in an extortion attempt</a>, that might indicate it&rsquo;s been a...</p> ","h1": "","type": "","outcome": [""]},{"id": "699864019f5df473b9a86c0e89573ef6","url": "weekly-intelligence-summary-lead-paragraph-2014-05-30","title": "Weekly Intelligence Summary Lead Paragraph: 2014-05-30","published": "2014-05-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "App Economy", "Intel", "Russia", "Tablets", "Enterprise IT", "Data Centers", "Data Storage", "Ukraine ", "Mobile Phone"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"thirdpart\"> <p>When the InfoSec risk affecting the most people in a week is&nbsp;<a target=\"_new\" href=\"http://www.troyhunt.com/2014/05/the-mechanics-of-icloud-hack-and-how.html\">abuse of their &ldquo;where&rsquo;s my iPhone/iPad&rdquo; app in an extortion attempt</a>, that might indicate it&rsquo;s been a...</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f957b09aa9157e8f5a7fc171e63d8a11","url": "--and-the-dbir-happened","title": ".......And the DBIR happened....","published": "2014-06-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > I just realized the other day that we never announced the release of the 2014 DBIR from our blog. Truth be told, we&rsquo;ve been neglecting the blog in many ways lately (which we will remedy), but it seems a step beyond neglect not to mention our flagship publication.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9bee1a78fbc08614c9bcefaf28d587fe","url": "weekly-intelligence-summary-lead-paragraph-2013-03-15","title": "Weekly Intelligence Summary Lead Paragraph: 2013-03-15","published": "2013-03-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Jay-Z", "James Bond", "Joe Biden", "Hollywood", "Hillary Clinton", "Gangs"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">James Bond, Nikita, Jason Bourne, Ethan Hunt and Jack Ryan Jr. are fuming because Microsoft patched their favorite &ldquo;plug in a thumb drive and steal everything vulnerability&rdquo; with&nbsp;MS13-027. In addition to ruining Hollywood spy tradecraft,&nbsp;Microsoft released six other bulletins&nbsp;to patch 20 vulnerabilities across its product footprint. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cd56becc55f925919305f7b16aaf1c32","url": "weekly-intelligence-summary-2011-09-23","title": "Weekly Intelligence Summary: 2011-09-23","published": "2011-09-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Mitsubishi Group", "Japanese", "Malware", "Latin America", "Venezuela", "Kawasaki", "Automotive", "National Security", "The Financial Times", "Japan ", "Mitsubishi Heavy Industries", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The InfoSec vocabulary word for the week: “saibā kōgeki.” Mitsubishi Heavy Industries (MHI), Kawasaki Heavy Industries and Ishikawajima Heavy Industries, all Japanese Defense manufacturers, reported attacks to the National Police Agency. Targeted e-mail attacks with stealthy Trojans were used in the attacks on MHI. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8d67cfb3d65f39c8c969e0fe3d37613f","url": "weekly-intelligence-summary-2011-09-16","title": "Weekly Intelligence Summary: 2011-09-16","published": "2011-09-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Occupy Movement", "Wall Street"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Anonymous is scheduled to release a new DoS tool, Refref, on Saturday 2011-09-17. They will also attempt a protest in the real world,Occupy Wall Street, and will stage similar protests in a handful of other cities on the same day. The Anonymous collective can be a significant threat. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e5554d61b6046918c8895bf1120b353b","url": "weekly-intelligence-summary-2011-09-09","title": "Weekly Intelligence Summary: 2011-09-09","published": "2011-09-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Headaches", "Flood", "Melbourne", "Heat Wave", "Weather Impact"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The RISK Team sees no imminent threats this weekend that would give rise to increased vigilance or anxiety. Trojans and criminals weren’t the biggest headaches for many InfoSec professionals in the States this week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "de3b3e83e38987376a262f8538f645c4","url": "weekly-intelligence-summary-2011-08-05","title": "Weekly Intelligence Summary: 2011-08-05","published": "2011-08-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Intel", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most useful intel collected this week must be Joe Stewart’s report for Dell Secureworks on HTran due to him providing specific details for bolstering defenses against the threat. Defenders can use the Secureworks report to check for old, dormant evil, ongoing attacks and confound some future intruders. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f71f6124f49498a7af9720eaa26e676a","url": "weekly-intelligence-summary-2011-07-29","title": "Weekly Intelligence Summary: 2011-07-29","published": "2011-07-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Latin America", "Hotels", "Peru", "LiveJournal", "Fraud", "Education (International)", "Cybercrime", "Good News", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Thirty-five million users on South Korean social network site Cyworld suffered a breach of their accounts. LiveJournal suffered from more massive DDoS attacks. Criminals compromised Italy’s cybercrime organization, CNAIPIC, ten web sites operated by Peru’s Ministry of Education and the Congress of the Republic of Philippines. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "818b6fa45e77c3f1503a26d74aedb791","url": "weekly-intelligence-summary-2011-07-22","title": "Weekly Intelligence Summary: 2011-07-22","published": "2011-07-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["United States Military", "Sun", "Personal Finance", "Zeus", "NATO", "Cybercrime", "Google Plus", "Data Breach", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Two different attack campaigns were reported that targeted US military and intelligence contractors this week. LulzSec came out of retirement to attack News International and the Sun Newspaper in the UK, and claimed they have a gigabyte of NATO files. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "da5a9e5803c8c30090680a6a338af17a","url": "weekly-intelligence-summary-2011-07-15","title": "Weekly Intelligence Summary: 2011-07-15","published": "2011-07-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["David Beckham", "Case Management", "Military", "The Pentagon"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It had been relatively quiet tracking important InfoSec risk intelligence, but that all ended this week. We tracked attack reports against Booz Allen Hamilton, Monsanto, Toshiba, David Beckham, and the Pentagon. Even Microsoft was the target of a reputation attack. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "810b651c6e2d23e35ba81a39dc8adbdc","url": "evidence-based-risk-management-a-new-service","title": "Evidence-based risk management, a new service","published": "2011-07-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Podcast", "InSecurity", "About.com", "Data Breach", "Risk Management", "Information Security", "Security", "Computer & Network Security", "Education", "Innovation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Ever want your own Data Breach Investigations Report?  In case you missed it, Verizon's Risk Intelligence &amp; Innovation groups have introduced a newservice, our Incident Analytics Service (IAS). We're very excited that the IAS service will produce insight and new research in Information Security over the next few years.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "16521420c9f8a554a02a9ba5c40f53d9","url": "weekly-intelligence-summary-2011-07-01","title": "Weekly Intelligence Summary: 2011-07-01","published": "2011-07-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Bacteria & Viruses", "United Nations", "Cybercrime", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Human wave cyberattacks. A horde of “trained” cybercriminals will be coming over the hill at us just as the Black Hat and Defcon conferences take place. Really—it’s in Network World; it must be true. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0cfa84c4c3706d4d316f36cc36b0c3f1","url": "weekly-intelligence-summary-2011-06-24","title": "Weekly Intelligence Summary: 2011-06-24","published": "2011-06-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Personal Data Security", "Fraud", "Bitcoin", "Tax", "Zeus", "Cybercrime", "Income Tax", "Taxes", "Las Vegas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week we learned Distribute.IT, an Australian hosting company was compromised on 2011-06-11, and the data from 4,800 web sites was wiped with no local backups. StartSSL, an Israeli Certification Authority, was compromised last weekend and has ceased operations but claimed no fraudulent certificates were issued. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6f8bdff615b603a3227a3eaf65838161","url": "2011-data-breach-investigations-report-released","title": "2011 Data Breach Investigations Report released","published": "2011-04-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Here we are again - our fourth installment of the DBIR series (sixth if you count the ’08 and ’09 mid-year supplementals). To our readers, it may seem like the 2010 DBIR published ages ago. To us, it feels more like yesterday. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0506caec2f2e7eea00252747a70b2030","url": "weekly-intelligence-summary-2011-03-11","title": "Weekly Intelligence Summary: 2011-03-11","published": "2011-03-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Japanese", "Malware", "Google Inc.", "Android", "Google Plus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The prayers and thoughts of the Risk Team go out to the Japanese people and especially to our colleagues and their families in Japan; indeed to all people in the Pacific affected by this cataclysm. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9107876c4f698fe786ea9b3d503df2fe","url": "helping-your-cirt-enhance-your-security-management","title": "Helping your CIRT enhance your security management","published": "2011-03-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Michael Lewis", "Security Management", "Zombies", "Oakland Athletics"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In my now (in)famous RSA talk with Josh Corman called \"“The Zombie Apocalypse, Baseball, and Security Metrics,” I mentioned the book Moneyball, in which author Michael Lewis describes how baseball teams used statistical analysis to identify opportunities to make themselves better (more efficient) than their opponents.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6cc66fad94ded55d969ba7ba328d0414","url": "weekly-intelligence-summary-2010-08-27","title": "Weekly Intelligence Summary: 2010-08-27","published": "2010-08-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Bacteria & Viruses", "Switzerland", "Personal Finance", "Military", "Data Breach", "Zurich Insurance Group AG", "Cyber Insurance", "The Pentagon", "PayPal"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Old news tried to dominate the InfoSec risk environment this week: \"DLL planting\" vulnerabilities in Windows go back to 2000. Zurich Insurance was fined £2.28 million for a data breach in 2008. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "caa8a1c3507d61a81c116850c8d8d8d4","url": "dbir-cover-challenge-solved","title": "DBIR cover challenge solved!","published": "2010-08-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Puzzles", "Oklahoma"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Congratulations to our DBIR cover challenge winners! We once again offered cash prizes for the first three individuals to solve our puzzle. We received the second and third place solutions early today. The winners are:</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c42e955b96e8bdc3e7637e9aa9a3b86f","url": "the-apt-goat-rodeo","title": "The APT Goat Rodeo","published": "2010-08-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Rodeo"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Since the release of the 2010 DBIR last week, I’ve been doing some interviews and reading over public feedback. Quite a few times I’ve either been asked directly or read comments regarding our findings on Advanced Persistent Threats (APTs). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5d20fbedac63a6fe3d7ea16592c13f1a","url": "weekly-intelligence-summary-2009-10-09","title": "Weekly Intelligence Summary: 2009-10-09","published": "2009-10-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Business Interruption"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The following is the executive summary paragraph to the weekly Intelligence Summary report Verizon Business Cybertrust Security's Risk Team provides. The purpose is to capture in one paragraph the most risk-significant events, over the past week, from an enterprise perspective.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3145c3647b0ce1526b47cf732e0406c5","url": "lost-productivity-rather-than-attacks-the-real-risk-from-atl-issues","title": "Lost productivity rather than attacks the real risk from ATL issues","published": "2009-07-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Acetaminophen", "Productivity", "Enterprise IT", "Adventurer"],"authors": ["Peter Tippett, David Kennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Peter Tippett and David Kennedy The acetaminophen and antacid consumption in enterprise IT staffs is likely on the increase due to the recent release of two Security Bulletins by Microsoft, one for Internet Explorer and one for Visual Studio. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f6700f1fad7a0de75e55c7da9a75ba01","url": "2009-dbir-demographics","title": "2009 DBIR: Demographics","published": "2009-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Financial Services"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In our minds, there are two very interesting items with regard to demographics in this years report.  The first is that the number of attacks in the financial services industry more than doubled in 2008.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "06a93d8cb4ba84f7a240d2451a8d3f21","url": "2009-dbir-compromised-assets","title": "2009 DBIR: Compromised assets","published": "2009-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Data Centers"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Figure 25 in the 2009 Data Breach Investigations Report (p30) shows that for the big computer crime cases in 2008, the vast majority involved data from servers (Online Data 94% of cases).  In only 17% of all cases were End-User Systems involved in any part of a target.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1f21d6bd5e26a0ce5871332ac94ae7d6","url": "2009-dbir-compromised-data","title": "2009 DBIR: Compromised data","published": "2009-04-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > To my mind, this section included several areas of interest. The sheer number of compromised records we investigated in 2008 is surprising - even to us. Only time will tell how the numbers will stack up in 2009 but we've already worked several large cases this year.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "91d67610a5f579b3d08c200d51689b6f","url": "<img-src=http-www-verizonenterprise-com-gfx-file_icons-rss-png-style=width-16-height-16-border-0px-> <span-class=rsstitle>rss<-span>","title": "<img src=\"http://www.verizonenterprise.com/gfx/file_icons/rss.png\" style=\"width:16;height:16;border:0px;\"> <span class=\"rsstitle\">RSS</span>","published": "2014-06-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"thirdpart\"> \r\n<img src=\"https://pixel.newscred.com/px.gif?key=YXJ0aWNsZT05MWQ2NzYxMGE1ZjU3OWIzZDA4YzIwMGQ1MTY4OWI2Zg==\" alt=\"\" height=\"1\" width=\"1\" class=\"nc_pixel\"/>...</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1fd1074b129ae4ac6473dfb8f599138a","url": "weekly-intelligence-lead-summary-paragraph-2014-06-20","title": "Weekly Intelligence Lead Summary Paragraph: 2014-06-20","published": "2014-06-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "FireEye, Inc.", "World Cup 2014", "Malware", "FIFA", "Denmark", "World Cup 2010", "Android", "ESET", "World Cup", "Football (Soccer)", "Banking", "Anonymous (group)", "Scams"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The 2014 FIFA World Cup kicked off last week and so did hacktivist attacks against the event. Anonymous launched #OpWorldCup to DDoS, deface and breach official World Cup sites and sponsors. Radware has a good round-up of attacks associated with #OpWorldCup on its website. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cdf74c88c9acbd49d89b2c17f4c77333","url": "weekly-intelligence-summary-lead-paragraph-2014-06-27","title": "Weekly Intelligence Summary Lead Paragraph: 2014-06-27","published": "2014-06-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Verizon Communications Inc.", "Office 365", "Personal Data Security", "Hedge Funds", "Fraud", "Advertising Agencies", "Cybercrime", "Chief Financial Officer", "CNBC", "Chinese", "Advertising"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Availability is a key element in InfoSec and lost availability at Microsoft’s Lync on Monday and Office365/Exchange Online/Outlook on Tuesday, though not caused by malice, almost certainly caused more losses than the malicious activity the Verizon Cyber Intelligence Center (VCIC) tracked this week.  “Interesting” but unconfirmed intelligence popped again this week.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "50eee4e5f108ec1a73302ca974880a26","url": "an-interactive-timeline-of-public-breaches","title": "An interactive timeline of public breaches","published": "2014-08-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Visualization"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We recently posted an interactive timeline of public breaches extracted from the VERIS Community Database (VCDB) corpus. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "88e5aa5e6a7d71a8cd55514a1fc44845","url": "is-defense-in-depth-dead-or-is-defense-in-dearth-the-real-problem","title": "Is defense-in-depth dead or is defense-in-dearth the real problem?","published": "2014-07-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Defense Industry", "Cyber Security", "InSecurity", "Cybercrime", "Security", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">DBIR contributor FireEye published a report recently titled \"Cybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model.\" There are a ton of reports in the security industry, but I try to at least I make sure to read the ones our DBIR friends put out. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "88a88a789996d83489cfc49daad3c5fb","url": "creating-the-2014-dbir-cover-challenge","title": "Creating the 2014 DBIR Cover Challenge","published": "2014-07-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Puzzles", "Fine Art", "Data Breach"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">For those of you who do not already know, 6 of the 7 Data Breach Investigations Reports have also featured a supplementary challenge to our readers. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8092b0dcb5f585ab09b42e8be88a9bfb","url": "healthcare-data-breaches-using-vcdb-and-mongo-to-find-answers-part-1","title": "Healthcare data breaches: Using VCDB and Mongo to find answers (Part 1)","published": "2014-07-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Healthcare & Pharmaceutical Industry", "Health Insurance Industry", "Education"],"authors": ["Suzanne Widup"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The VERIS Community Database (VCDB) project was launched last year with the goal of making a freely downloadable, raw dataset of publicly disclosed data breach incidents available for research.  With the Q2 release, the dataset has grown to over 3,500 incidents, each in its own JSON file.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5b358c782a862b3f0e0b0aa439eb2428","url": "weekly-intelligence-summary-lead-paragraph-2014-07-04","title": "Weekly Intelligence Summary Lead Paragraph: 2014-07-04","published": "2014-07-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Secure Email", "Security", "Antivirus", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft was the focus of several InfoSec headlines this week, some of which weren’t particularly flattering. It all started when the company announced it was discontinuing its email security notifications due to new anti-spam laws in Canada. Fortunately, they reversed the decision on Monday. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "965b046820517ba50e227cad5167d5ba","url": "modeling-geographic-ambiguity-with-veris","title": "Modeling geographic ambiguity with VERIS","published": "2014-07-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Modeling", "Central & South America", "South America", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Often times when we’re modeling an incident with VERIS we get ambiguous information about an actor or a victim. This is most often the case when we are modeling incidents for the VERIS Community Database or when processing contributions from some of our partners. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2789ce81da08ff71cac6a1db0d07a38a","url": "how-ics-security-can-impact-retail-business","title": "How ICS Security can Impact Retail Business","published": "2014-07-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware", "Software", "Automation", "Computer Software"],"authors": ["Rafeeq U Rehman"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Create a plan to fix identified gaps well before the start of the holiday season. Most of these companies put a “freeze” on any changes before the holiday season starts.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "81758182d31d97dd556bdf6249e974d2","url": "weekly-intelligence-summary-lead-paragraph-2014-07-11","title": "Weekly Intelligence Summary Lead Paragraph: 2014-07-11","published": "2014-07-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "International Affairs", "Malware", "Intel", "Sao Luís", "China", "Theft", "Zeus", "Norway", "São Paulo"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week’s intelligence spanned an unusually wide range of aspects of InfoSec risk.  Samsung experienced a US$38 million dollar theft of products from their manufacturing facility outside São Paulo.  Attacks on international affairs think tanks, the U.S. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0e3899dd8e5523f71f90cb96eed4fdac","url": "weekly-intelligence-summary-lead-paragraph-2014-07-18","title": "Weekly Intelligence Summary Lead Paragraph: 2014-07-18","published": "2014-07-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Palo Alto Networks", "Intel", "Silicon Valley", "Antivirus", "McAfee, Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Reports on targeted campaigns and malware, both old and new, led the VCIC’s intel collections this week. More reports surfaced on the Pitty Tiger campaign reported in last week’s INTSUM, including intel from McAfee linking an attack on a French company to the Pitty Tiger group. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "00db6db2779c3a6eb3b1ef3f9810f4cc","url": "this-framework-ain-t-big-enough-for-the-both-of-us","title": "This framework ain't big enough for the both of us.","published": "2014-08-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Business-to-business (B2B)", "Dentistry", "Banking"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We have modeled many, many cases into the VERIS framework and early on in our own adoption we realized that a seemingly simple question isn't always so simple.  One such question is \"Who is THE victim?\". </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "066e678e13a55c675609a7dcacfcb3f6","url": "weekly-intelligence-summary-lead-paragraph-2014-07-25","title": "Weekly Intelligence Summary Lead Paragraph: 2014-07-25","published": "2014-08-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["WebMetro", "European Central Bank"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The VCIC collected reports of several high-profile attacks this week.  The web site of Metro International, publisher of dozens of newspapers around the world, was compromised and an iFrame injected that redirected visitors to a site hosting the RIG exploit kit. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "484c86395e56204002f663a68e4381bb","url": "weekly-intelligence-summary-lead-paragraph-2014-08-01","title": "Weekly Intelligence Summary Lead Paragraph: 2014-08-01","published": "2014-08-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Intel", "Android", "Cyber Security", "Airbus", "Security", "Asia-Pacific", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Malware reports comprise the bulk of our collections of enterprise risk intelligence this week.  Kaspersky’s intel team was especially productive; they expanded our assessment of threat actor “Energetic Bear.”  They also reported a takedown of the Koler Android ransomware and the infrastructure behind it. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5148221126efbec7fbdbd0d71fecba59","url": "weekly-intelligence-summary-lead-paragraph-2014-08-08","title": "Weekly Intelligence Summary Lead Paragraph: 2014-08-08","published": "2014-08-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Russia", "Automobiles", "Wifi"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">You know it’s the beginning of August when InfoSec headlines like “The World’s Most Hackable Cars” and “Security Researcher Claims He Can Hack Airplanes via Wi-Fi” start making the rounds on social media. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "34dee844bc6209fb96c2b7521c9d8c11","url": "advanced-threat-detection-–-adapting-to-change","title": "Advanced threat detection – Adapting to change","published": "2014-08-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Charles Darwin", "Innovation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There’s no shortage of inspiring quotes echoing timeless truths. Take for example Charles Darwin who once said, “It is not the strongest of the species that survives, nor the most intelligent that survives. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7f7d04a19a1ee22fad9e2c7efc480642","url": "do-not-use-the-force","title": "Do not use the Force.","published": "2014-08-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Information Security", "Security", "Computer & Network Security", "Actor", "Las Vegas"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At bSides Las Vegas, Meredith Patterson gave an excellent talk on game theory.   In it, she explained the basics of game theory.  Game theory is part of Economics and is fundamentally about strategic decision making.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a012aa63c67f5914547a7c9d61ab9601","url": "it-s-campaign-season-and-i-don-t-mean-politics","title": "It's campaign season, and I don't mean politics","published": "2014-08-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Modeling", "Weather", "Hurricanes"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It's campaign season, and I don't mean politics! After all, when you're talking about advanced threats it's always campaign season, right? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "563c28da53dfee1a45f6fa36a121ebf3","url": "weekly-intelligence-summary-lead-paragraph-2014-08-15","title": "Weekly Intelligence Summary Lead Paragraph: 2014-08-15","published": "2014-08-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Google Inc.", "Google Chrome", "Google Plus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The InfoSec risk developments with the broadest impacts on Verizon Enterprise clients were security bulletins for widely deployed systems. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6d60b510b08c607407fd5e850d8a4a48","url": "weekly-intelligence-summary-lead-paragraph-2014-08-22","title": "Weekly Intelligence Summary Lead Paragraph: 2014-08-22","published": "2014-08-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "Heartbleed (bug)", "New Orleans", "Community Health Systems, Inc.", "Payment Card Breach", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Community Health Systems dominated InfoSec headlines this week when it disclosed in its 8-K filing with the SEC that it suffered a data breach that involved the personal information of 4.5 million patients. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1bb7a90fad01dccf0f5dc4e4d0140023","url": "regardless-of-the-length-or-complexity-passwords-can-t-do-it-alone","title": "Regardless of the length or complexity, passwords can't do it alone.","published": "2014-09-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Munich", "Parenting Products and Services", "Parenting"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It is amazing to reminisce about my childhood and the lack of risk reduction applied to me as a potential victim of inertia while riding in a car. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0230c947aaeb64753c676815dfc2f577","url": "weekly-intelligence-summary-lead-paragraph-2014-08-29","title": "Weekly Intelligence Summary Lead Paragraph: 2014-08-29","published": "2014-08-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Norway", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Verizon Cyber Intelligence Center (VCIC) collected actionable intelligence in Fox IT’s “Malvertising: Not all Java from java.com is legitimate,” Kaspersky’s “Sinkholing the Backoff POS Trojan,” and SecureWorks, “CryptoWall Ransomware” from this week’s OSINT. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2359b8d65f12660fe37469e778d4fc69","url": "weekly-intelligence-summary-lead-paragraph-2014-09-05","title": "Weekly Intelligence Summary Lead Paragraph: 2014-09-05","published": "2014-09-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "iCloud", "Cloud Security", "Home Depot", "Cloud Computing", "Data Breach", "Security", "Weird", "Cloud Music", "United States", "The Americas"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Bad news from the retail sector yet again: Brian Krebs reported Home Depot may have suffered a breach of payment card data that may have originated from nearly all of its stores across the United States. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0d1ab48797bd1221d0b845372b835dbb","url": "weekly-intelligence-summary-lead-paragraph-2014-09-12","title": "Weekly Intelligence Summary Lead Paragraph: 2014-09-12","published": "2014-09-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "European Union", "Data Breach", "Banking", "Antivirus", "Adventurer", "Data Protection", "Business Intelligence"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Actionable intelligence in this week’s VCIC collections included security bulletins from Adobe and Microsoft.  Leading the latter was MS14-052 for Internet Explorer that Kaspersky reported was part of the watering hole attack on VFW.org in February. The PCI Council updated their Skimming Prevention: Best Practices for Merchants. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "16c1006eb53c583979c06999785639ee","url": "healthcare-data-breaches-using-vcdb-and-mongo-to-find-answers-part-2","title": "Healthcare data breaches: Using VCDB and Mongo to find answers (Part 2)","published": "2014-10-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Information Security", "Security", "Security and Investigations", "Computer & Network Security", "Healthcare & Pharmaceutical Industry", "Health Insurance Industry"],"authors": ["Suzanne Widup"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Back in July, we looked at working with the VERIS Community Database (VCDB) data to see some basic information about security incidents in the Healthcare industry. Since that time, we’ve completed another update to the dataset, so there are more incidents for us to explore. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "80ccff706557a729c3b6386a058bc3fa","url": "weekly-intelligence-summary-lead-paragraph-2014-09-19","title": "Weekly Intelligence Summary Lead Paragraph: 2014-09-19","published": "2014-09-22T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Home Depot", "JP Morgan Chase & Co. ", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The bulk of the VCIC’s intelligence collections this week were updates surrounding some of 2014’s most noteworthy data breaches. JP Morgan Chase released a terse statement saying that it hasn’t observed any fraud connected to its data breach and that customers wouldn’t be liable if it did. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "00a668c99df13021726d74fb723e20b7","url": "the-importance-of-data","title": "The Importance of data","published": "2014-10-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity", "Information Security", "Security", "Computer & Network Security"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Recently in information security defense, there has been a large push towards the data.  This post will try to explain why. First, what is our goal?  What is winning?  Winning is actually very simple.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b528c1e85eb383d534668223606cab19","url": "wade-baker-on-c-span-discussing-security-breaches","title": "Wade Baker on C-SPAN discussing security breaches","published": "2014-09-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Home Depot", "JP Morgan Chase & Co. "],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Wade was recently on C-SPAN talking about the scale and types of data breaches that have been occurring and discussing recommended ways to reduce the hacking attempts. He spoke about data breaches at Home Depot, Target, and J.P. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3de5441836894a53b859c28c2c81d797","url": "weekly-intelligence-summary-lead-paragraph-2014-09-26","title": "Weekly Intelligence Summary Lead Paragraph: 2014-09-26","published": "2014-09-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Thomas Jonathan Jackson"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">“Do not take counsel of your fears” – T.J. (Stonewall) Jackson.  With very rare exceptions such as the Morris (1988) and Slammer (2003) worms, the number of times the expression “Now!” is used in InfoSec is seldom proportional to the actual risk that information protectors face.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6444cb836e18bc2d72ab769c156e3283","url": "healthcare-data-breaches-using-vcdb-and-mongo-to-find-answers-part-3","title": "Healthcare data breaches: Using VCDB and Mongo to find answers (Part 3)","published": "2014-10-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Health Insurance Industry"],"authors": ["Suzanne Widup"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In this final installment of the series, we will develop our script to provide even more detail on the incidents in the healthcare sector that the VERIS Community Database (VCDB) contains. If you missed Part One or Part Two, it is highly recommended that you review them.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0f5b0e7cbc5e0e363e47f4d7bff41062","url": "shellshock-and-ebola-or-how-i-learned-to-seek-actionable-intel-and-ignore-the-fud","title": "Shellshock and Ebola: or How I learned to seek actionable intel and ignore the FUD","published": "2014-10-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "Ebola Virus", "Intel", "Information Security", "Security", "Computer & Network Security"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The information security community was thrown into a bit of a tizzy recently with the disclosure of the bash vulnerabilities grouped together under the catchy name \"Shellshock\". Days later the first instance of the Ebola virus was diagnosed on American soil. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5dcf6bfc681f167c738cb8dc10cc191c","url": "weekly-intelligence-summary-lead-paragraph-2014-10-03","title": "Weekly Intelligence Summary Lead Paragraph: 2014-10-03","published": "2014-10-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "JP Morgan Chase & Co. "],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s been a little over a week since the initial Shellshock vulnerability was publicly disclosed. The VCIC is continuing to collect reports of attacks exploiting the vulnerability, on vulnerable products and patching. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "044209e27ce54923b027e0340e741a35","url": "why-every-board-needs-an-independent-infosec-advisor","title": "Why every board needs an independent InfoSec advisor","published": "2014-11-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Cyber Security", "Board of Directors", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In the last year, we have witnessed some very large breaches, some of which were sophisticated. Analysts have learned many lessons and written extensively about these data breaches. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1a7b4dde2ba580640c124ecd9be578d8","url": "i-made-a-million-models","title": "I made a million models.","published": "2014-12-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "Machine Learning"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">1 million, 185 thousand, 960 to be specific.  But let's back up. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "99c66f862fe72a7c8743f5902610cf00","url": "weekly-intelligence-summary-lead-paragraph-2014-10-10","title": "Weekly Intelligence Summary Lead Paragraph: 2014-10-10","published": "2014-10-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Tsunami", "Personal Data Security", "Fraud", "ESET", "Cybercrime", "Data Breach", "Data Centers", "Weather", "Financial Services", "Flood", "Celebrity Interviews", "Espionage", "Weather Impact"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Different facets of DDoS risk were part of this week’s intelligence collections.  Arbor’s quarterly report noted a 42% increase in SSDP reflection attacks.  Cloudmark reported flooding attacks on DNS servers using FQDN requests prepended with randomized sub-domains.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b80802d277da4d2d9b768d08888be950","url": "when-is-an-intelligence-feed-record-new","title": "When is an Intelligence Feed Record New?","published": "2014-12-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A common question we grapple with when evaluating intelligence feeds is \"If I see the same observable twice, what does it mean?\"  This is probably, actually, two questions in one: \"Is my feed sending me the same observation multiple times?\" and \"Is the second observation an observation of a single incident or a new incident?\" These are both tough questions to answer.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "efbcde31ebff83d3569ea04ce05d3f17","url": "weekly-intelligence-summary-lead-paragraph-2014-10-17","title": "Weekly Intelligence Summary Lead Paragraph: 2014-10-17","published": "2014-10-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Panda", "Weather", "Hurricanes"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Vulnerabilities, vulnerabilities and more vulnerabilities. Almost all of which are patched, but some of which are being exploited in the wild. That’s the key takeaway from this week’s intelligence collections. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e41d83823e01c85ce2c0fbe271c37c8e","url": "a-thought-experiment-about-shared-credentials","title": "A thought experiment about shared credentials","published": "2014-12-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Earlier this year the following question was posed to us: \"What is more likely to get compromised by an external attacker? </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4fe46011debb13f03cb3a511bc36111e","url": "weekly-intelligence-summary-lead-paragraph-2014-10-24","title": "Weekly Intelligence Summary Lead Paragraph: 2014-10-24","published": "2014-10-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Malware", "Russia", "Hewlett-Packard Company", "ESET", "National Security", "Antivirus", "Espionage", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s been a busy week especially for collecting risk intelligence on cyber espionage via malware.  Microsoft issued a security advisory after discovery of malicious PowerPoint files that are part of the Sandworm operation and are exploiting a similar, but new vulnerability in OLE.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7b4376281f3998138bbcae259e49c30e","url": "criminals-dress-up-as-apple-pay-for-halloween","title": "Criminals dress up as Apple Pay for Halloween","published": "2014-10-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Fraud", "Cybercrime", "Payments Industry", "Halloween", "Mobile Phone"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Last week, Apple launched it's new mobile payment and digital wallet service called Apple Pay. The service allows you to store credit card details and securely transmit an authorization message to a retailer using your phone. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "948a28b7425637100c98173d9a1d707b","url": "getting-started-with-veris-part-1","title": "Getting started with VERIS (part 1)","published": "2015-05-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Risk Management"],"authors": ["Suzanne Widup"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">VERIS stands for the Vocabulary for Event Recording and Incident Sharing, and is useful for tracking metrics about security incidents (more information is available on veriscommunity.net). The first step in moving your organization towards evidence-based risk management is to know what kinds of attacks you are facing.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9b1f0695c4bd03722bbc469d0fe53372","url": "weekly-intelligence-summary-lead-paragraph-2014-10-31","title": "Weekly Intelligence Summary Lead Paragraph: 2014-10-31","published": "2014-10-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Software", "Drupal", "Halloween", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Halloween is here and the security space received its fair share of frights this week. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e2b13486ea1f20019656df0ce7f12af5","url": "context-graph-based-analysis-of-apple-pay-domains-part-1-of-3","title": "Context graph-based analysis of Apple Pay domains - Part 1 of 3","published": "2014-11-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity", "Information Security", "Security", "Computer & Network Security"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Executive Summary Intelligence is a hot topic in information security. However, it is widely known that most of what is referred to as 'intelligence' is really 'data' in the form of IPs, domains, and executables categorized as malicious.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7b4bb53f39a38713827327851a2fed52","url": "context-graph-based-analysis-of-apple-pay-domains-–-part-2-of-3","title": "Context graph-based analysis of Apple Pay domains – Part 2 of 3","published": "2014-11-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Graph"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In our previous post, we looked at the initial creation and enrichment of a Context Graph centered around newly created Apple Pay domains.  We looked at the distribution of the Apple Pay topic throughout the graph.  In this post we will statistically compare and contrast individual clusters.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "488a9245820f9a26fda5545f99fb1256","url": "introducing-verum-a-context-graph-system-part-1-of-2","title": "Introducing Verum: A Context graph system - Part 1 of 2","published": "2014-11-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Information Security", "Security", "Computer & Network Security"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction In this blog post, we will discuss the Infrastructure, schema, and algorithms used in the post here to analyze domains created after the Apple Pay announcement. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "df11790d69b99ab30198e7ba8f7ca2fd","url": "introducing-verum-a-context-graph-system-part-2-of-2","title": "Introducing Verum: A Context graph system - Part 2 of 2","published": "2014-11-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As a complement to our second Apple Pay analysis post, we continue our discussion of the Verum system.  If you haven't read the previous post on Verum, please check it out! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "bf2a9b6cd2f2b74c667b29760b831e33","url": "context-graph-based-analysis-of-apple-pay-domains-–-part-3-of-3","title": "Context graph-based analysis of Apple Pay domains – Part 3 of 3","published": "2014-11-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Validation"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In our previous posts we identified Apple Pay domains created after the Apple Pay announcement here.  We then aggregated them in a context graph and analyzed the features of the graph here.  We then statistically analyzed the individual clusters here.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ddc70e64df95beab390ad4bc55016aef","url": "weekly-intelligence-summary-lead-paragraph-2014-11-07","title": "Weekly Intelligence Summary Lead Paragraph: 2014-11-07","published": "2014-11-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "Antivirus", "Sophos"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft announced intentions to release sixteen security bulletins next week.  Sixteen is the most the company has released in one month since June 2011 and one under April 2011’s high water mark.  The VCIC dedicates extra effort to targeted attacks.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3423cd08f64a8b4df72ba0dd2351ce8e","url": "twitter-and-information-security-awareness","title": "Twitter and information security awareness","published": "2014-11-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Affect", "Twitter Inc", "Information Security", "Security", "Computer & Network Security", "Social Media"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Wow! If Heartbleed was an 11 (on scale of 10) Shellshock is probably a 12 as it will affect many more computers! http://t.co/c7ivKcdMHa — William H. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "03cee507f711c8406ec2938a5d0ba11a","url": "weekly-intelligence-summary-lead-paragraph-2014-11-14","title": "Weekly Intelligence Summary Lead Paragraph: 2014-11-14","published": "2014-11-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Antivirus", "Adventurer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The majority of intelligence collected by the VCIC this week could easily be organized into two categories: serious vulnerabilities and noteworthy attacks. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a2a5256a7606a34174f1f67d525a5cc0","url": "weekly-intelligence-summary-lead-paragraph-2014-11-21","title": "Weekly Intelligence Summary Lead Paragraph: 2014-11-21","published": "2014-11-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Coffee", "ESET", "Outdoor Sports"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Tuesday, Microsoft released MS14-068 out-of-cycle to mitigate a vulnerability in Kerberos that could be exploited to take over Windows domains.  The severity of the impact of a successful attack drove our recommendation for a 30-day deployment and pre-planning for a much shorter fuse if risk changes.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3298a69c097575e843617acdde106fa2","url": "weekly-intelligence-summary-lead-paragraph-2014-11-28","title": "Weekly Intelligence Summary Lead Paragraph: 2014-11-28","published": "2014-12-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Sony Pictures", "Sony", "Outdoor Sports"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The “Regin” espionageware platform dominated risk intelligence collections. Mashable published a good general summary of Regin. But the risk is almost certainly greater from the latest Adobe Flash vulnerability for Verizon Enterprise clients. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9635db3bd2667ab88fa6be1516d8c324","url": "making-informed-decisions-by-using-meaningful-security-metrics","title": "Making informed decisions by using meaningful security metrics","published": "2014-12-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">While security metrics are used in a number of ways, the ultimate purpose of security metrics is to support the decision-making process. Making informed decisions is key to effectively manage information security risk. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1b3e7c30efc04dc8e0d12adc97fb2442","url": "weekly-intelligence-summary-lead-paragraph-2014-12-05","title": "Weekly Intelligence Summary Lead Paragraph: 2014-12-05","published": "2014-12-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Sony Pictures", "Malware", "Firefighters", "United Nations", "Symantec Corporation", "North Korea", "Kim Jong-un", "Sony", "Law Enforcement", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s been a week since news of an incident at Sony Pictures began to surface and new reports collected in that timespan show the company suffered a significant breach. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6adf34dcd3651ad079abafefb5c1d58e","url": "weekly-intelligence-summary-lead-paragraph-2014-12-12","title": "Weekly Intelligence Summary Lead Paragraph: 2014-12-12","published": "2014-12-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Sony Pictures", "Malware", "Intel", "Symantec Corporation", "Sony"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Let’s get Sony out of the way first.  There has been no significant new actionable intelligence gathered regarding this breach.  The folks at Risk Based Security have an excellent timeline of the Sony Pictures breach that’s full of details, some analysis and no hyperbole. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9d33ffeb2272ddb4baa8832b6104926c","url": "the-2014-data-[in]security-hall-of-fame","title": "The 2014 Data [In]Security Hall of Fame","published": "2014-12-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "InSecurity", "Computer & Network Security", "Holidays"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Ahh the holidays. A time when we think about goodwill towards our fellow man, exchanging gifts, and of course making lists! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c332ca0a55e825f6d2734ded85963832","url": "weekly-intelligence-summary-lead-paragraph-2014-12-19","title": "Weekly Intelligence Summary Lead Paragraph: 2014-12-19","published": "2014-12-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "North Korea", "Fraud", "Cybercrime", "Sony", "Payment Card Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Let’s get Sony out of the way first…again. The Guardians of Peace leaked more documents this week stolen during November’s breach. It doesn’t end there. The FBI officially pinned the attack on the government of North Korea. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "63703638953a2d214db4c3bf1c52c7b4","url": "weekly-intelligence-summary-lead-paragraph-2014-12-26","title": "Weekly Intelligence Summary Lead Paragraph: 2014-12-26","published": "2015-01-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Sony Pictures", "Malware", "Intel", "Salesforce.com Inc", "Sony", "International Olympic Committee", "Wordpress"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Leading the collections of actionable intelligence this week is the joint report from Group-IB and Fox-IT on “the Anunak Group” mostly targeting Eastern European banks, but recently adding retail and media-relations organizations in the US, Australia, Spain and Italy; most of its 14-pages include indicators of compromise (IOC). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "78bc827eb71f13e5abdb51da333dd0e8","url": "weekly-intelligence-summary-lead-paragraph-2015-01-09","title": "Weekly Intelligence Summary Lead Paragraph: 2015-01-09","published": "2015-01-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Theft", "Bitcoin", "Data Breach", "New Year's Eve", "New Year", "Massachusetts"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Bitstamp, a bitcoin exchange, had their New Year’s ruined by the theft of 19,000 bitcoins, (US$5.2 million at the time) but nothing has been reported about the method or actor responsible.  But Rex Mundi is keeping to their M.O. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "570a342abdea69d7a4931c3139ca5cb4","url": "weekly-intelligence-summary-lead-paragraph-2015-01-23","title": "Weekly Intelligence Summary Lead Paragraph: 2015-01-23","published": "2015-01-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Outdoor Sports", "Advertising"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Surprise attacks on two new vulnerabilities in Adobe Flash Player were prominent in Verizon Cyber Intelligence Center (VCIC) collections this week.  Wednesday, Kafeine reported the Angler exploit kit (EK) was attacking a previously unknown Flash vulnerability, CVE-2015-0311, as well as Flash vulnerabilities patched in November and December.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b764d809f2bf09ea3dfd32110f0f2e60","url": "easy-breach-analysis-with-association-rules","title": "Easy breach analysis with association rules","published": "2015-02-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach", "Alcoholic Beverage"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction A significant amount of the analysis we do around breach data revolves around understanding how often features are seen together.  For example, in the DBIR, Figure 19 on page 15 looks at how often different incident types occur within industry verticals.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9f38c9d8ff50b10aa74bac6b3f824462","url": "weekly-intelligence-summary-lead-paragraph-2015-01-30","title": "Weekly Intelligence Summary Lead Paragraph: 2015-01-30","published": "2015-02-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Two vulnerabilities dominated InfoSec headlines this week. The VCIC assesses you should be concerned about one of them. The other one? Not as much. An Adobe Flash Player vulnerability (CVE-2015-0311) is the cause for concern. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2f3e170c6af35892045f12df98537454","url": "weekly-intelligence-summary-lead-paragraph-2015-02-06","title": "Weekly Intelligence Summary Lead Paragraph: 2015-02-06","published": "2015-02-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Sony Pictures", "Personal Finance", "Business Insurance", "JP Morgan Chase & Co. ", "Sony", "Insurance", "Community Health Systems, Inc.", "Outdoor Sports", "United States", "Health Insurance Industry"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week’s intelligence summary is brought to you by the letter “A” (with apologies to Sesame Street).  Anthem, the second-largest health insurance company in the U.S.A. reported they discovered a data breach last week.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1ab305f889d3e903d093f6c4bafdb25b","url": "weekly-intelligence-summary-lead-paragraph-2015-02-13","title": "Weekly Intelligence Summary Lead Paragraph: 2015-02-13","published": "2015-02-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft’s Patch Tuesday led this week’s intelligence collections as the company released nine bulletins to address 56 vulnerabilities, including critical issues in Internet Explorer, Windows Kernel-Mode Driver and Group Policy. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cf1a3380313b1679ad532a2596b6297c","url": "weekly-intelligence-summary-lead-paragraph-2015-02-20","title": "Weekly Intelligence Summary Lead Paragraph: 2015-02-20","published": "2015-02-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Zeus", "Cybercrime", "IBM", "Identity Theft", "Financial Services", "Antivirus", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Risks impacting the financial services vertical were the subjects of collections affecting Verizon Enterprise clients within that vertical, as well as almost all of our other clients and ourselves.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f4221b688c65a29c58a6c6f352e841d9","url": "weekly-intelligence-summary-lead-paragraph-2015-02-27","title": "Weekly Intelligence Summary Lead Paragraph: 2015-02-27","published": "2015-03-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Vietnam", "Personal Finance", "Google Plus", "Lizard", "Payment Card Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week was a light week as far as intelligence collections go, or at least it seemed that way to the VCIC. That’s not necessarily a bad thing in the InfoSec space. Some of our more notable collections dealt with updates to several highly publicized breaches. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7279f7456dfe564bb14598e856cfb066","url": "weekly-intelligence-summary-lead-paragraph-2015-03-06","title": "Weekly Intelligence Summary Lead Paragraph: 2015-03-06","published": "2015-03-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "China", "ESET", "Data Breach", "Casper WY", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">ThreatConnect released “The Anthem Hack: All Roads Lead to China,” connecting a multitude of dots including those in reports from the FBI, Brian Krebs, CrowdStrike, PWC, and the March 2014 data breach at the U.S. Office of Personnel Management reported in July 2014.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d65f624e3dfa8c16ff2189bf2c0e8d00","url": "weekly-intelligence-summary-lead-paragraph-2015-03-13","title": "Weekly Intelligence Summary Lead Paragraph: 2015-03-13","published": "2015-03-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["U.S. Department of Justice", "Email Marketing", "Theft", "Attack!", "Adventurer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If a week features the second Tuesday of the month, it’s fair to say that week’s open source intelligence collections will feature major security bulletin releases. This week was no different. Microsoft published a hearty 14 bulletins to address 43 vulnerabilities in several of its products. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "de58147ddb621cdf6d65ce8c36dfa74b","url": "malware-and-the-heavy-tail","title": "Malware and the Heavy Tail","published": "2015-03-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Mathematics"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> Introduction TL:DR - There's a lot of math and stuff.  Skip down to the do's and don'ts table and come back to the math later if you want. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cf4e67c5cd0af25c06c56f2f12a3ef4b","url": "dbir-the-missing-section-stolen-creds","title": "DBIR - The missing section: stolen creds","published": "2015-05-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Malware", "Fraud", "Cybercrime", "Intellectual Property Law", "Espionage"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This year the DBIR is more robust, data driven, and profound than ever.  Through it, some clear patterns emerge such as the importance of malware to breaches, the ubiquitous prevalence of phishing, or the two distinct attacker goals of intellectual property or PII/PHI/PEI/PFI.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "95601968b90859487a773514a6c00288","url": "weekly-intelligence-summary-lead-paragraph-2015-03-20","title": "Weekly Intelligence Summary Lead Paragraph: 2015-03-20","published": "2015-03-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Coffee", "Data Breach", "IBM"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We had just settled down with the first coffee of the week when new risk intelligence reports started popping up like dandelions. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "44d8866a7ad277b4ada4b3f9be6bef1b","url": "weekly-intelligence-summary-lead-paragraph-2015-03-27","title": "Weekly Intelligence Summary Lead Paragraph: 2015-03-27","published": "2015-03-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Renewable Energy"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It’s the end of March and you know what that means? It’s time for Cisco to release its semiannual IOS security advisories! This week the company released seven advisories to patch 16 vulnerabilities in its IOS product line. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b02a4f9f155701df7c1cb495c05e1a8a","url": "weekly-intelligence-summary-lead-paragraph-2015-04-03","title": "Weekly Intelligence Summary Lead Paragraph: 2015-04-03","published": "2015-04-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["China", "Indiana", "Federal Government", "Weather", "Flood", "Neustar, Inc.", "Weather Impact", "Censorship"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We’re several weeks into spring, but the only thing the VCIC saw blooming this week were reports of DDoS attacks. New intelligence collected this week revealed DDoS attacks directed at GitHub were being carried out by threat actors based in China. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e986d019087b9d27113b78d1c40d97bb","url": "the-2015-data-breach-investigations-report-is-out","title": "The 2015 Data Breach Investigations Report is out!","published": "2015-04-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As if you didn’t have enough on your plate the week before RSAC, we’ve dropped a 60+ page helping of high-caloric data for you to digest. I know the DBIR isn’t exactly light fare to begin with, but this one takes it to a whole new gastronomic level. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "90fc2e13951ad65b1ca65a42fb901d53","url": "the-other-dbir-database-breach-investigations-report","title": "The Other DBIR: Database Breach Investigations Report","published": "2015-06-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Data Breach"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As we all know, the DBIR is the Verizon Data Breach Investigation Report. But what about Databases? This post will look at breaches of databases in the DBIR data set. We will do this by filtering the veris DBIR data using verisr. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5c59b88b394ba3320b0f09bc96d9e910","url": "the-circle-of-life-a-dbir-attack-graph","title": "The circle of life: A DBIR attack graph","published": "2015-05-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Massage"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction In the DBIR, the vast majority of our breach analysis consists of statistical analysis of data frames, (i.e. spreadsheets) ,derived from VERIS encoded DBIR data.  The VERIS framework is designed to capture breaches as if everything happening in the breach happened at a single point in time. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "345ff380e6a0aad3432306060d26ed63","url": "0-day-campaigns-for-everyone","title": "0'day campaigns for everyone!","published": "2015-04-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Firewall (computing)", "Timber Products"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Has this ever happened to you?  You're on watch in the SOC, watching the threat map, and all of the sudden evil starts scrolling by in the incidents.  Maybe it's your firewall notifying you of outbound beaconing on ports you didn't expect.  Maybe it's unexpected, large, data transfers.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e380ceff73613948531e6a6859c92bd7","url": "weekly-intelligence-summary-lead-paragraph-2015-04-10","title": "Weekly Intelligence Summary Lead Paragraph: 2015-04-10","published": "2015-04-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Malware", "Russia", "Fraud", "Drudge Report", "Cybercrime", "Google Plus", "Renewable Energy", "Banking", "Antivirus", "Advertising"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Malware evolution, including malvertisement campaigns, led the VCIC’s actionable risk OSINT collections this week. Fox-IT reported a malvertisement campaign leading to a Nuclear Exploit Kit (EK) at the site of Google advertising re-seller engagelab[dot]com.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b4d59e207cadd85bf6535594f774eb32","url": "weekly-intelligence-summary-lead-paragraph-2015-04-17","title": "Weekly Intelligence Summary Lead Paragraph: 2015-04-17","published": "2015-04-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "Symantec Corporation", "Data Breach", "Law Enforcement", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The VCIC collected a bevy of comprehensive security reports this week including Trend Micro’s 2014 Targeted Attack Trends analysis and Symantec’s Internet Security Threat Report vol. 20. But you’ll understand if we’re slightly more excited about the release of the Verizon 2015 Data Breach Investigations Report. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2ac01c09e2a51fb18f9ad0b3e0d5cfb4","url": "weekly-intelligence-summary-lead-paragraph-2015-04-24","title": "Weekly Intelligence Summary Lead Paragraph: 2015-04-24","published": "2015-04-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Malware", "White House", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Discriminating intelligence from severe wind advisories in the vicinity of the Moscone Center continues to be more challenging each Spring.  The VCIC extended collection of intelligence on the threat actor responsible for the Pawn Storm campaigns we noted in last week’s INTSUM.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "90a787f21c9c1f2b9a68668690a9205c","url": "the-dbir-attack-graph-redux","title": "The DBIR attack graph: redux!","published": "2015-06-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Data Breach"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In this blog I previously introduced the idea of building an attack graph from the Verizon Data Breach Investigation Report data.  The wheels of industry did not stop with the blog post and we have updates! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3e6bf4fdd7e1b93a778720bbb16e01f3","url": "weekly-intelligence-summary-lead-paragraph-2015-05-01","title": "Weekly Intelligence Summary Lead Paragraph: 2015-05-01","published": "2015-05-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["JavaScript", "Neustar, Inc."],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">“By Thor’s DDoS Hammer!” That’s what members of the VCIC said after collecting several noteworthy reports on denial of service attacks this week. Leading the pack is Arbor Networks’ report of a 334 Gbps attack directed at an unnamed network provider in Asia. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "88eb9618d60a51f998e77194fe5013f7","url": "weekly-intelligence-summary-lead-paragraph-2015-05-08","title": "Weekly Intelligence Summary Lead Paragraph: 2015-05-08","published": "2015-05-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "University of California, Berkeley", "Hotels", "Architecture", "Wordpress", "Health Insurance Industry"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The InfoSec risk intelligence collection probably affecting all Verizon Enterprise clients was the WordPress 4.2.2 security release; coming just ten days after the previous security release.  Sucuri reported attacks in the wild on Wednesday.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "85611580a0ca3cbb98eb14a3f7a16439","url": "weekly-intelligence-summary-lead-paragraph-2015-05-15","title": "Weekly Intelligence Summary Lead Paragraph: 2015-05-15","published": "2015-05-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Venom", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The InfoSec community was snakebit this week by CrowdStrike’s disclosure of the VENOM vulnerability (CVE-2015-3456) in the Floppy Disk Controller component of virtualized platforms using Xen, KVM or QEMU software. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "11155da4fd29b637c1358af32afb80cd","url": "tweetalytics-of-dbir-2015","title": "Tweetalytics of DBIR-2015","published": "2015-05-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cyber Security", "Cybercrime", "Data Breach", "Twitter Inc", "Security", "Social Media"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\"> BREAKING: Verizon 2015 Data Breach Investigations Report Commercially Released Today http://t.co/SqojMWBt1z #DBIR #cybersecurity — Verizon Enterprise (@VZEnterprise) April 15, 2015  Following the public release of DBIR 2015 on April 15, there was a flurry of activity on Twitter. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "25f5a56483e1287fea0fb6001517f3d7","url": "a-dbir-attack-graph-web-app","title": "A DBIR attack graph web app!","published": "2015-06-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Graph"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A few weeks ago, I published a blog on using the DBIR to generate attack graphs.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "00e40bea705221aedab22c0301624f18","url": "weekly-intelligence-summary-lead-paragraph-2015-05-22","title": "Weekly Intelligence Summary Lead Paragraph: 2015-05-22","published": "2015-05-26T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["New Jersey", "Verizon Communications Inc.", "Malware", "Hospitals", "Medical Malpractice", "CareFirst", "Venom", "Data Breach", "Blue Cross Blue Shield Association", "Health Insurance Industry"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">LOGJAM, VENOM, FREAK, POODLE.  The puns practically write themselves.  It’s just the names we’re poking fun at; LOGJAM is real and does require action, but planning and testing, especially failover, must come first.  Bruce Schneier has the most concise observations we’ve collected. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "698d9b0a8fdd36d3684e2f6bfe0720f4","url": "weekly-intelligence-summary-lead-paragraph-2015-05-29","title": "Weekly Intelligence Summary Lead Paragraph: 2015-05-29","published": "2015-06-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Computer Hardware", "Verizon Communications Inc.", "Malware", "Linux", "Pharming", "Linus Torvalds", "ESET", "Data Breach"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The charming InfoSec nickname-of-the-week, courtesy of FireEye, was The Teenage Mutant Malvertiser Network. FireEye also reported a new point of sale malware variant, NitlovePOS.  The Verizon Cyber Intelligence Center continues to collect intelligence on criminal attacks on SOHO and consumer-grade network hardware.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0fc6b8784a7fdba76b08a21ad4888b53","url": "weekly-intelligence-summary-lead-paragraph-2015-06-05","title": "Weekly Intelligence Summary Lead Paragraph: 2015-06-05","published": "2015-06-05T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Data Breach", "Banking"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The VCIC collected several reports this week from promising new intelligence sources. CyberX Labs released an analysis on BlackEnergy 3, which it believes is a new variant in the BlackEnergy malware family capable of exfiltrating data from compromised systems. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ca29fccf91b4cf7c4b901ffdbe353349","url": "mitigations-aren-t-effective-after-the-first-six-a-dbir-attack-graph-analysis","title": "Mitigations aren't effective after the first six (A DBIR attack graph analysis).","published": "2015-06-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction So that title, right?  A bit inflammatory.  Before I explain myself, let me step back and review what we're doing. If you haven't, watch the first 2 minutes of this video or read about the DBIR attack graph here. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "50ca65dc871d0f8dd1df83fdad3d8083","url": "weekly-intelligence-summary-lead-paragraph-2015-06-12","title": "Weekly Intelligence Summary Lead Paragraph: 2015-06-12","published": "2015-06-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">InfoSec intelligence collections this week were driven predominantly by targeted attacks, and fortunately some included actionable observables.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5f774e1683bf16aedefd4e9e9e6b16fa","url": "weekly-intelligence-summary-lead-paragraph-2015-06-19","title": "Weekly Intelligence Summary Lead Paragraph: 2015-06-19","published": "2015-06-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Palo Alto Networks", "Dragon", "Myanmar", "Intel", "Burma", "Silicon Valley", "Antivirus"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Palo Alto Networks’ Unit 42 may have been one of the most active security teams in the InfoSec space this week after it published reports on the Lotus Blossom campaign targeting Southeast Asian governments, Evilgrab malware being distributed via a strategic web compromise in Myanmar, and the KeyBase keylogger family of malware. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6527dc8b055ae67e4be748b31be4471d","url": "weekly-intelligence-summary-lead-paragraph-2015-06-26","title": "Weekly Intelligence Summary Lead Paragraph: 2015-06-26","published": "2015-06-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Working Remotely", "U.S. Congress"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The developments in InfoSec risk this week that almost certainly had the greatest impact on Verizon Enterprise clients were zero-day attacks on a new vulnerability in Adobe Flash Player and release of a security bulletin by Adobe.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f7ee964e74d0566000c93c82ea966c1c","url": "twitter-for-infosec","title": "Twitter for Infosec","published": "2015-07-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Career How-To", "Information Security", "Security", "Computer & Network Security"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">TL:DR Yes, twitter is awesome for infosec folks.  Create an account, follow this list, post about infosec stuff you're passionate about, and don't post anything you wouldn't share during a job interview. Introduction So, a non-technical blog for a change.  I get asked a lot about twitter. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "51e3b8f56c835d1b5b680b9a90da419a","url": "dbir-the-missing-section-phishing","title": "DBIR the missing section: Phishing","published": "2015-07-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "Fraud", "Cybercrime"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Phishing is BIG.  Don't believe me? out of the 2122 breaches in the DBIR this year, 463 included Phishing; over a fifth of them! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "02927d55de6c1ac6ff5135ef8fe98b95","url": "weekly-intelligence-summary-lead-paragraph-2015-07-03","title": "Weekly Intelligence Summary Lead Paragraph: 2015-07-03","published": "2015-07-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Japanese", "Malware", "Penn State", "Mergers and Acquisitions", "Data Breach", "Harvard University", "Banking", "Middle East", "Education"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The evolution of malware and data breach reports comprised the majority of the Verizon Cyber Intelligence Center’s OSINT collections this week.  Surprising none of us, last week’s Adobe Flash zero-day attack was merged into exploit kits within four days.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0e680371ad08c8a047eb011ce62efafc","url": "weekly-intelligence-summary-lead-paragraph-2015-07-10","title": "Weekly Intelligence Summary Lead Paragraph: 2015-07-10","published": "2015-07-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["From Software", "Software", "United Continental Holdings, Inc.", "Aircraft", "Neutrino", "Outdoor Sports", "Stock Exchange", "United Airlines", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Amidst some 400Gb of data stolen by “PhineasFisher” from Italian surveillance software company Hacking Team were exploits for previously unknown Adobe Flash and Windows kernel vulnerabilities.  Within a couple of days, we collected intelligence the Flash exploit had been added to the Neutrino and Angler exploit Kits (EK).  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1a83c4c013904863c3543a03323da3e5","url": "weekly-intelligence-summary-lead-paragraph-2015-07-17","title": "Weekly Intelligence Summary Lead Paragraph: 2015-07-17","published": "2015-07-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Verizon Communications Inc.", "Microsoft", "Microsoft Office", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">InfoSec risk intelligence was not completely dominated by patch management this week. However, mitigating the risks from attacks on insecure software almost certainly had the most widespread impact on Verizon and our clients.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f9041ee529b5cc8320128591579b92c2","url": "internal-vs-external-discovery-in-the-dbir","title": "Internal vs. external discovery in the DBIR","published": "2015-07-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In the DBIR we track who discovered the breach.  It turns out, there's a significant difference in the breaches that are discovered externally vs those discovered internally.  Keep in mind, discovery method is an effect, not a cause.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ee6b05a570d86322b5a354bc643c551e","url": "stagefright-and-security-fright","title": "Stagefright and security fright","published": "2015-07-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware", "Software", "Consumer Products", "Android", "Project Management", "Validation", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Mark Rasch This article originally appeared on Security Currents here. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "97567a092844ecbb34033a5d7d17af2d","url": "weekly-intelligence-summary-lead-paragraph-2015-08-14","title": "Weekly Intelligence Summary Lead Paragraph: 2015-08-14","published": "2015-08-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Verizon Communications Inc.", "InSecurity", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In August’s patching bonanza, we’re all part of an ex vivo experiment to see if “third time’s the charm” applies to Microsoft’s efforts to mitigate the risk from the .LNK files first observed in the Stuxnet worm.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4ff7a268cceec42efb376242db66301f","url": "encryption-as-protection-maybe-not","title": "Encryption as protection? Maybe not.","published": "2015-08-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Palm Springs", "Data Loss Prevention", "Transit", "West Palm Beach FL", "Data Breach", "Florida", "Espionage", "Palm Beach", "Personal Computer"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Mark Rasch, Chief Security Evangelist, Verizon Enterprise Solutions A recent espionage prosecution in West Palm Beach, Florida demonstrates that encryption may not be the panacea that organizations think it is.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ba7045b4f80c98a06e02e1851f96b642","url": "weekly-intelligence-summary-lead-paragraph-2015-08-21","title": "Weekly Intelligence Summary Lead Paragraph: 2015-08-21","published": "2015-08-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation", "Dating", "International Olympic Committee", "Adventurer"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Microsoft released MS15-093, a second out-of-cycle security bulletin in as many months to mitigate attacks exploiting a remote code execution vulnerability in all supported versions of Internet Explorer.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2133d1748c448b271d3d0f2bd59d7040","url": "make-your-own-dbir-charts-part-1-of-4-the-tools","title": "Make your own DBIR charts, part 1 of 4: The tools.","published": "2015-10-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Language & Linguistics", "InSecurity", "Data Breach", "Information Security", "Security", "Computer & Network Security"],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Most people in information security have heard of the DBIR.  What you may not know is that most of the tools to build charts like those in the DBIR are freely available, either commercially or published by the DBIR team. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "adf87485fcfb8c3f3ed5d2560572368b","url": "make-your-own-dbir-charts-part-2-of-4-making-veris-data","title": "Make your own DBIR charts, part 2 of 4: Making VERIS data.","published": "2015-10-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction In the last post, we installed the tools we'll need to process VERIS incidents in R.  However, if you want to use your own data rather than ours, you'll need to do a bit more.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6eab624908a05281bd9b1751a8e9d66b","url": "make-your-own-dbir-charts-part-3-of-4-from-json-to-charts","title": "Make your own DBIR charts, part 3 of 4: From JSON to charts.","published": "2015-10-27T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction So whether you came directly here from the first blog, or you chose to generate your own VERIS data as documented in the second blog, you should now have a directory of .json files, (i.e. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "55395433895e3377b8c0a56521fd0d54","url": "make-your-own-dbir-charts-part-4-of-4-see-trends-over-time","title": "Make your own DBIR charts, part 4 of 4: See trends over time.","published": "2015-11-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction In the last blog we created a dataframe from the VCDB data we downloaded, (or potentially your own JSON data if you created your own using the second blog).  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a9298fe8e893bc4374acd019160ff7c8","url": "inside-r-job","title": "Inside (r) Job","published": "2015-08-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Insider trading", "Verizon Communications Inc.", "PublishThis", "Opinion Journalism"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Mark Rasch, Chief Security Evangelist, Verizon Enterprise Solutions In 1981, R. Foster Winans was a reporter for the Wall Street Journal, writing the “Heard it on the Street” column.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2fd934a35625874303b2e1fac27d6454","url": "weekly-intelligence-summary-lead-paragraph-2015-08-28","title": "Weekly Intelligence Summary Lead Paragraph: 2015-08-28","published": "2015-08-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Symantec Corporation", "Telstra", "Zeus", "Dating", "Computer & Network Security", "Adventurer", "Sphinx", "Australian Companies"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Multiple reports of malvertisements are the risk intelligence collections pertinent to most of our clients this week.  Almost all Verizon Enterprise clients were likely to have users exposed to malvertisements by visiting MSN sites or Telstra’s home page and perhaps even dating site PlentyofFish.com. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cad817ecd07b804991696e75a544c07c","url": "weekly-intelligence-summary-lead-paragraph-2015-09-04","title": "Weekly Intelligence Summary Lead Paragraph: 2015-09-04","published": "2015-09-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Verizon Communications Inc.", "Personal Data Security", "Japanese", "Malware", "Palo Alto Networks", "Myanmar", "Russia", "Fraud", "Burma", "Electronic Frontier Foundation", "Cybercrime", "IBM", "National Security", "Banking", "Silicon Valley", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Several of the Verizon Cyber Intelligence Center’s (VCIC) collections this week were about targeted attacks.  Trend Micro and Clearsky collaborated on a re-assessment of Rocket Kitten’s activities that have some affinity to Iranian national security interests. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e48d23fdc7f4fa6d990abf00fc17c63f","url": "incident-discovery-and-containment-average-is-over","title": "Incident discovery and containment: Average is over.","published": "2015-09-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Gabe Bassett"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Introduction Recently we received an email to the DBIR email address asking about the average time to discovery and containment of an incident.  We pride ourselves on trying to answer all legitimate data questions that come to the DBIR email address so I spent some time on it.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3d7649f83d4904e17a7a497622dbd10d","url": "weekly-intelligence-summary-lead-paragraph-2015-09-11","title": "Weekly Intelligence Summary Lead Paragraph: 2015-09-11","published": "2015-09-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Lifetime Healthcare", "Google Plus", "Data Breach", "Antivirus", "Good News", "Blue Cross Blue Shield Association", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The principal development in InfoSec risk for this week emerged when Excellus Blue Cross/Blue Shield announced a data breach that had begun in December 2013 lasted until last month and resulted in the compromise of records for at least 10 million people.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5565c1d7ddd8c8d78f1a8f8a8cb6a3de","url": "weekly-intelligence-summary-lead-paragraph-2015-09-18","title": "Weekly Intelligence Summary Lead Paragraph: 2015-09-18","published": "2015-09-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Classified Information", "Malware", "Russia", "Panda", "National Security", "Espionage", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Open source collections this week were predominantly about evolving and emerging malware. These included malware used by actors with an affinity to one nation’s or another’s geopolitical and national security interests.  Proofpoint reported Chinese threat actors launched a campaign in July that targeted the Russian military, and telecoms. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6843ebba31fffd3617cdc4b6eefafad4","url": "weekly-intelligence-summary-lead-paragraph-2015-09-25","title": "Weekly Intelligence Summary Lead Paragraph: 2015-09-25","published": "2015-09-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Intel", "Automotive", "Theft", "Cybercrime", "Data Loss", "Data Recovery", "Volkswagen", "Antivirus", "McAfee, Inc.", "Information Loss", "Computer Software"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">IEEE Spectrum, the flagship for the Institute of Electrical and Electronics Engineers declared, “Volkswagen, which had just become the biggest-selling auto maker in the world, has been nabbed committing perhaps the biggest corporate cybercrime of all time.” Volkswagen lost €14billion in value this week as investors reacted to the news of “cheating” via emission control software manipulation.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6dfabd755ca0a5fd7623ccda4052ad48","url": "weekly-intelligence-summary-lead-paragraph-2015-10-02","title": "Weekly Intelligence Summary Lead Paragraph: 2015-10-02","published": "2015-10-03T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hotels", "T-Mobile USA, Inc.", "Data Breach", "Banking"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Acquiring new incidents for the VERIS Community Database was a leader in InfoSec risk intelligence efforts this week.  Experian announced the “unauthorized acquisition of information” from a server storing the records of 15 million T-Mobile customers and prospects over the last two years. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "31280513e836ab908c40686f44ffc458","url": "weekly-intelligence-summary-lead-paragraph-2015-10-09","title": "Weekly Intelligence Summary Lead Paragraph: 2015-10-09","published": "2015-10-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Verizon Cyber Intelligence Center’s open source collections this week included several reports that are almost certainly accurate, but do not include details that allow us to assess whether the report is simply informational or whether a new development is or probably will become a risk for our clients.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a1d51a528b366ef3003da773e57e8d6e","url": "weekly-intelligence-summary-lead-paragraph-2015-10-16","title": "Weekly Intelligence Summary Lead Paragraph: 2015-10-16","published": "2015-10-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Perhaps as many as 15 million visitors were exposed to malvertising at The Daily Mail last weekend and it was the largest new InfoSec risk exposure for Verizon Enterprise clients.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "58aa53e06521a13f42a0dd5b9c5d07ca","url": "weekly-intelligence-summary-lead-paragraph-2015-10-23","title": "Weekly Intelligence Summary Lead Paragraph: 2015-10-23","published": "2015-10-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Latin America", "Central & South America", "Symantec Corporation", "Russia", "E-Commerce", "Brazil", "The Americas"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">With no dominant trend this week, we’ll simply highlight quality intelligence collections pertinent to InfoSec risk for Verizon Enterprise clients.  Among the most common risks is for users’ systems to be exposed to malvertisements.  Malwarebytes and Symantec reported malvertisement campaigns targeting users in Germany and Brazil respectively.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4fab4128fbbb004dd0f7ebcb38049fc8","url": "weekly-intelligence-summary-lead-paragraph-2015-10-30","title": "Weekly Intelligence Summary Lead Paragraph: 2015-10-30","published": "2015-11-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Bacteria & Viruses", "InSecurity", "International Olympic Committee", "Ikea", "Banking", "Good News"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Two weeks ago, the good news of the week was the arrest of Andrey Ghinkul and takedown of part of the Dridex botnet.  We recognized then that it was not going to snuff out the entire Dridex infrastructure.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "bb08f29bfca7bb03bfc2e937455438a4","url": "weekly-intelligence-summary-lead-paragraph-2015-11-06","title": "Weekly Intelligence Summary Lead Paragraph: 2015-11-06","published": "2015-11-06T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Northern Ireland", "Crime & Law", "Crime", "Cybercrime", "Police", "Renewable Energy", "Outdoor Sports", "Ireland "],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Last week, the executive summary ended with the rhetorical question referring to the TalkTalk breach arrests, “how do we know the lone teenager in Northern Ireland was the only successful intruder?” Softpedia speculated along a similar line, “those who think the police is blindly arresting anyone that has even the slightest involvement with the case.”  In the absence of reliable intelligence to the contrary, the VCIC assesses the Metropolitan Police Cyber Crime Unit has almost certainly assembled cases implicating the individuals they’ve arrested; and the presumption of innocence applies.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "eb2e59f08be2907dcaf2dd41bbc8dd99","url": "weekly-intelligence-summary-lead-paragraph-2015-11-13","title": "Weekly Intelligence Summary Lead Paragraph: 2015-11-13","published": "2015-11-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Linux", "Linus Torvalds", "Outdoor Sports"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Adobe released a security bulletin and new versions of Flash Player addressing 17 vulnerabilities.  None are being exploited in the wild (ITW) yet, but you can bet your bottom dollar the crew behind the Angler Exploit Kit (EK) are working to change that.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6ea55a9b5330784c31c6b8d0f65aaea6","url": "weekly-intelligence-summary-lead-paragraph-2015-11-20","title": "Weekly Intelligence Summary Lead Paragraph: 2015-11-20","published": "2015-11-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Black Friday", "Strontium", "IBM", "Web Application"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If you’re and InfoSec professional who avoids the fun and games known in the US as “Black Friday,” are you in luck!  Coincidentally, several organizations have arranged for you to have hours and hours of professional reading to keep you from going stir crazy.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cf1babb8c903f5a44f3af415bf9399ad","url": "modpos-risk-or-not","title": "ModPOS risk or not?","published": "2015-11-24T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Communications", "Bacteria & Viruses", "Symantec Corporation", "Security", "Encyclopedia"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Multiple IT Security media and blogs have published articles about iSight Partner’s report “ModPOS: Malware Behavior, Capabilities and Communications.”  The initial assessment of this report by the VCIC observes that the indicators of compromise for ModPOS are the same as for Backdoor.</p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "40d100ebd841810af54499fc15fddf44","url": "weekly-intelligence-summary-lead-paragraph-2015-11-27","title": "Weekly Intelligence Summary Lead Paragraph: 2015-11-27","published": "2015-11-30T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Russia", "Cybercrime", "Data Breach", "Good News", "United States", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This week’s good news is brief so we’ll lead with it: The FBI is hot on the trail of “Mr. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8eb67e997dc0d2609796d5caa9f60d3f","url": "weekly-intelligence-summary-lead-paragraph-2015-12-11","title": "Weekly Intelligence Summary Lead Paragraph: 2015-12-11","published": "2015-12-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "Malware", "Symantec Corporation", "Airbus", "Data Breach", "IBM", "Web Hosting"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The data breach with the largest number of victims reported this week was at Tunecore resulting in the compromise of the records of millions of musicians.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c79b6b187080b14bcdd0ce28a7f5bbab","url": "weekly-intelligence-summary-lead-paragraph-2015-12-18","title": "Weekly Intelligence Summary Lead Paragraph: 2015-12-18","published": "2015-12-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "Intel", "Symantec Corporation", "Automotive", "Theft", "ESET", "Joomla", "Airbus", "International Olympic Committee", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">TeslaCrypt was almost certainly the greatest increase in risk to Verizon Enterprise and our clients last week.  Confirming the first alert from Heimdal Security the previous week, on Monday, Symantec reported a TeslaCrypt offensive was underway. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cf110106c552d071a786ad84a754dc08","url": "weekly-intelligence-summary-lead-paragraph-2015-12-25","title": "Weekly Intelligence Summary Lead Paragraph: 2015-12-25","published": "2015-12-28T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Palo Alto Networks", "Symantec Corporation", "Joomla", "Silicon Valley", "Espionage"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The VCIC risk intelligence collections this week did not include any significant new threats to most Verizon Enterprise clients. Palo Alto Networks contributed three superb reports, two on cyber-espionage attacks and the third on ProxyBack malware that has been evolving for 21 months. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "8b46864f6d572e883e4799bae853eafc","url": "weekly-intelligence-summary-lead-paragraph-2016-01-01","title": "Weekly Intelligence Summary Lead Paragraph: 2016-01-01","published": "2016-01-08T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Communications", "JavaScript", "International Olympic Committee"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Again this week, the Verizon Cyber Intelligence Center risk intelligence collections did not include any significant new threats to most Verizon Enterprise clients. ThreatStream provided a credible report of attacks attempting to exploit two vulnerabilities in Juniper ScreenOS. The report includes indicators of compromise (IOC). </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d54ea72cea8aaadcfe9bacfd7046c986","url": "weekly-intelligence-summary-lead-paragraph-2016-01-08","title": "Weekly Intelligence Summary Lead Paragraph: 2016-01-08","published": "2016-01-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Thought & Cognition", "Civil Rights Law", "Ukraine "],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">If you have just returned from vacationing on Tristan da Cunha Island, you may have missed reports of a power outage in Ukraine on December 23rd. The Verizon Cyber Intelligence Center (VCIC) has not concluded this was caused by a cyberattack. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "70e5a0e1e448c667604677b516bd6ca5","url": "weekly-intelligence-summary-lead-paragraph-2016-01-15","title": "Weekly Intelligence Summary Lead Paragraph: 2016-01-15","published": "2016-01-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Thought & Cognition", "Online Storage", "ESET", "Cloud Computing", "Antivirus", "Ukraine ", "Cloud Storage", "McAfee, Inc."],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The most significant challenge the Verizon Cyber Intelligence Center (VCIC) faced this week was discriminating sound intelligence analysis from conclusions influenced by cognitive biases, especially the bandwagon effect.  We’re referring to the causes for power outage in the Ukraine on December 23rd. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e97bc703e54366be435c479ddb1af0ad","url": "weekly-intelligence-summary-lead-paragraph-2016-01-22","title": "Weekly Intelligence Summary Lead Paragraph: 2016-01-22","published": "2016-01-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "OpenX", "Architecture", "Symantec Corporation", "Ad Networks", "IBM", "Identity Theft", "Neutrino", "Outdoor Sports", "Antivirus"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Financial fraud malware was responsible for the most significant changes in InfoSec risk for Verizon Enterprise clients this week.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a652a8672926e33d055ef4c7570320cc","url": "weekly-intelligence-summary-lead-paragraph-2016-01-29","title": "Weekly Intelligence Summary Lead Paragraph: 2016-01-29","published": "2016-02-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Aerospace", "International Olympic Committee", "Antivirus", "Ukraine ", "Brussels"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">For the fourth time in the 12 months, INTSUMs alert clients to the risks from Business Email Compromise (BEC) frauds. Austrian aerospace company FACC AG lost almost €100 million last week; €50 million from a BEC and €43 million lost market cap. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "70a4a47e49b14f74685d88b96269d387","url": "weekly-intelligence-summary-lead-paragraph-2016-02-05","title": "Weekly Intelligence Summary Lead Paragraph: 2016-02-05","published": "2016-02-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Verizon Communications Inc.", "Malware", "Palo Alto Networks", "Hong Kong", "China", "E-Commerce", "Banking", "Silicon Valley", "Chinese"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Malvertising campaigns probably caused the greatest increase in risk for Verizon Enterprise clients' data and ICT this week.  Sucuri Security, MalwareBytes and Heimdal Security each provided detailed intelligence on large-scale malvertising campaigns this week. FireEye, Zscaler and Avira refreshed our intelligence on Dridex banking Trojans.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6137d995fb3586e01af3d48e12b7f2a5","url": "retail-cisos-old-school-threats-still-loom-large","title": "Retail CISOs: \"Old school\" threats still loom large.","published": "2016-02-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "International Security", "Education", "Innovation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by David Grady, Principal Client Partner, Verizon Enterprise Solutions In retail, hyper-competition and razor thin margins necessitate innovation, and innovation means the introduction of new technologies that can keep even the most seasoned CISO up at night. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "10fcbf74475630c6ef9cf972713b6fd2","url": "the-internet-of-things-consider-the-privacy-and-security-implications","title": "The Internet of Things - Consider the privacy and security implications.","published": "2016-02-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Automobiles"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Mark Rasch, Verizon Enterprise Security The Internet of Things (IoT) holds great promise for the future.  Cars, homes, offices, and people themselves will be interconnected.  But with great promise comes great responsibility.  IoT devices collect, store, transmit, aggregate and analyze massive amounts of data.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "ede2bcee7dd9e60dcfe331f408400b56","url": "weekly-intelligence-summary-lead-paragraph-2016-02-12","title": "Weekly Intelligence Summary Lead Paragraph: 2016-02-12","published": "2016-02-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Intel"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Vulnerability and malware intel collections led to most of the actionable intelligence product from the Verizon Cyber Intelligence Center (VCIC) this week. Organizations with Internet-exposed Cisco Adaptive Security Appliance (ASA) firewalls should apply the update to mitigate a remote code execution vulnerability from crafted, fragmented IKE packets. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b69278e130cc70293f4f8a30f21bb557","url": "security-through-the-time-machine and-back-again","title": "Security through the time machine and back again","published": "2016-02-16T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Communications", "Massachusetts Institute of Technology (MIT)", "Architecture", "Cyber Security", "Cybercrime", "Ecosystem", "Security", "MIT", "Computing"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Joan Ross, Managing Principal, Cybersecurity The time honored tradition of “what’s old is new again” has never been truer than in cybersecurity right now.  Post-security breach recommendations currently reference technology deployment that was once considered standard separation architecture two decades ago. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cd7ab9b1b3901af4fef10d8852dba2e9","url": "so-you-want-to-be-a-ciso-here-s-what-senior-management-expects-from-the-successful-job-candidate","title": "So you want to be a CISO? (Here's what senior management expects from the successful job candidate)","published": "2016-02-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "InSecurity", "Board of Directors", "Information Security", "Careers", "Executive Management", "Security", "Computer & Network Security", "Physical Security"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by David Grady, Principal Client Partner, Security Solutions Verizon Enterprise Solutions Congratulations! You’ve got your first-ever interview for a Chief Information Security Officer (CISO) role next week, and you’re psyched.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a2d29f84e5fe02bd244443c463481dc1","url": "weekly-intelligence-summary-lead-paragraph-2016-02-19","title": "Weekly Intelligence Summary Lead Paragraph: 2016-02-19","published": "2016-02-20T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Symantec Corporation", "Hollywood", "Protestant"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There is a new vulnerability in the getaddrinfo function of GNU glibc that can lead to remote code execution. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0b6a6c6275b7342d43eca12c34b18a56","url": "weekly-intelligence-summary-lead-paragraph-2016-02-26","title": "Weekly Intelligence Summary Lead Paragraph: 2016-02-26","published": "2016-02-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["FireEye, Inc.", "Sony Pictures", "Palo Alto Networks", "Sony", "Silicon Valley", "Ukraine ", "VeriSign"],"authors": ["dkennedy"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It was very good week for high-quality InfoSec risk intelligence highlighted by follow up reports on the 2014 attack on Sony Pictures Entertainment and the power outage on December 23rd in Ukraine.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9646414153a8634a1bce72bbe55e550a","url": "data-breach-digest-–-scenarios-from-the-field","title": "DATA Breach Digest – Scenarios from the Field","published": "2016-03-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Data Breach", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by John Grim, Senior Security Specialist, Team Lead RISK Team, Verizon Enterprise Solutions Scenarios from the field. Many data breach victims believe they are isolated in dealing with particularly sophisticated tactics and never before seen malware—we’ve seen otherwise. To us, few breaches are unique. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "7819cdb8da1b482a1345f7517fe07c7b","url": "setting-priorities-in-healthcare-security","title": "Setting priorities in healthcare security","published": "2016-03-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Personal Data Security", "Cloud Security", "Fraud", "InSecurity", "Cybercrime", "Health Insurance Industry"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Mark Rasch, Principal Client Partner, Security Solutions Verizon Enterprise Solutions If you are the CISO of a large healthcare provider, you may be asked to set your goals for the upcoming year.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cbe3bbce4bd833429149310eb383722d","url": "talkin-trash-three-reasons-why-most-confidential-waste-disposal-programs-stink","title": "Talkin’ trash: Three reasons why most confidential waste disposal programs stink.","published": "2016-03-04T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Diving", "Theft", "Data Breach", "Waste Disposal", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by David Grady, principal client partner, Verizon Enterprise Solutions. Web-based hacks and Point-of-Sale (POS) data breaches score the big headlines, but savvy information security practitioners know that paper waste and “opportunistic dumpster-diving” pose significant security challenges, too.   </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f813bbb10f78386d8382fb62418f760c","url": "crypto-malware-–-do-you-play-pay-or-go-on-holiday","title": "Crypto malware – Do you play, pay or go on holiday?","published": "2016-03-07T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Hotels", "Automotive", "Data Breach", "Frequency", "Breakfast"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Darren Windham, Senior Security Specialist RISK Team, Verizon Enterprise Solutions Last week while eating breakfast at the hotel, I noticed a news article citing several new crypto malware incidents. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6e1d58638195da90d5b3a4479406b4c5","url": "one-better-risk-approach…-to-rule-them-all","title": "One better risk approach… to rule them all","published": "2016-03-09T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cyber Security", "Risk Factors", "Data Breach", "Risk Management", "legal compliance", "Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Brianna Carroll Boyle The twin pillars of rapidly proliferating threats and increasingly complex compliance requirements are responsible for the majority of cyber security spending.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9053e6815e607cf920fe8e76ab920b2d","url": "the-resonant-theme-of-rsa-2016","title": "The resonant theme of RSA 2016","published": "2016-03-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware", "Software", "Cyber Security", "InSecurity", "Cybercrime", "Security", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Joan Ross, Managing Principal, Cybersecurity “Attacks against our business infrastructure continue, and we need to get better at security defense” was the prominent theme of RSA Conference 2016. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "73230f03ab8a70e175c899e58a2dd366","url": "back-to-security-basics","title": "Back to (security) basics","published": "2016-03-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cyber Security", "Data Breach", "Security", "Education"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Brianna Carroll Boyle Simple is best.  Follow basic rules.  The best offense is a good defense.  We have all heard these adages countless times.  They apply to school, to sports, even to combat.  And they are just as applicable to cyber security. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e0b077bb402d352811ccc20ce7b71f35","url": "rsa-conference-was-one-for-the-books","title": "RSA Conference was one for the books","published": "2016-03-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["IT Security", "San Francisco", "Cloud Computing", "Information Security", "Security", "Computer & Network Security", "Computing"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By: David Grady, Principal Client Partner, Security Solutions Security solutions providers of all flavors and sizes showcased their wares at the recent RSA conference in San Francisco, but the big money seemed to be in book sales, if foot traffic in the show’s pop-up bookstore was any indication. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "f48aceab0c154c72352556250ed1db73","url": "phishing-for-w-2-data-the-business-email-compromise-bec","title": "Phishing for W-2 data - The business email compromise (BEC)","published": "2016-03-31T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Data Security", "LinkedIn Corporation", "Fraud", "Cybercrime", "Chief Financial Officer", "Internal Revenue Service"],"authors": ["Suzanne Widup"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Over the past several months, there has been a sharp increase in the number of breach incidents reported where phishing has been used to gain access to employee W-2 data.  It has become so prevalent that the IRS issued a bulletin warning about the problem.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e8d78abec3b37e3e6a5233619bf8bbb1","url": "protected-health-information-phi-breaches-sounding-the-alarm","title": "Protected health information (PHI) breaches: Sounding the alarm","published": "2016-03-18T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "Verizon Communications Inc.", "Cyber Security", "Cybercrime", "Data Breach", "Security", "Personal Computer"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Joan Ross, managing principal, cybersecurity, Verizon Enterprise Solutions Customer data breaches are occurring at an alarming rate. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "9ec09e8611b40647dc61cdc614c79350","url": "weekly-intelligence-summary-lead-paragraph-2016-03-18","title": "Weekly Intelligence Summary Lead Paragraph: 2016-03-18","published": "2016-03-21T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Hackers", "Personal Data Security", "Malware", "Palo Alto Networks", "Fraud", "Bangladesh", "Cybercrime", "Taxes", "Outdoor Sports", "Silicon Valley", "Security and Investigations", "Computer & Network Security", "Scams", "United States", "The Americas", "Bangladesh Bank"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by David Fraga Several top-tier domains were victims of a large malvertising campaign associated with the Angler Exploit Kit that targeted news sites, entertainment portals, and political commentary sites.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "66deff6e77993aa6637237ce46ee1cfc","url": "weekly-intelligence-summary-lead-paragraph-2016-03-11","title": "Weekly Intelligence Summary Lead Paragraph: 2016-03-11","published": "2016-03-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Palo Alto Networks", "Cybercrime", "Seagate Technology", "Data Centers", "Data Storage", "Taxes", "Banking", "Silicon Valley", "Security and Investigations", "Scams"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by David Fraga On patch Tuesday Microsoft released cumulative security bulletins for Internet Explorer and Edge web browsers. Both updates are rated critical and address remote code execution vulnerabilities. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5fbcee663a5d477d2b00df9540383e7c","url": "anatomy-of-well-managed-malware-incident","title": "Anatomy of well-managed malware incident","published": "2016-03-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Malware", "Cyber Security", "Cybercrime", "Security", "Computing"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Joan Ross, Managing Principal, Cybersecurity Its 6a.m. when you, the CISO of an organization, are alerted that zero-day malware is running rampant across the Internet, infecting and spreading across your globally connected business.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6ed54de4b1ca595b429f5d1117502fac","url": "briefing-the-board-directing-security-evolvement","title": "Briefing the board: Directing security evolvement","published": "2016-04-29T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["IT Security", "Cyber Security", "InSecurity", "Cybercrime", "Board of Directors", "Directing", "Information Security", "Act-On", "Security", "Computer & Network Security", "Physical Security"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Joan Ross, Managing Principal, Cybersecurity April 28, 2016 If an organization’s Chief Information Security Officer or CISO is not regularly updating the Board of Directors (BoD), there is an inherent disconnect in the security viability of the organization.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b31640beea49eb0c12ad797c71cff6ec","url": "security-maintenance-more-valuable-than-gold","title": "Security maintenance: More valuable than gold","published": "2016-05-10T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Kurt Vonnegut", "Fine Art", "Cyber Security", "Cybercrime", "Data Breach", "Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author:  Joan Ross, Managing Principal, Cybersecurity May 10, 2016 Verizon’s recent annual Data Breach Investigations Report validates what has been a documented and disturbing reality – the lack of methodical security maintenance activities over operations and data -- leads to the majority of security breaches.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "3180117215761bfd47e7f6426dafc9b0","url": "the-spirit-and-intent-of-the-dbir","title": "The spirit and intent of the DBIR","published": "2016-05-13T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["InSecurity", "Data Breach", "Information Security", "Security", "Computer & Network Security"],"authors": ["Marc Spitler"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Marc Spitler May 12, 2016 After publishing the Data Breach Investigations Report for the ninth time, we have been on the business end of some sharp criticism for some data in the Vulnerability section. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "809f483e0f5e62a9e4e1bc8b70cb0f33","url": "phishing-license-training-and-awareness","title": "Phishing license: training and awareness","published": "2016-05-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware", "Software", "Verizon Communications Inc.", "Personal Data Security", "Mergers and Acquisitions", "Fraud", "Cybercrime", "Enterprise IT", "Data Breach", "Computer Software"],"authors": ["Dave Hylender"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Wesley Hamrick Analyst, Enterprise Verizon Enterprise Solutions The Verizon Data Breach Investigations Report (DBIR) has consistently shown that the number one threat to companies– is malicious code injected via successful phishing attacks.  It’s number one in 2016.  It was number one in 2015.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d5d8dc18a4c21293ef9da9c5bb8296af","url": "information-security-for-smbs…who-me","title": "Information security for SMBs…who me?","published": "2016-08-01T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Mark Rasch Security Evangelist Verizon Enterprise Solutions July 29, 2016 The biggest obstacle to building an effective information program at many institutions – particularly small and medium sized businesses (SMB’s) – is not a lack of resources, a lack of knowledge, or a lack of technology.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d2c83cf886f7422819f20d7192996f66","url": "hospitality-customizing-the-perfect-guest-experience","title": "Hospitality: Customizing the perfect guest experience","published": "2016-08-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Travel", "Customer Support", "Business Travel", "Cyber Security", "Cybercrime", "Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Joan Ross, Managing Principal, Cybersecurity The hospitality industry is moving full-speed ahead in creating the ideal travel experience. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6df4a8f0029ae0c8fbae7e0c06466638","url": "what-s-in-your-wallet","title": "What's in your wallet?","published": "2016-08-12T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Times Square", "Loyalty program", "Cyber Security", "Cybercrime", "Security", "Social Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Mark Rasch, Managing Principal, Cybersecurity When workers were tearing down the old Apollo Theater in Times Square, they discovered a cache of men’s wallets and women’s purses hidden in the attic.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6c69c4b2882eacf716cdaf16fced9170","url": "briefing-the-board-directing-security-evolvement","title": "Briefing the board: Directing security evolvement","published": "2016-08-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cyber Security", "InSecurity", "Cybercrime", "Board of Directors", "Directing", "Data Breach", "Act-On", "Security", "Security and Investigations"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Joan Ross, Managing Principal, Cybersecurity If an organization’s CISO is not regularly updating the Board of Directors (BoD), there is an inherent disconnect in the security viability of the organization.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "1934f6a5656120b8785e7934353b34ae","url": "making-the-move-to-managed-security-services","title": "Making the move to managed security services","published": "2016-08-23T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Classified Information", "IT Security", "Cyber Security", "Cybercrime", "Intellectual Property Law", "Information Security", "Security", "Computer & Network Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Joan Ross, Managing Principal, Cybersecurity One of the hardest realities for chief information security officers (CISOs) to confront is what concrete protections can be achieved with the annual resources available to them.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b844691d955adcdb19d89a2eb278a921","url": "making-the-most-of-limited-security-resources","title": "Making the most of limited security resources","published": "2016-08-25T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Ships", "IT Security", "Cyber Security", "Cybercrime", "Data Breach", "Information Security", "Security", "Security and Investigations", "Computer & Network Security", "Physical Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Author: Joan Ross, Managing Principal, Cybersecurity “If your enemy has no ships, building submarines may not be the best use of your limited resources”, a CIO at a recent Verizon 2016 Data Breach Investigations Report (DBIR) session conveyed.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "08f84850ef8504cc91993ee66733524e","url": "data-breach-digest-update-cms-compromise","title": "Data Breach Digest Update: CMS Compromise","published": "2016-09-15T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Malware", "Data Breach"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by John Grim RISK Team/Verizon The Data Breach Digest—released this past February by the Verizon RISK Team—has brought a fresh perspective to the security conversation. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "018450bd0c821e8b8b85a1072de56587","url": "hacktivist-attack-the-dark-shadow","title": "Hacktivist attack - the Dark Shadow","published": "2016-10-17T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cyber Security", "InSecurity", "Data Breach", "Security", "Validation"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by John Grim RISK Team/Verizon The Data Breach Digest—authored and published by the Verizon RISK Team earlier this year—slices through the FUD, the Fear, Uncertainty, and Doubt, that’s so prevalent in the world of cyber security. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "6b0c28b8708f8e43f05f0c11cd8d3402","url": "cyber-insurance-part-v","title": "Cyber insurance part V","published": "2016-10-19T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Communications", "Personal Finance", "Cyber Security", "Cybercrime", "Data Breach", "Security", "Law Enforcement", "Cyber Insurance"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by Mark Rasch, Managing Principal, Cybersecurity You get a call at 2AM from your sysadmin with the four worst words you can hear from a sysadmin.  “Oh, by the way…” You have had a breach.  A big one.  You assemble your internal team.  </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "afef823433a843b3d8ac66c1b5e5c5ec","url": "as-social-engineering-activities-increase-buyer-beware-of-tech-support-scams","title": "As social engineering activities increase buyer beware of tech support scams","published": "2016-11-02T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Verizon Communications Inc.", "Working Remotely", "Scams", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">By Roy Porter Verizon Cyber Intelligence Center Remote Tech Support Report Threat Vector: Social Engineering VCIC has tracked consistent variations in social engineering tactics throughout 2016 to include wire fraud, tech support scams, and tactics used to entice the opening of malicious email attachments. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "5fb8e0b3941f601469e651abc7442678","url": "verizon-s-data-breach-digest-–-perspective-is-reality","title": "Verizon’s Data Breach Digest – Perspective is reality.","published": "2017-02-14T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Computer Hardware", "Software", "Verizon Communications Inc.", "Communications", "San Francisco", "Enterprise IT", "Data Breach", "Security", "Computer Software"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by John Grim RISK Team | Verizon 2017 is here and this means it's Data Breach Digest season. This year, just like last, we released the 2017 Digest at the RSA Conference in San Francisco, CA. What makes this year's Digest different from last year? Stakeholders! </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "af70a4a02f22d4bfb87d2d2182c86209","url": "data-breach-digest-update-data-ransomware-the-catch-22","title": "Data Breach Digest Update: Data ransomware - the Catch 22","published": "2016-11-11T23:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Cyber Security", "Data Breach", "Security"],"authors": ["admin_sec"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">by John Grim RISK Team/Verizon The Data Breach Digest&mdash;a compilation of scenarios issued by the Verizon RISK Team&mdash;was written as a companion to the Data Breach Investigations Report (DBIR). In creating this DBIR companion, we tried to make it both entertaining and informative. </p> ","h1": "","type": "type:analyst:securityblog","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "4eb286951a29b7c9bbb6f1ae3dfbe56a","url": "stopping-self-driving-cars-from-becoming-cybersecurity-weapons","title": "Stopping Self-Driving Cars From Becoming Cybersecurity Weapons","published": "2017-08-18T13:00:00Z","source": "Forbes","pop": 100,"age": 1,"rank": 1, "topics": ["Driverless Cars", "Automobiles", "Automotive", "Cyber Security", "Cybercrime", "Weather", "Volkswagen", "Flood", "Security", "Getty Images", "Weather Impact"],"authors": ["Gil Press"],"images": ["https://images2.newscred.com/Zz05YWRiYzQ3ZjNjMmU4MTNhMjExN2M5YTdjMzA3MDEzOQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At the upcoming 20th annual Black Hat Conference (July 22-27), Billy Rios of Whitescope and Jonathan Butts of QED will present When IoT Attacks: Understanding the Safety Risks Associated with Connected Devices. The talk will demonstrate how to make an IoT device intentionally strike a person.\r\n</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d9c1a25cb383bc4be289fccd67ba745f","url": "benefits-of-telecommuting-for-the-future-of-work","title": "Benefits Of Telecommuting For The Future Of Work","published": "2017-08-16T12:00:00Z","source": "Forbes","pop": 30,"age": 13,"rank": 9, "topics": ["Millennial Generation", "Working Remotely", "Productivity"],"authors": ["Andrea Loubier"],"images": ["https://images4.newscred.com/Zz0yYmFiMTQ0MGE0OTc2MDMxMzgxOTkzODc2NjU4OGVmMw=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A decade ago, working from home may have seemed like a distant dream. Today, it&#8217;s the future of work. With millennials the driving force behind this shift in the workforce, remote work was dismissed as another &#8220;annoying&#8221; millennial trait. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "f972cfe4a261bc0d91a7532fd285d64f","url": "researchers-use-robotics-and-ai-to-make-a-wheelchair-autonomous","title": "Researchers use robotics and AI to make a wheelchair autonomous","published": "2017-08-15T19:16:05Z","source": "Digital Journal","pop": 7,"age": 13,"rank": 43, "topics": ["Spinal Cord", "Lou Gehrig's Disease", "Amyotrophic Lateral Sclerosis", "North America", "Multiple Sclerosis", "Veterans", "Robotics & Artificial Intelligence", "Neurology", "Robotics", "United States", "The Americas", "Education"],"authors": [],"images": ["https://images3.newscred.com/Zz1iMGVjNTMyZWQ1YTU2ODk3MDQwNDQ1ODE5MjRjMzMxYQ=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A collaboration between the academic world and industry has led to the development of a self-driving wheelchair that will be a game-changer for the more than 5 million power wheelchair users in North America, simplifying their lives.  </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "8b306bcff4eb66343c0b340d47de5381","url": "ar-s-future-is-more-than-just-games-it-will-change-the-way-we-make-decisions","title": "AR’s future is more than just games, it will change the way we make decisions","published": "2017-08-15T13:46:25Z","source": "The Next Web","pop": 26,"age": 15,"rank": 11, "topics": ["The Goldman Sachs Group, Inc.", "Virtual Reality", "Computing", "Education"],"authors": ["Ben Dickson"],"images": ["https://images2.newscred.com/Zz0zNWI1Nzk4YWNkZWYyZjJiYWRlZGE4ZGU1NmViMDk4OQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">According to research by Goldman Sachs, the virtual and augmented reality industry will become a $85 billion market by 2025. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "9705886abff6b6171d9a7fe546736b3e","url": "6-reasons-you-can-t-afford-to-go-cheap-on-network","title": "6 Reasons You Can’t Afford to Go Cheap on Network","published": "2017-08-14T12:00:11Z","source": "Verizon Enterprise Solutions","pop": 43,"age": 16,"rank": 5, "topics": ["Building Materials", "Reconstruction", "Timber Products"],"authors": ["Danny Johnson"],"images": ["https://images4.newscred.com/Zz1mYTJhNzQ2MmIzN2I2NTMxMjZiNWM4YWJhZDA1N2RiZg=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "It’s tempting to cut costs when choosing a network, but is it worth the risk of frustration or potential performance issues? Danny Johnson explains 6 crucial factors to consider before signing a contract, and why cheaper isn’t necessarily better. ","h1": "6 Reasons You Can’t Afford to Go Cheap on Network Integration Recommended Internal Link: http://www.verizonenterprise.com/products/networking/","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "10bbbf33fd4655e12fa8ecea7419851b","url": "why-1-634-experts-were-totally-wrong-about-the-future-of-ai","title": "Why 1,634 experts were totally wrong about the future of AI","published": "2017-08-09T18:15:29Z","source": "VentureBeat","pop": 9,"age": 21,"rank": 35, "topics": ["Google Plus", "Cornell University", "Holidays", "Education"],"authors": ["John Brandon"],"images": ["https://images2.newscred.com/Zz0zMTY3OWE3ZDA1NDhlNGRmNjc4MjY3ZmI5MTVlZDdiOQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In his 2016 book But What If We&#8217;re Wrong?, writer Chuck Klosterman makes the somewhat obvious declaration that we&#8217;re usually wrong about the future. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "c10eff53cb685021deabe87d45089f2d","url": "73pc-are-using-internet-of-things-data-to-improve-their-business","title": "73% Are Using Internet Of Things Data To Improve Their Business","published": "2017-08-02T17:00:09Z","source": "Forbes","pop": 14,"age": 27,"rank": 20, "topics": ["Utilities", "India", "United States", "The Americas"],"authors": ["Louis Columbus"],"images": ["https://images3.newscred.com/Zz0yZWQzZjE4ZmE3NjAwMTk4MzhjZTI5Nzc0YzAwMWY5ZQ=="],"category": ["report_category:business_performance"],"industry": ["industry:agriculture"],"summary": "<p thirtyword=\"secondpart\">95% of execs surveyed plan to launch an IoT business within three years.\r\n\r\nThese and many other insights are from the recently published Cisco Internet of Things (IoT) study, The Journey to IoT Value: Challenges, Breakthroughs, and Best Practices published on SlideShare last month. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "aeea8b29ccdeda7b2bca9fa06deb7a4e","url": "the-internet-of-living-things-tracking-dairy-cow-eating-habits","title": "The Internet of (Living) Things: Tracking dairy cow eating habits","published": "2017-08-01T14:15:00Z","source": "NetworkWorld","pop": 41,"age": 29,"rank": 7, "topics": ["Deere & Company", "Physics", "Farming"],"authors": ["Ben Kepes"],"images": ["https://images3.newscred.com/Zz00NTgxOGQ2ZWQyOTI0NWE4ZjQ5YTJkMjMzYTRmZWVmYQ=="],"category": ["report_category:internet_of_things"],"industry": ["industry:agriculture"],"summary": "<p thirtyword=\"firstpart\" > Consumer Physics is all about enabling people to get a better handle on their field, receiving dock or production line. The company offers the SCiO pocket-sized spectrometer, which enables farmers and agricultural organizations to analyze the makeup of the forage that dairy cows are grazing.</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "40eaba9bb6097bcef0f9f82d78b598ce","url": "need-a-ball-or-umbrella-in-china-there-s-a-sharing-app-for-that","title": "Need a ball or umbrella? In China there's a sharing app for that","published": "2017-07-31T17:21:00Z","source": "AFP Relax News","pop": 13,"age": 29,"rank": 24, "topics": ["Mobile Technology", "Automobiles", "China", "Yüan", "China Business", "Payments Industry", "Rainbow", "Chinese"],"authors": [],"images": ["https://images4.newscred.com/Zz04ZWNhMzgwMjdmYzRhNjc5NGRlOWI4YmIxYjAyMGE5Yg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Basketballs, electric scooters and rainbow-coloured umbrellas -- nothing seems out of bounds in China's booming \"sharing economy\".\r\n</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "95d46d6fd822a381c9f873eb4ee1482d","url": "constant-digital-transformation-is-now-the-new-norm","title": "Constant digital transformation is now the new norm","published": "2017-07-27T20:00:03Z","source": "Raconteur","pop": 11,"age": 34,"rank": 29, "topics": ["The Matrix", "Keanu Reeves"],"authors": ["Stephen Armstrong"],"images": ["https://images3.newscred.com/Zz03MWM5OTM2ZjZlY2Q2OWU5Yjc1M2U4OTY3YzE3NzU3Mg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Digital transformation is a little bit like The Matrix. At the start, Keanu Reeves is noodling around with a couple of PCs, a consultant enters his life and encourages him to see the world as a huge technical matrix. Understanding this system properly will give him great power. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "ec1b84e84a94caef715509c34a002342","url": "how-the-cloud-has-changed-education-and-training","title": "How the cloud has changed education and training","published": "2017-07-25T17:02:00Z","source": "The Next Web","pop": 8,"age": 36,"rank": 39, "topics": ["Computer Hardware", "Software", "Education (International)", "Cloud Computing", "Computing", "Computer Software"],"authors": ["Ben Dickson"],"images": ["https://images1.newscred.com/Zz0xNzdlZDMyMDdlYmMwNDk4YWFmMTVmZDc2OWJlMTVmNA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A few years ago, the cloud was a promise to reduce costs of IT and improve flexibility and scaling by providing on-demand computing, storage and services to every organization.\r\nToday, the cloud is a ubiquity we take for granted. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "24202a0e28f781cb8594942f806f9fb0","url": "virtual-reality-can-rejuvenate-advertising-but-it-won-t-solve-every-business-problem-says-report","title": "Virtual Reality can rejuvenate advertising but it won’t solve every business problem, says report","published": "2017-07-25T16:32:54Z","source": "The Drum","pop": 5,"age": 36,"rank": 63, "topics": ["Virtual Reality", "Vibrant Media", "Advertising"],"authors": ["Ayesha Salim"],"images": ["https://images3.newscred.com/Zz1mNWZjMTEyZjQwNDUwYzMzZDk3YmRlNGUwOTExNTY2Mg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Advertising experiences in Virtual Reality (VR) and Augmented Reality (AR) offers plenty of potential to get consumers interested in advertising again &#8211; but brands and advertisers still need to overcome the high cost, ROI, and storytelling challenges associated with creating these experiences.</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "9327080565d6c85331c6936712c84a3a","url": "is-location-intelligence-the-key-to-citizen-centric-smart-cities","title": "Is location intelligence the key to citizen-centric smart cities?","published": "2017-07-25T16:31:15Z","source": "ReadWrite","pop": 13,"age": 36,"rank": 23, "topics": ["City Planning", "Career How-To", "Public Management", "Parks and Recreation", "Traffic", "Driving Safety", "Public Safety"],"authors": ["Cate Lawrence"],"images": ["https://images2.newscred.com/Zz01NjZmMGQxZjZlYTlkZGY5N2UwNzM4OWQxMDgwNjJlMQ=="],"category": ["report_category:internet_of_things"],"industry": ["industry:energy_utilities"],"summary": "<p thirtyword=\"secondpart\">Anyone who works in the smart city space knows the power of data: it&#8217;s held up as the rich oil that can be revealed through smart sensor technology embedded throughout the public landscape including train stations, parks and recreation areas and various neighborhoods or districts. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "cb8da1585fe2aec07d616aab4c450832","url": "augmented-reality-is-already-changing-the-way-big-companies-do-business-msft-goog-googl-aapl","title": "Augmented reality is already changing the way big companies do business (MSFT, GOOG, GOOGL, AAPL)","published": "2017-07-19T13:00:05Z","source": "Business Insider","pop": 9,"age": 41,"rank": 33, "topics": ["Google Inc.", "Mark Zuckerberg", "Microsoft", "Apple", "Google Plus", "Apple iPhone", "Technology Industry", "Facebook", "Computing", "Mobile Phone"],"authors": ["Matt Weinberger"],"images": ["https://images2.newscred.com/Zz00MzRhNDAyZTgyNWJiODY4OGFmNDFmYjMzYTFlZTg4NQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">MicrosoftPeople think of the iPhone and the smartphones it inspired as \"revolutionary\" devices.\r\nBut we're on the cusp of something that could represent an even bigger transformation in computing: augmented reality.\r\nAugmented reality, or AR, overlays digital images on top of views of the the real world. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "909a960159667dd6d882ad6e9c1249fd","url": "how-the-internet-of-things-helps-manufacturers-solve-problems-before-they-happen","title": "How The Internet Of Things Helps Manufacturers Solve Problems Before They Happen","published": "2017-07-18T13:00:00Z","source": "PSFK","pop": 16,"age": 43,"rank": 17, "topics": ["Consumer Products", "Supply Chain"],"authors": ["PSFK Labs"],"images": ["https://images4.newscred.com/Zz01N2NmOWY4ZDIxOTZmYjQwNWViMTI5ZDRmMDgyYjk4Zg=="],"category": ["report_category:internet_of_things"],"industry": ["industry:manufacturing_automotive"],"summary": "<p thirtyword=\"secondpart\">Gathering and analyzing feedback from vendors, consumers and members of a manufacturing organization is crucial to a successful supply chain. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "672bb42f9656a732834f61f6bea913e1","url": "robots-could-make-the-uk-over-200-billion-richer-by-2030","title": "Robots could make the UK over £200 billion richer by 2030","published": "2017-07-14T18:00:00Z","source": "Business Insider","pop": 7,"age": 41,"rank": 46, "topics": ["Productivity", "Automation", "Robotics & Artificial Intelligence", "Jobs (profession)", "Gross Domestic Product"],"authors": ["Camilla Hodgson"],"images": ["https://images4.newscred.com/Zz03ZjkwMTQwMGQ1MGJmNDA3MTYyNDQwN2JjMTY4MjUxNw=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Artificial Intelligence (AI) could boost UK gross domestic product by around 10% by 2030, according to a new report by PwC.\r\nGains will be made largely through increasing product choice and consumer demand, the growing&#160;personalisation of products and their increased affordability over time.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "856efe85bf5465feaa4e24ad86c44892","url": "why-now-is-the-time-for-healthcare-to-tap-the-sharing-economy","title": "Why Now Is The Time For Healthcare To Tap The Sharing Economy","published": "2017-07-14T14:38:09Z","source": "HIT Consultant","pop": 6,"age": 15,"rank": 52, "topics": ["Robin Chase", "Automotive", "Zipcar Inc", "Health Insurance Industry"],"authors": ["Our Thought Leaders"],"images": ["https://images3.newscred.com/Zz1iYTQwMzQwMTZjMWIyZWEzNWE5YzM5ODRmZDBkOWQyNg=="],"category": ["report_category:business_performance"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">Editor&#8217;s Note: David Goldsmith is the Chief Strategy Officer at WEGO Health, a&#160;a mission-driven company connecting healthcare with the experience, skills and insights of patient leaders.&#160;WEGO Health identifies patient influencers through a proprietary process that includes combining millions of social media data points with our members own interaction and self-reported information.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "24d239075003593635ce35190fc7c923","url": "why-are-brands-failing-to-connect-with-people","title": "Why are brands failing to connect with people?","published": "2017-07-14T14:35:29Z","source": "The Drum","pop": 12,"age": 41,"rank": 28, "topics": ["Education"],"authors": ["Eddie May"],"images": ["https://images3.newscred.com/Zz1lMzJiMjE4YzBlNmIzZWI4ZjZlMDE3ZjBjNjZlNTVkYQ=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">At The Playbook our mission is to help our clients to move their audience &#8211; emotionally and occasionally physically. 78% of people in our sample feel brands never emotionally connect with them. What does change perceptions of a brand?\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "50e90f3e1afbbfd8e4901af238980b51","url": "ai-sets-the-stage-for-a-new-round-of-retail-innovation","title": "AI Sets The Stage For A New Round Of Retail Innovation","published": "2017-07-07T16:00:00Z","source": "Forbes","pop": 8,"age": 49,"rank": 40, "topics": ["Renaissance", "E-Commerce", "Shopping", "Online Shopping", "Innovation"],"authors": ["Brian Solis"],"images": ["https://images1.newscred.com/Zz1hMjY5NWY5MjczZTc3OTE4MDk1NjhiZDliZWE3OTgwNA=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">The fight between retail and e-tail has been playing out for over 20 years, and it&#8217;s far from over. Now, with the rise of modern commerce, the evolution of how brands sell and how customers buy only continues to push trends forward.\r\n</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "c15ef828ea436d4d81f31ab8d688dd52","url": "cloud-security-spending-will-hit-3-5bn-by-2021-says-forrester","title": "Cloud security spending will hit $3.5bn by 2021, says Forrester","published": "2017-07-06T15:13:00Z","source": "Cloud Pro","pop": 1,"age": 51,"rank": 100, "topics": ["Cloud Security", "SaaS", "Virtualization", "Cloud Computing", "Platform as a service", "Secret Service", "Security", "Education"],"authors": ["Clare Hopping"],"images": ["https://images2.newscred.com/Zz0xMGMzOWE2YTUwODQ3YjA2YjdhOWQzOGI3Y2EwNmZiMQ=="],"category": ["report_category:business_performance"],"industry": ["industry:agriculture"],"summary": "<p thirtyword=\"firstpart\" > Forrester has predicted cloud security spending will increase rapidly to hit $3.5 billion (&#163;2.75 billion) by 2021, as overall cloud spending rises to a staggering $236 billion (&#163;185 billion) by 2020.</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "c7460df48e5e307bfe1f280ae9a13e68","url": "ux-is-the-ultimate-goal-and-ai-will-help-but-brands-still-struggle-with-data-and-channels","title": "UX is the ultimate goal and AI will help, but brands still struggle with data and channels","published": "2017-07-05T14:00:01Z","source": "The Drum","pop": 5,"age": 56,"rank": 64, "topics": ["Salesforce.com Inc"],"authors": ["Lisa Lacy"],"images": ["https://images4.newscred.com/Zz03NjE5NDBmZWJhNjliZDJhZWM3MmI1Y2Q2ZTg3NDI2Mw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As customer experience becomes more of the basis for competitive advantage, more brands are focusing on consistent, personalized experiences, but they struggle with obtaining a single view of each customer and how to deal with data from different sources. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "579f0307c7be727e706f1994f2d4c548","url": "how-to-drive-customer-loyalty-and-repeat-purchases-with-experience–driven-commerce","title": "How to Drive Customer Loyalty and Repeat Purchases with Experience–Driven Commerce","published": "2017-07-05T13:16:05Z","source": "Business2Community","pop": 4,"age": 23,"rank": 71, "topics": ["Online Sales", "Customer Support", "Mobile Application", "Education"],"authors": ["Larisa Bedgood"],"images": ["https://images3.newscred.com/Zz02MjRkZmM5ZGQ0Zjg4YjYxYzUwZGVlYmE5YTlhMWY0Mg=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">U.S. consumer online sales is expected to pass $500 billion by 2020. However, consumers don&#8217;t always head to a site to make a purchase. In fact, according to an Episerver study, &#8220;Reimagining Commerce,&#8221; most shoppers will visit a website to do something other than make a purchase. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "83cc31470ccf8ad78ebb3c8a269d10e0","url": "marketers-need-to-steer-brands-towards-more-trusted-media-platforms-to-prevent-consumer-backlash","title": "Marketers need to steer brands towards more trusted media platforms to prevent consumer backlash","published": "2017-07-05T13:00:00Z","source": "The Drum","pop": 999997,"age": 0,"rank": 888887, "topics": ["Dow Jones"],"authors": ["Laurie Fullerton"],"images": ["https://images2.newscred.com/Zz1iMGU1MjZkODk3MmUwMjM5ODkwN2UwZjRmNTNiZTRlZA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">&#8220;The premise of the study reflects our long-held belief that marketers have to be in tune with their brand,&#8221; said Liz Miller, senior vice president of marketing at the CMO Council. &#8220;What sparked our interest in doing the study was basically the last Presidential election. </p> ","h1": "","type": "","outcome": [""]},{"id": "f883cb3e0ebc13b4971fbd2e07c5bc64","url": "how-ai-is-changing-the-world-of-advertising-forever","title": "How AI Is Changing the World of Advertising Forever","published": "2017-07-04T17:00:01Z","source": "The Next Web","pop": 3,"age": 54,"rank": 77, "topics": ["Futuristic", "Hollywood", "Robotics & Artificial Intelligence", "Advertising"],"authors": ["George Beall"],"images": ["https://images3.newscred.com/Zz1mMzhmODc1NWVmZTM0MzhlYWEyZjJhOWYwMzlkNDc1Mg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">For how much Hollywood loves remakes, I&#8217;m curious to see what a futuristic Mad Men is going to look like. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "50638578202a6f6f7d30d20078a0ca7c","url": "majority-of-vr-users-say-it-will-revitalise-media-education-work-social-interaction-travel-and-retail","title": "Majority of VR users say it will revitalise media, education, work, social interaction, travel and retail","published": "2017-07-04T13:00:11Z","source": "The Drum","pop": 3,"age": 57,"rank": 81, "topics": ["Computer Hardware", "Ericsson", "South Korea", "Social Work"],"authors": ["John McCarthy"],"images": ["https://images1.newscred.com/Zz04NjU4OWQ4MjEzM2E4MDIyNWYzNjBmODg5OGU3NDI1OA=="],"category": [""],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Seven out of 10 early adopters of virtual and/or augmented reality hardware have bought into the buzz and firmly feel that the technology is set to disrupt media, education, work, social interaction, travel and retail.</p> ","h1": "","type": "","outcome": [""]},{"id": "0cefb468064e1cefc0566c38a462282d","url": "how-the-internet-of-things-is-changing-the-way-we-drive","title": "How the internet of things is changing the way we drive","published": "2017-07-03T20:28:29Z","source": "The Next Web","pop": 1,"age": 57,"rank": 105, "topics": ["Automobiles"],"authors": ["George Beall"],"images": ["https://images1.newscred.com/Zz1kZjY3ZjI1Y2U2ODE1Yzc0YjM3NTJhNzQ5YzJmMDZkMA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">When we talk about the Internet of Things, rarely do we include our cars. For some, these services have just become standard, starting with programs like OnStar to now being able to heat your home before you even leave the office.\r\n</p> ","h1": "","type": "","outcome": [""]},{"id": "6c5b9f40c14e9d84924c53440be56cc7","url": "are-your-vendors-the-weak-link-in-your-cybersecurity","title": "Are your vendors the weak link in your cybersecurity?","published": "2017-07-03T14:00:11Z","source": "Verizon Enterprise Solutions","pop": 22,"age": 58,"rank": 13, "topics": ["Software", "Hygiene", "Cyber Security", "Cybercrime", "Data Breach", "Security", "Computer Software"],"authors": ["John Grim", "Marc Spitler"],"images": ["https://images1.newscred.com/Zz02ZWU3MjZhMDg4MGM4ODcxYWY2NTUxNmJmNzRkZjQ1Yw=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "You’ve got the cybersecurity basics covered. But have your vendors? Discover the questions you should be asking before you sign any contracts. ","h1": "Know before you sign: ask these vendor security questions","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a132825933b6a5994a20e8a0eccac8b6","url": "customer-experience-and-the-security-paradox","title": "Customer Experience and the Security Paradox","published": "2017-06-29T15:40:10Z","source": "Verizon Enterprise Solutions","pop": 6,"age": 62,"rank": 54, "topics": ["Bitcoin", "Coin collecting"],"authors": ["Cary Cusumano"],"images": ["https://images3.newscred.com/Zz03MDE5NDUzMzMyNjQ0N2JjOTVlMjJiNjZmMWNhMDk3Ng=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "You don’t have to sacrifice great CX to keep data secure — you can have the best of both worlds. Discover how to deliver a secure, personalized service. ","h1": "You don’t have to sacrifice great CX to keep data secure — you can have the best of both worlds. Discover how to deliver a secure, personalized service.","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "2263727e2fc882e570b226a5ba219f2b","url": "make-the-right-cybersecurity-investments","title": "Make the right cybersecurity investments","published": "2017-06-28T15:17:12Z","source": "Verizon Enterprise Solutions","pop": 14,"age": 63,"rank": 22, "topics": ["Cyber Security", "Cybercrime", "Security"],"authors": ["Ashish Thapar"],"images": ["https://images4.newscred.com/Zz1iMWQxMDc2NDc0N2Y3ZmY4ZWZkZjM5ZjljYmRiZWJjYg=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">How to balance cost and risk reduction.\r\nThese days, we all understand the need for better cybersecurity. Most organizations are facing the next logical challenge: how do I improve my security with the resources I have available? </p> ","h1": "Make the right cybersecurity investments","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "897162d075d59c8a11b12da4f8f401df","url": "connected-working-think-outside-the-box","title": "Connected working: think outside the box","published": "2017-06-20T11:00:00Z","source": "Verizon Enterprise Solutions","pop": 7,"age": 71,"rank": 50, "topics": ["Mobile Technology", "Working Remotely", "Productivity", "Women and Careers", "Work-Life Balance", "Jobs (profession)"],"authors": ["Eric Sorensen"],"images": ["https://images2.newscred.com/Zz0wMzMwMjcwNTBmMzE3YWY3MGQwNTYyZWVlNGJmYmM5MQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Collaboration is about more than just joining a conference call from your spare room at home. Discover the true meaning of connected work and how you can empower your workforce no matter where they are in the world. ","h1": "Connected working: thinking outside the box","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "59e9ac71c6ba136477a04c4d988d8914","url": "iot-from-theory-to-practice","title": "IoT: from theory to practice","published": "2017-06-19T11:00:00Z","source": "Verizon Enterprise Solutions","pop": 11,"age": 72,"rank": 30, "topics": ["Verizon Communications Inc.", "Supply And Demand"],"authors": ["Matt Montgomery"],"images": ["https://images2.newscred.com/Zz0yMGY5ZDYwM2JmNzczMDc5Y2I5NjFkNWE3ZWYxYWJhOQ=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "The Internet of Things is real and it’s delivering real benefits. But there’s much more to come. And progress will be spurred on by the availability of low-power wide area network (LPWAN) services. ","h1": "IoT: From Theory to Practice with LPWAN Services","type": "type:analyst:articles","outcome": [""]},{"id": "8dbef45b6f892866c6cd599c89c3937b","url": "is-your-brand-only-using-half-a-brain","title": "Is your brand only using half a brain?","published": "2017-06-15T17:03:00Z","source": "The Drum","pop": 8,"age": 72,"rank": 39, "topics": ["Marketing"],"authors": ["Clare Carr"],"images": ["https://images2.newscred.com/Zz0wNjAzYmVmMjY2N2E2YWE0YmE5MGE1YzBjMGQ4OGYzOQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:federal_government"],"summary": "<p thirtyword=\"firstpart\" > The roles of the creative and the analyst have been notoriously separate functions within companies. Within our brains though, we have two hemispheres that have to work together: the left and the right. &#160;</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "e37dd8df1be01dcddef6b11d1fd206d7","url": "customer-centricity-trumps-innovation-says-gartner-analysts","title": "Customer centricity trumps innovation, says Gartner analysts","published": "2017-06-14T16:00:00Z","source": "The Drum","pop": 6,"age": 76,"rank": 53, "topics": ["Gartner", "Diving", "Customer Support", "The Fray", "Robotics & Artificial Intelligence", "Water Sports", "Research and Development", "Education", "Innovation"],"authors": ["Benjamin Cher"],"images": ["https://images2.newscred.com/Zz00YTMyNWQ0NzZiNWFjYWQ5ZGY5NTkzZjBmMWY5N2IzZA=="],"category": ["report_category:customer_experience"],"industry": ["industry:agriculture"],"summary": "<p thirtyword=\"secondpart\">Innovation might be the buzzword on everyone&#8217;s lips but customer and design centricity is what will win the day with customers according to Gartner.\r\nThis is despite innovation diving in hard, with chatbots and artificial intelligence joining the fray.\r\n</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "ee0efccad78251921b45e66b4ab08fed","url": "the-rise-of-marketplace-companies-is-calling-for-fintech-innovation","title": "The rise of marketplace companies is calling for fintech innovation","published": "2017-06-13T14:23:05Z","source": "The Next Web","pop": 14,"age": 76,"rank": 21, "topics": ["Millennial Generation", "Cooking", "Shopping", "Online Shopping", "Entertainment Industry", "Innovation"],"authors": ["Melissa Thompson"],"images": ["https://images3.newscred.com/Zz1jMWZkYmIyZjc3MmQ0NzEzY2Y5YWVmNDcyNzE2NDhmYQ=="],"category": ["report_category:customer_experience"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"secondpart\">Some technologies and business models come and go. The list is long. Thankfully, typewriters, cassette tapes and drive-in movie theaters wound up in the recycling bin. Along with folding maps, dial-up modems and pagers. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "06582cec89bdcb9877125b1219c68a43","url": "does-connected-working-kill-innovation","title": "Does connected working kill innovation?","published": "2017-06-13T11:00:00Z","source": "Verizon Enterprise Solutions","pop": 22,"age": 79,"rank": 12, "topics": ["Verizon Communications Inc.", "Communications", "Marketing Communications", "Innovation"],"authors": [],"images": ["https://images3.newscred.com/Zz05Nzg1MmU2NWFmNmRiOTAwMzdkMGVjOGZkMDM4NGY0Mg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Are remote workers missing out on those precious water cooler moments? Or is this the dawn of a new kind of collaboration? Discover how to make your connected workforce a success. ","h1": "Does connected working kill innovation?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "40380c7c303f2fbb44adb74bd61a2a03","url": "how-brands-can-leverage-ai-to-improve-the-customer-journey","title": "How Brands Can Leverage AI to Improve the Customer Journey","published": "2017-06-12T12:45:09Z","source": "The Next Web","pop": 8,"age": 79,"rank": 37, "topics": ["Mother's Day"],"authors": ["Jeremy Goldman"],"images": ["https://images3.newscred.com/Zz1lOTgwNmIzNWU1Mjk1Yjc0ZTNiMmE5YjMzNGFhZWM4ZQ=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">The other week, I was on Amazon looking for a present for my mother for Mother&#8217;s Day. I ended up ordering her a teapot, to make up for breaking her previous one. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "bb74586beb856c51c388211cafe7be24","url": "just-because-you-can-doesn-t-mean-you-should","title": "Just because you can, doesn’t mean you should","published": "2017-06-09T18:29:50Z","source": "Verizon Enterprise Solutions","pop": 19,"age": 82,"rank": 14, "topics": ["Aircraft", "Beverages", "Innovation"],"authors": ["Erin Van Remortel"],"images": ["https://images3.newscred.com/Zz04YTU5ZDcwNDg1OTExZjc2MTUxODc5MTI3MWRiMDBhNg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "When you innovate, are you sure it’s what your customers really want? Before putting any new technology in place, you need to look at things through a customer lens and find out if it’ll improve CX or make it worse. ","h1": "Can vs. Should: Looking Through the Customer Lens to Improve CX","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "160037da917de94dbb1aae237e98db44","url": "how-virtual-reality-is-helping-medicine","title": "How virtual reality is helping medicine","published": "2017-06-08T13:00:09Z","source": "Digital Journal","pop": 3,"age": 78,"rank": 75, "topics": ["Pain Management", "Massachusetts Institute of Technology (MIT)", "Virtual Reality", "MIT", "Massachusetts"],"authors": [],"images": ["https://images4.newscred.com/Zz1hMDM2NjkwNmRmYTIyNjEzYWVlNjBlMTRhY2Y2YjRmZg=="],"category": ["report_category:technology_innovation"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">Virtual reality is beginning to make progress in the field of medicine. Two recent examples are helping visually impaired users navigate and with easing phantom limb pain.\r\n\r\n</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "913ef382413cac5b77e2ee1068357dff","url": "marketing-automation-is-still-in-high-demand-and-it-s-not-going-to-change","title": "Marketing automation is still in high demand, and it’s not going to change","published": "2017-06-07T21:53:21Z","source": "The Next Web","pop": 6,"age": 83,"rank": 58, "topics": ["Software", "Communications", "Automation", "The Fray", "Running", "Aches & Pains", "Headache", "Startups", "Computer Software", "Marketing Communications"],"authors": ["Yoav Vilner"],"images": ["https://images1.newscred.com/Zz0zNTE0M2UyMWRlM2RlMDg3YjY0OTVlYjc2M2UyNGZlMA=="],"category": ["report_category:business_performance"],"industry": ["industry:education"],"summary": "<p thirtyword=\"secondpart\">Marketing automation. marketing automation. Have you heard&#160;that recently?\r\nImagine, for a moment, that you&#8217;re the CMO of a major Fortune 500 company.\r\nEvery day, you&#8217;re running campaigns across a variety of channels. This includes both traditional and new media outlets. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "c99ccbc780d18409452047f818773d49","url": "how-ai-can-help-brands-reach-consumers-in-search","title": "How AI can help brands reach consumers in search","published": "2017-06-07T14:00:00Z","source": "The Drum","pop": 3,"age": 83,"rank": 78, "topics": ["Digital Music", "Machine Learning", "Music", "Netflix", "Spotify", "Robotics & Artificial Intelligence", "Streaming Music", "Online Video", "Startups"],"authors": ["Lisa Lacy"],"images": ["https://images2.newscred.com/Zz02OWQzODMyMTkyNDI1NTYxMmYzODI5OGMzMzFhYWQxZA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Digital music service Spotify recently acquired machine learning startup Niland&#160;to improve its recommendation and personalization technologies. In other words, Spotify wants to better connect its users to music they will like.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "1c45ed74949212a2f6de9ed5785115e6","url": "fintech-is-not-just-fintech-anymore","title": "Fintech is not just fintech anymore","published": "2017-06-06T14:00:09Z","source": "The Next Web","pop": 3,"age": 78,"rank": 75, "topics": [],"authors": ["Chris Skinner"],"images": ["https://images4.newscred.com/Zz0wNGY4Yjc3MjMwNGNkMzY1OWJkMjAzMWE4YTJmMDZiZg=="],"category": ["report_category:technology_innovation"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"secondpart\">There&rsquo;s been a lot of talk about&nbsp;fintech lately. </p> ","h1": "","type": "type:analyst:articles","outcome": [""]},{"id": "222655a2e9842cd0d0fe72db06289d23","url": "here-s-how-to-bring-on-the-bots-–-and-make-consumers-forget-they-aren-t-human","title": "Here’s how to bring on the bots – and make consumers forget they aren’t human","published": "2017-06-05T13:00:00Z","source": "The Drum","pop": 3,"age": 85,"rank": 80, "topics": ["Landing Pages", "Gartner", "Robotics & Artificial Intelligence", "Birthdays", "Birthday", "Las Vegas", "Education", "Personal Computer"],"authors": ["Lisa Lacy"],"images": ["https://images3.newscred.com/Zz0yZTY5MWIwMThiMWNmYzdmMWMyYTJmZjUzYTdiMGU5ZQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Even though research and advisory firm Gartner says 30% of web browsing will be screenless by 2020, Purna Virji, senior Bing Ads PPC training manager, told marketers at the Inbounder on Monday (May 22) not to panic.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f2318482ebd20134b701cf5b891de000","url": "the-cio-s-role-in-the-customer-experience","title": "The CIO's Role In The Customer Experience","published": "2017-06-05T11:00:00Z","source": "Forbes","pop": 3,"age": 85,"rank": 80, "topics": ["Mobile Technology", "Verizon Communications Inc.", "Machine Learning", "Podcast", "Business Intelligence"],"authors": ["Blake Morgan"],"images": ["https://images3.newscred.com/Zz1lYmE4MDMyOTllZTEyYzhkOTQxYjI5N2I2MTAzMGVhYQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There has never been a better time to be a CIO. That&#8217;s according to Vic Bhagat, CIO of Verizon Enterprise Solutions, who has decades of experience in the technology space. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "d5333a0fe4db44351b6f1a26c0a38c28","url": "top-5-digital-transformation-trends-in-financial-services","title": "Top 5 Digital Transformation Trends In Financial Services","published": "2017-06-02T15:17:39Z","source": "Forbes","pop": 5,"age": 85,"rank": 61, "topics": ["Mobile Technology", "Shopping", "Financial Services", "Electronic Banking", "Banking"],"authors": ["Daniel Newman"],"images": [],"category": ["report_category:technology_innovation"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"secondpart\">Forget online banking. If there was ever an industry where mobile is not just first but full-steam ahead, it&#8217;s the financial services industry, where FinTech &#8212; a.k.a. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "568765d694e7a967e3b4c83fccf867dd","url": "where-seo-meets-design-best-practices-for-optimizing-conversions","title": "Where SEO Meets Design: Best Practices For Optimizing Conversions","published": "2017-06-02T14:49:58Z","source": "Business2Community","pop": 2,"age": 85,"rank": 97, "topics": ["Online Sales"],"authors": ["Hellen McAdams"],"images": ["https://images4.newscred.com/Zz0zNzhmZjI2ZjVlOWY3YTQxMjIzYjQ2NWQ0NjNmYTAyZg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It&#8217;s a widely known fact that good SEO will only get you halfway if you are trying to boost your online sales results. </p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "8a26aa36997a7549896a094ae1bfbd43","url": "how-to-move-from-product-first-to-customer-first","title": "How to move from product first to customer first","published": "2017-06-01T14:00:01Z","source": "Verizon Enterprise Solutions","pop": 7,"age": 90,"rank": 42, "topics": [],"authors": ["Maria Fernandez-Riddick"],"images": ["https://images4.newscred.com/Zz01ODA1YzE4Mjk0YjJjY2YyMDAxNTQwMDg3ZjJjNDY2Zg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Customers expect more than ever before. That’s having an impact on every part of your business, including how you develop and manage your products. Discover how product managers can become more customer centric. ","h1": "The product management process isn’t about the process","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "3129c5ab2d09a576245c2d240fda3ad2","url": "eesi-as-pie-essential-elements-of-a-successful-intrusion","title": "EESI as Pie: Essential Elements of a Successful Intrusion","published": "2017-05-30T17:41:07Z","source": "Verizon Enterprise Solutions","pop": 7,"age": 92,"rank": 44, "topics": ["Personal Data Security", "Fraud", "Cybercrime"],"authors": ["Dan Ryan"],"images": ["https://images3.newscred.com/Zz01NzM2NTMxYWFhNGNlNGQyM2I4YWZiMGJjZWQ4ZGY2Ng=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "No defense is 100% secure against cyberattacks. Discover the common steps attackers take to breach your data and which questions you need to ask if you want to improve your defenses. ","h1": "EESI as Pie:  Essential Elements of a Successful Intrusion","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "cb72ed089f5071e3ea216e653929c707","url": "here-s-how-to-bring-on-the-bots-–-and-make-consumers-forget-they-aren-t-human","title": "Here’s how to bring on the bots – and make consumers forget they aren’t human","published": "2017-05-30T17:40:43Z","source": "The Drum","pop": 4,"age": 91,"rank": 70, "topics": ["Landing Pages", "Gartner", "Robotics & Artificial Intelligence", "Birthdays", "Birthday", "Las Vegas", "Education", "Personal Computer"],"authors": ["Lisa Lacy"],"images": ["https://images4.newscred.com/Zz00Mjc0YmNmZDdkNjY2OWU1YThjZDJhNWQ3ZDhlZjA1Mw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Even though research and advisory firm Gartner says 30% of web browsing will be screenless by 2020, Purna Virji, senior Bing Ads PPC training manager, told marketers at the Inbounder on Monday (May 22) not to panic.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "19b777b4f992d247824e069fdf016d3b","url": "five-ways-ai-is-shaping-the-future-of-e-commerce","title": "Five ways AI is shaping the future of e-commerce","published": "2017-05-30T16:00:08Z","source": "The Drum","pop": 3,"age": 91,"rank": 83, "topics": ["Gartner", "E-Commerce", "Five Below, Inc", "Children's Products & Services"],"authors": ["Alexis Ng"],"images": ["https://images4.newscred.com/Zz1hY2UzNTIxNTJkZTNkZTJmMjc3MmZjYmM1MTYzNDExZg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > AI is revolutionizing so many aspects of our lives. From the way we operate appliances in our homes to the way that children play with toys. AI is also starting to have a significant effect on the way e-commerce businesses attract and retain customers.</p> ","h1": "","type": "","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "dd85fc7e405ba5a71668cfc7659b8a10","url": "incident-management-focus-two-approaches-to-incident-response-plans","title": "Incident Management Focus: Two Approaches to Incident Response Plans","published": "2017-05-25T18:00:00Z","source": "Verizon Enterprise Solutions","pop": 15,"age": 93,"rank": 19, "topics": ["Cyber Security", "Cybercrime", "FirstGroup", "Security"],"authors": ["Hayden Williams"],"images": ["https://images3.newscred.com/Zz03MTIzYzA1MmRkZDg1MjdiNmFjYWFhZjI4MGQ4YzEyNg=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "There are two approaches to a cyberattack: reactive and proactive. Which are you? Here are some tips on how you can have a more proactive approach to cybersecurity and mitigate the risks you face. ","h1": "Incident Management Focus: Two Approaches to Incident Response Plans","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "682943072703d927c8b9fd99a4f42f13","url": "diary-of-a-cybercriminal","title": "Diary of a cybercriminal","published": "2017-05-23T23:10:46Z","source": "Verizon Enterprise Solutions","pop": 16,"age": 99,"rank": 18, "topics": ["Education", "Breakfast"],"authors": ["John Grim"],"images": ["https://images3.newscred.com/Zz1iN2VlMGQxZjU2NmQwZTI0ZjQxODcwMjg0N2Q1ZTk1Mg=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "Not all hackers sit in dark, disused warehouses targeting big companies for millions of dollars. Don’t be fooled by Hollywood caricatures — the reality is much less dramatic and a much bigger risk for you. ","h1": "cybercrime defense (s.v. 20)","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "0ee883b9a151dfbe17e45e0d1029f67b","url": "are-you-living-in-a-glass-house","title": "Are you living in a glass house?","published": "2017-05-23T22:29:54Z","source": "Verizon Enterprise Solutions","pop": 6,"age": 99,"rank": 57, "topics": ["Aerospace", "Aircraft", "Philosophy"],"authors": ["Cary Cusumano"],"images": ["https://images2.newscred.com/Zz0zYjVlMjg5NDAzMjU4MzAyOWJmMWYyOTg0YmE4NTIwMQ=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Customer experiences have been big news recently — but not for the right reasons. Before you start wagging your fingers at the companies involved, check you’re not in danger of throwing stones from glass houses. ","h1": "Are you living in a glass house?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "4c7e949a499ebcf00d47ca6c4ef2b9d5","url": "why-is-fashion-a-major-challenge-with-smart-clothing","title": "Why is fashion a major challenge with smart clothing?","published": "2017-05-22T20:39:25Z","source": "ReadWrite","pop": 3,"age": 99,"rank": 85, "topics": ["Inflection", "Fashion - Apparel", "Textiles"],"authors": ["Craig Dudenhoeffer"],"images": ["https://images3.newscred.com/Zz1jN2Q4YjgzMzZlMTcwY2VlM2U3NzkzNGZkZjZjYjg5Ng=="],"category": ["report_category:internet_of_things"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">Here at Readwrite &#8212; and our accelerator, ReadWrite Labs &#8212; we believe there&#8217;s a lot to learn about a new industry from the founders that are carving it out and leading the charge through innovative companies and products. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "d5e6f4a9c8c325ebe069b389224a930b","url": "3-reasons-ai-isn-t-ready-to-replace-human-sales-reps-just-yet","title": "3 reasons AI isn’t ready to replace human sales reps just yet","published": "2017-05-22T20:29:18Z","source": "VentureBeat","pop": 6,"age": 99,"rank": 57, "topics": ["Customer Service", "Oxford", "Sales", "Education"],"authors": ["Qurious", "Sabrina Atienza"],"images": ["https://images1.newscred.com/Zz01NGM3ZTYwNjRjNWVkYTkxMjhjZmQwYmQzM2E3NmI2Yw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > According to a study by Oracle, almost 80 percent of businesses have already implemented or are planning to adopt AI as a customer service solution by 2020, and a recent report by Deloitte and Oxford University suggests telesales could be the next to go.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "aa54969b0c7366fb94f3709c8bb76aeb","url": "are-you-losing-5-star-reviews-to-hidden-customer-expectations","title": "Are You Losing 5 Star Reviews to Hidden Customer Expectations?","published": "2017-05-22T16:23:26Z","source": "Business2Community","pop": 4,"age": 100,"rank": 73, "topics": ["Coffee", "Good News"],"authors": ["Andrew McDermott"],"images": ["https://images1.newscred.com/Zz0xYjY2YjhhMTc3NWI2MGUzNjVjZTU4NWJmM2M4MjUwYw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Why won&rsquo;t they do it?\r\nWhy won&rsquo;t most customers write a review for your agency? How do you get reviews for your clients? It seems like getting customers to respond is an uphill battle.\r\nYou&rsquo;ve under-promised and over delivered. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "c388b739515914c03aba2528fb7c4343","url": "why-saying-“no”-could-be-a-brand-s-savior-on-social-media","title": "Why saying “no” could be a brand's savior on social media","published": "2017-05-22T15:19:16Z","source": "The Drum","pop": 1,"age": 99,"rank": 121, "topics": ["Puzzles", "Automobiles", "Kitty Hawk", "Silicon Valley", "Social Media"],"authors": ["Andrew Feldman"],"images": ["https://images2.newscred.com/Zz1jYTc1ZTJjYTI2MTk5YTVmNTU3NzJmNGVhNDUxYzIyOQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Recently I was asked what the biggest challenge for brands on social media will be in five years. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "40e8d720c3b1f3e2340df9a548a24c2d","url": "what-you-need-to-know-about-cybersecurity-and-the-internet-of-things","title": "What You Need To Know About Cybersecurity And The Internet Of Things","published": "2017-05-20T00:54:05Z","source": "Forbes","pop": 9,"age": 101,"rank": 32, "topics": ["Gartner", "Nevada", "Cyber Security", "InSecurity", "Cybercrime", "Secret Service", "Consumer Electronics Show", "Security", "Attention", "United States", "Getty Images", "Las Vegas", "The Americas"],"authors": ["Christie Terrill"],"images": ["https://images3.newscred.com/Zz01MjY0Y2I0N2E5MzZlZGM0YWUwMjA0MTBmNzZlZWE4YQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "The Internet of Things (IoT) has moved from a marketing buzzword to a household term. And while IoT generates more headlines as a consumer issue, it’s a topic that businesses need to pay attention to as well. ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2df329d83bf3223fda452352a1b9f92b","url": "don-t-make-a-fish-climb-a-tree-customer-preferences-matter","title": "Don’t make a fish climb a tree: customer preferences matter.","published": "2017-05-20T00:44:04Z","source": "Verizon Enterprise Solutions","pop": 5,"age": 101,"rank": 60, "topics": ["Customer Support", "Telephone"],"authors": ["Gordon Littley"],"images": ["https://images2.newscred.com/Zz0yNDMzN2Y1OTBmODA1OWEyYjBmNGQzZWEzZjMwNjY3ZA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "You’ve found the best route for a customer to reach their goal, but that doesn’t mean they’ll like it. Discover why customer preferences are so crucial to your CX and how you can uncover what they are. ","h1": "Deliver Better Customer Experiences: Is automation what all your customers want?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "e567539cfa3a62f39a78d38392e8d9dc","url": "how-recruiters-are-employing-vr-to-impress-candidates","title": "How recruiters are employing VR to impress candidates","published": "2017-05-17T21:32:50Z","source": "ReadWrite","pop": 2,"age": 104,"rank": 88, "topics": ["Millennial Generation", "LinkedIn Corporation", "Virtual Reality", "Jobs (profession)", "Recruiting and Staffing"],"authors": ["Andrew Woodberry"],"images": ["https://images1.newscred.com/Zz0yNjBhZTRhN2Q2ZTU4MTliMDIzNmNiMzAzMzExZmJiNA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">According to a 2016 Deloitte survey, fully two-thirds of Millennials expect to leave their current jobs by 2020. What does that mean for human resources departments?\r\nA fluid and robust job market has made recruiting more competitive than ever. Connecting with potential employees, particularly Millennials, is not easy. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "5e1cacb1cd4031f3e8ab7f3356180462","url": "is-automation-your-golden-ticket-to-great-cx","title": "Is automation your golden ticket to great CX?","published": "2017-05-17T21:18:05Z","source": "Verizon Enterprise Solutions","pop": 2,"age": 105,"rank": 89, "topics": ["Automobiles", "Automation", "Personal Finance", "Aches & Pains", "Headache"],"authors": ["Gordon Littley"],"images": ["https://images4.newscred.com/Zz1hOWRhODdhMGMwNTM0ODM2ZjIxNTg3Yzc1OWE3NzkzMw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Technology can deliver great customer experiences. But it can also result in some of the most frustrating ones. When’s the right time for automation? ","h1": "Is automation your golden ticket to great CX?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f00b4a480639d59e1b01e44c7e513952","url": "“retail-is-dead”-—-and-other-rumors-with-no-validity","title": "“Retail is Dead” — and Other Rumors with no Validity","published": "2017-05-05T10:57:38Z","source": "Verizon Enterprise Solutions","pop": 9,"age": 117,"rank": 36, "topics": ["Shopping", "United States", "The Americas"],"authors": ["Janet Schijns"],"images": ["https://images1.newscred.com/Zz1iNDVjOWY5NDFhYTc4NTUzM2U0NGZjZmMzMGI5ZTlhNA=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "We’ve all heard the #fakenews that robots are taking over the world and retail is a dying industry — but how much truth is really behind it? And what can you do to keep your retail business alive? ","h1": "“Retail is Dead” – and Other Rumors with No Validity","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "95a0ffbf8184e6ba95679db3b91549d7","url": "stop-feeding-your-customers-air-sandwiches","title": "Stop Feeding Your Customers Air Sandwiches","published": "2017-05-05T10:51:27Z","source": "Verizon Enterprise Solutions","pop": 12,"age": 117,"rank": 26, "topics": [],"authors": ["Erin Van Remortel"],"images": ["https://images1.newscred.com/Zz0wYjZmOGFhNGQxY2QyYjUxYzEyMjBiNTg2NmUwN2YzYw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Don’t leave your customers hungry for a better experience or service. Discover the steps you can take to keep them coming back for more and avoid leaving them unsatisfied. ","h1": "Using Customer Feedback: Stop Feeding Your Customers Air Sandwiches","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "0c01e76bccd812453fa933e4b04726b2","url": "data-breach-digest-update-data-ransomware-–-the-catch-22","title": "Data Breach Digest Update: Data Ransomware – the Catch 22","published": "2017-05-03T09:17:23Z","source": "Verizon Enterprise Solutions","pop": 17,"age": 119,"rank": 15, "topics": ["Verizon Communications Inc.", "Cyber Security", "Data Breach", "Security"],"authors": ["John Grim"],"images": [],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Data Breach Digest&mdash;a compilation of scenarios issued by the Verizon RISK Team at the beginning of the year&mdash;was written as a companion to the Data Breach Investigations Report (DBIR). In creating this DBIR companion, we tried to make it both entertaining and informative. </p> ","h1": "Data Breach Digest Update: Data Ransomware – the Catch 22","type": "type:analyst:articles","outcome": [""]},{"id": "510a7019ada987cf3858ff65ef0c2b73","url": "banks—it-s-time-to-start-talking-to-each-other-say-uk-police","title": "Banks—It’s Time To Start Talking To Each Other, Say UK Police","published": "2017-05-01T22:47:10Z","source": "Verizon Enterprise Solutions","pop": 9,"age": 121,"rank": 31, "topics": ["Victorian", "Rush (2008 TV series)", "Cyber Security", "Financial Institutions", "Cybercrime", "Banking and Financial Institutions Law", "Romans", "Police", "Security", "Law Enforcement", "Security and Investigations", "London"],"authors": ["John Loveland"],"images": ["https://images4.newscred.com/Zz1hNzA4NTFmMzQ3YWQ1Mjk4ZGEwNGY4NzBmYmQ5ZmJkZg=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:federal_government"],"summary": "UK law enforcement efforts to combat cyber crime are the “most joined-up bit of policing” in the country, but police forces cannot do it alone. Last Thursday, 200 security professionals from London's banks, law enforcement, and cybersecurity industry met to discuss 21st-century crime and how collaboration is key to fighting back. ","h1": "It’s time for banks to start talking to each other: UK police talk financial cybersecurity.","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "de6e53c204d5e2beb7e87f2c01021d83","url": "cybersecurity-in-2017-it-s-not-all-doom-and-gloom","title": "Cybersecurity In 2017: It’s Not All Doom And Gloom","published": "2017-05-01T22:27:20Z","source": "Verizon Enterprise Solutions","pop": 12,"age": 121,"rank": 27, "topics": ["Defense Industry", "Cyber Security", "InSecurity", "Cybercrime", "Ecosystem", "Security", "Security and Investigations"],"authors": ["Marc Spitler"],"images": ["https://images3.newscred.com/Zz1iMzE4YWQ4NTIxMzRjYWRmMzMzZjQwZTMzNmRlYjIwYQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "At the 2017 RSA Conference in San Francisco, we brought together senior security professionals from every background — including academia, government, law and finance — to discuss the big trends in cybersecurity. Find out what our panel had to say about the biggest threats facing organizations today and how the industry can come together to overcome these challenges. ","h1": "Cybersecurity in 2017: It’s not all doom and gloom","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d31689eb810194f610c9f00c7d1e58a7","url": "in-retail-ar-is-for-shoppers-and-vr-is-for-business","title": "In Retail, AR Is For Shoppers And VR Is For Business","published": "2017-05-01T22:01:10Z","source": "Forbes","pop": 5,"age": 121,"rank": 62, "topics": ["User Experience", "Virtual Reality"],"authors": ["Nikki Baird"],"images": ["https://images3.newscred.com/Zz0wOTY2NDAxZTE4MWMzNmVmMzA1MDA3MmY2MTk0OTE3Mg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In some of the coverage of augmented and virtual reality, it feels like there are efforts to make it a &ldquo;versus&rdquo;: AR vs. VR, like one has to win and the other has to lose. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "a89c892fe4c2c00c2d891036403d211d","url": "cyberespionage-ransomware-big-gainers-in-new-verizon-breach-report","title": "Cyberespionage, Ransomware Big Gainers In New Verizon Breach Report","published": "2017-05-01T21:53:37Z","source": "CSO Magazine","pop": 2,"age": 120,"rank": 94, "topics": ["Verizon Communications Inc.", "Education (International)"],"authors": ["Maria Korolov"],"images": ["https://images2.newscred.com/Zz0wODQwNDU5OWVkNTExYzVhNWM4MzAxNGQxY2ViYjJmOQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.\r\nCyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of attack in the manufacturing, public sector, and education.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "c5c694f9fffa9ddaa45ad8f024669887","url": "how-hard-is-it-to-bring-precision-analytics-to-agtech","title": "How Hard Is It To Bring Precision Analytics To Agtech?","published": "2017-05-01T21:32:55Z","source": "ReadWrite","pop": 0,"age": 114,"rank": 123, "topics": ["Software", "Robotics & Artificial Intelligence", "Farming", "Robotics", "Computer Software"],"authors": ["Cate Lawrence"],"images": ["https://images2.newscred.com/Zz1mN2I3MGFlZTNiMWU4ZTRiMzlmNzk0ZmM5YTFkOTg2NQ=="],"category": ["report_category:internet_of_things"],"industry": ["industry:agriculture"],"summary": "<p thirtyword=\"firstpart\" > On first thought,&nbsp;agtech&nbsp;seems something of a contradiction. Agriculture involves growing crops. There&rsquo;s no real world shortcut or fast track in that plants require planting in appropriate seasons with access to&nbsp;sun, water and soil nutrients and time to grow. By comparison, tech is about speed, rapid&nbsp;prototyping&nbsp;and timely deployment.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "b3a51656650a4019919f53e5be985a72","url": "unlocking-the-value-of-the-industrial-internet-of-things-iiot-and-big-data-in-manufacturing","title": "Unlocking The Value Of The Industrial Internet Of Things (IIoT) And Big Data In Manufacturing","published": "2017-04-21T15:48:45Z","source": "Forbes","pop": 4,"age": 128,"rank": 69, "topics": ["Japanese", "Big Data", "Automobiles", "BMW", "Automotive", "Automobile", "Business Intelligence"],"authors": ["Bernard Marr"],"images": ["https://images3.newscred.com/Zz1hOGU1YWY2OTQxZTRkN2VjYWYyYWZkYTU2ZjI0NDM3YQ=="],"category": ["report_category:internet_of_things"],"industry": ["industry:manufacturing_automotive"],"summary": "<p thirtyword=\"firstpart\" > Hirotec is a tier-one Japanese automobile parts manufacturer, supplying components directly to makers such as GM, Ford and BMW. It also provides tools and expertise to other manufacturers wanting to create their own parts.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "6d1c94a20da1888e6188c98f5f534f14","url": "the-recipe-for-revenue","title": "The Recipe for Revenue","published": "2017-04-21T13:44:51Z","source": "Verizon Enterprise Solutions","pop": 12,"age": 131,"rank": 25, "topics": ["E-Commerce", "Vinci", "Mobile Phone"],"authors": ["Ali Rezvan"],"images": ["https://images3.newscred.com/Zz00NjA4N2RiNjA1NDA0NjhlM2U5YzMyZDExZDdiZGI4Mg=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "Intelligent technology is transforming retail — but that doesn’t mean digital has to be the enemy. Discover how to use in-store tactics online to convert more sales and deliver the best CX possible. ","h1": "The Recipe for Revenue","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "7ce458212852c800a18593602b7d45df","url": "how-to-effectively-implement-customer-journey-maps","title": "How To Effectively Implement Customer Journey Maps","published": "2017-04-18T13:00:00Z","source": "Forbes","pop": 5,"age": 134,"rank": 65, "topics": ["Career How-To", "Jobs (profession)"],"authors": ["Christine Crandell"],"images": ["https://images1.newscred.com/Zz04ODZlNTAyZTFhMzI2MGU3NTMxNWNkYTUxZWI1ZmQ4MA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Journey mapping is a core discipline and competency of leading organizations. No longer considered a marketing or customer success initiative, leaders are realizing that everyone benefits from understanding journey maps and how they can be acted upon. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "2fbe3bd4f11d59bfadd4208f66062995","url": "3-in-5-marketers-feel-staff-shortages-will-hold-back-the-industry-in-2017","title": "3 In 5 Marketers Feel Staff Shortages Will Hold Back The Industry In 2017","published": "2017-04-18T10:00:08Z","source": "The Drum","pop": 1,"age": 133,"rank": 112, "topics": ["Content Marketing", "Good News"],"authors": ["Andrew Brookes"],"images": ["https://images4.newscred.com/Zz03MjEzZDk5YTc0NWQ0OGEyZGE2N2FkOGFiZTVjYWRjYg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Content marketing is at something of a crossroads in 2017. You could say that we&rsquo;ve won the battle, now we just need to win the war. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "d9ec8c324ce842a41cf2b764aa1839b0","url": "an-iot-platform-for-material-handling","title": "An IoT Platform For Material Handling","published": "2017-04-18T10:00:00Z","source": "Forbes","pop": 2,"age": 134,"rank": 87, "topics": ["Generator", "Forklifts", "Warehousing", "Lubrication"],"authors": ["Steve Banker"],"images": ["https://images3.newscred.com/Zz1hMzc2Yzk0N2NhNWU4NmFkODgzNjkzNGQyZGM4OWU0YQ=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Another historical IoT use case is to use device data to tell operators when machines need maintenance. This could be as simple as a forklift whose battery needs to be charged, to something more complex, like a highly automated conveyor whose ball bearings need lubrication or replacement.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "cb8598faf911b399456be411ee59e224","url": "discounting-can-cost-retailers-millions-by-not-selling","title": "Discounting Can Cost Retailers Millions - By Not Selling","published": "2017-04-18T10:00:00Z","source": "Forbes","pop": 2,"age": 134,"rank": 87, "topics": ["Retail", "Luxury Goods", "Online Shopping", "Melbourne", "Education", "London"],"authors": ["Bryan Pearson"],"images": ["https://images4.newscred.com/Zz02NTgwZDgwMGJmZTMxM2M2ZjI0YzdiNWEyMjc2ODAzNw=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"firstpart\" > Hemlines rise and fall fast, but when it comes to the shelf life of a discounted $500 skirt, the number of days can drag on &mdash; to 106, to be precise.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "a5a509d64bd6255dff56610065bf4fd9","url": "the-data-show-hospitals-need-to-do-better-at-protecting-your-personal-data","title": "The Data Show Hospitals Need To Do Better At Protecting Your Personal Data","published": "2017-04-17T21:47:09Z","source": "Forbes","pop": 3,"age": 133,"rank": 86, "topics": ["MBA", "Internal Medicine", "School", "Cyber Security", "Cybercrime", "Private Schools", "Security", "General Electric", "Health Insurance Industry", "Education"],"authors": ["Bruce Y. Lee"],"images": ["https://images1.newscred.com/Zz1kM2UxYjBkNmY4NDlkNDJhMjMwZTM0ZDA3ZTdmZWRkYw=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">How safe is your personal data at hospitals? Well, a study just published in JAMA Internal Medicine found 1,798 incidences of large data breaches in patient information over&nbsp;roughly a seven-year period (October 21, 2009, to December 31, 2016).&nbsp;And these weren&rsquo;t small &ldquo;oops&rdquo; that affected just a few patients. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "41f92ea47e39fb350fdc1c6168531024","url": "you-can-design-your-business-to-prosper-rather-than-suffer-from-the-robot-revolution","title": "You Can Design Your Business To Prosper, Rather Than Suffer, From The Robot Revolution","published": "2017-04-17T20:39:49Z","source": "Forbes","pop": 1,"age": 131,"rank": 111, "topics": ["Software", "Machine Learning", "Robotics & Artificial Intelligence", "Jobs (profession)", "Computer Software"],"authors": ["Todd Hixon"],"images": ["https://images4.newscred.com/Zz01NzFmMWMxMzZjM2Q3ZmY3MTViMDcyNGQ5M2QyYTg1Mw=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Despite what we hear from certain prominent politicians, most serious commentators tell us that robots, much more than imports, are the main root cause of disappearing jobs. [I use the term robot broadly to include software based on artificial intelligence (AI) and machine learning.] If your job can be performed by every-more-capable robots, you are at risk. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "bb4e22178827e3c6416e5328d27573af","url": "how-the-connected-customer-will-impact-your-business","title": "How The Connected Customer Will Impact Your Business","published": "2017-04-17T20:11:19Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Astronomy", "Wifi"],"authors": ["Blake Morgan"],"images": ["https://images1.newscred.com/Zz04MDdlYTBhNmIwOTI2MzZiYmZjYjYzZjY3Y2UzMTU3MA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > When one takes a&nbsp;flight and doesn&rsquo;t purchase wifi, they may find themselves&nbsp;feeling like they&rsquo;ve been on another planet for a few hours. In fact when the plane lands the passengers participate in an orchestra of collective dings as they turn on their phones, happy to be connected again.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "352aff40cd8d42086ed36d7fe94c4415","url": "these-are-10-cybersecurity-myths-that-must-be-busted","title": "These Are 10 Cybersecurity Myths That Must Be Busted","published": "2017-04-17T19:57:51Z","source": "Forbes","pop": 3,"age": 134,"rank": 76, "topics": ["Hygiene", "Cyber Security", "Opinion Journalism", "Cybercrime", "Security"],"authors": ["William H. Saito"],"images": ["https://images4.newscred.com/Zz0zMDZjNjBiYTE3YjFjZGJjNmIxNDlhY2FkMTJkN2Y4Zg=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections &ndash; last year saw it all. But many of these threats aren&rsquo;t new and will never really go away. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "e2b33f2c3339a897bb7439142082f596","url": "the-insecurities-list-10-ways-to-improve-cybersecurity","title": "The Insecurities List: 10 Ways To Improve Cybersecurity","published": "2017-04-05T10:00:00Z","source": "NetworkWorld","pop": 6,"age": 147,"rank": 51, "topics": ["Personal Data Security", "Fraud", "Cyber Security", "Cybercrime", "Security", "Evergreen Content", "Access control"],"authors": ["Tom Henderson"],"images": ["https://images3.newscred.com/Zz03MzUzOWZkMTc1YjM4MDJkNGE2MzhiODBiY2IyMDVkMg=="],"category": [""],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A friend asked me to list all of the cybersecurity things that bug me and what he should be diligent about regarding user security. We talked about access control lists, MAC layer spoofing, and a bunch of other topics and why they mattered. </p> ","h1": "","type": "","outcome": [""]},{"id": "583de09151c382fca44679dd4a99a8f9","url": "the-cx-clock-reset","title": "The CX Clock Reset","published": "2017-04-05T06:00:01Z","source": "Business2Community","pop": 2,"age": 147,"rank": 99, "topics": ["Mobile Phone"],"authors": ["Matthew McEwen"],"images": ["https://images2.newscred.com/Zz0wNmY1M2M3YmRjYWQ1ZTljY2IyYjI2MTZiNWYzNThiMQ=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There I sat, on a crusty chair that probably hadn&rsquo;t been wiped down with a Clorox wipe since it was moved into place in the 70&rsquo;s. The scene was one that we have all been in; a doctor&rsquo;s office &ndash; waiting &ndash; and waiting. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "7bfdbeab53aa5b6d70e1eb4d93a71815","url": "five-ways-tech-can-supercharge-your-cx-team","title": "Five Ways Tech Can Supercharge Your CX Team","published": "2017-04-04T19:00:11Z","source": "Verizon Enterprise Solutions","pop": 7,"age": 148,"rank": 45, "topics": ["Education"],"authors": ["Maria Fernandez-Riddick"],"images": ["https://images4.newscred.com/Zz1jZDU5NmM5ZjJlZmYyNGVhNzYzNDNmMTI4MzRkNGM1Mw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "At the moment, there’s lots of talk about robots replacing humans at work. And although technology has its place, you need to find a balance if you want to deliver the best CX possible. Our five tips can help. ","h1": "Five customer experience tips to unite tech and the human touch","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "55e1ad3b901c9c559a961cfd2ef26054","url": "using-technology-to-help-visually-impaired-people-navigate-cities","title": "Using Technology To Help Visually-Impaired People Navigate Cities","published": "2017-04-04T18:00:00Z","source": "Forbes","pop": 1,"age": 145,"rank": 113, "topics": ["Healthcare Policy", "World Health Organization", "European Union"],"authors": ["Laurie Winkless"],"images": ["https://images4.newscred.com/Zz00NmJkZWRlZDM1NWViYjJkZWIzNTJkYjI5NjhiNTRiZg=="],"category": ["report_category:technology_innovation"],"industry": ["industry:construction"],"summary": "<p thirtyword=\"secondpart\">In the hustle-and-bustle of urban life, are blind people being left out?\r\nThink about your daily commute. How many signs do you pass by? How many junctions or staircases do you navigate, on footpaths or roads, or in train, metro or bus stations? </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "a0b2fc35f61f14d574054f412191b688","url": "the-5-best-u-s-cities-for-women-in-tech","title": "The 5 Best U.S. Cities For Women In Tech","published": "2017-04-03T18:50:12Z","source": "VentureBeat","pop": 2,"age": 149,"rank": 92, "topics": ["Washington D.C.", "Census Bureau", "Indianapolis", "Gender", "New Orleans", "Employment", "Kansas City", "Technology Industry", "Jobs (profession)", "Baltimore"],"authors": ["Fortune", "Madeline Farber"],"images": ["https://images1.newscred.com/Zz00NmRiNDQ4M2NmOGJjMjJlNjliNmM0MDdjNjk5MjAxYw=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > What do Washington, D.C., Kansas City, Mo., Baltimore, Indianapolis, and New Orleans have in common? According to a recent report, they&rsquo;re the best places to be if you&rsquo;re a woman in tech.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "572819da639f496e94558bcf63d06d33","url": "myth-busting-the-urban-legends-surrounding-the-energy-sector","title": "Myth-busting The Urban Legends Surrounding The Energy Sector","published": "2017-04-03T18:44:57Z","source": "CSO Magazine","pop": 2,"age": 149,"rank": 92, "topics": ["Cyber Security", "Energy Industry", "Cybercrime", "Energy", "Security"],"authors": ["John Bryk"],"images": ["https://images3.newscred.com/Zz1iYmUzODEwM2UzNWVkNWI1ZjY4NzRmYzZlMDdkNWY0Ng=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">A U.S. newspaper recently printed an article, \"Hacked: Energy industry controls provide an alluring target for cyberattacks\", focusing on purported cybersecurity weaknesses across the energy sector. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "a1630469585975eb0fa39986c0284952","url": "how-an-ai-system-can-learn-to-think-creatively","title": "How An AI System Can Learn To Think Creatively","published": "2017-04-02T10:00:00Z","source": "VentureBeat","pop": 3,"age": 149,"rank": 82, "topics": ["Poetry", "Puzzles", "Fine Art"],"authors": ["Alston Ghafourifar", "Entefy"],"images": ["https://images3.newscred.com/Zz04NmQ1ZGEwOTliYjhiZDMwYzc2Y2JhYWE1YzZjYTZjMg=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Will an AI system&nbsp;ever create art that can equal a work created by a human? Researchers and artists are already making attempts to find out by translating creativity into algorithms. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "107cc5d20ce2d2978df41dc93c529a85","url": "to-sell-or-to-serve","title": "To Sell Or To Serve?","published": "2017-03-29T17:33:38Z","source": "Verizon Enterprise Solutions","pop": 7,"age": 153,"rank": 47, "topics": [],"authors": ["Cary Cusumano"],"images": ["https://images3.newscred.com/Zz1mMzFiYWQwMWQ3NmQzY2EwZDhlYzAzNzAxNTczZGFhZQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "You’ve put a huge amount of effort into giving new customers a great experience, and it shows in your sales figures. But what happens after the deal is done? How can you turn a sale into a lasting relationship? ","h1": "After the deal is done: developing customer relationships","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "e6268f3af6f7bebc80a39ac1ea4058e1","url": "learning-outside-the-classroom","title": "Learning Outside The Classroom","published": "2017-03-29T06:00:00Z","source": "Raconteur","pop": 3,"age": 154,"rank": 74, "topics": ["Education", "Education (International)", "Virtual Reality", "Google Plus"],"authors": ["Kim Thomas"],"images": ["https://images2.newscred.com/Zz01YTk1MzAyYjNhZGI5ODkwZGJkMzdmOTNiMDZjNTUxOQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:education"],"summary": "<p thirtyword=\"firstpart\" > New technologies such as cloud, tablets and virtual reality have the potential to transform education, putting students in charge of their own learning. Already some teachers have adopted the &ldquo;flipped classroom&rdquo;, in which students direct their own learning at home, while class time is used for answering questions.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "2bdd1c6e445d838b1c1794196da5bc1e","url": "5-new-rules-to-winning-the-customer-loyalty-game-in-the-digital-age","title": "5 New Rules To Winning The Customer Loyalty Game In The Digital Age","published": "2017-03-28T06:00:00Z","source": "Forbes","pop": 5,"age": 155,"rank": 66, "topics": ["Retention Marketing", "Customer Support", "Marketing", "Rewards Program", "Accenture PLC", "Advertising"],"authors": ["Shama Hyder"],"images": ["https://images2.newscred.com/Zz04ZTNjZjFlNjUwMzFhNmIwOTI1OTk0YjIwNjU4NGM2ZA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">As a keynote speaker who travels internationally, educating audiences on how to do business and win hearts and minds in the digital age, one of the things I regularly encounter is confusion over how to assess and cultivate the loyalty of customers. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "6e93b06a8343acc7956b21a765dd1f51","url": "how-to-retain-viewers-with-your-online-video-services","title": "How to retain viewers with your online video services","published": "2017-03-27T18:14:22Z","source": "Verizon Enterprise Solutions","pop": 7,"age": 156,"rank": 49, "topics": ["Online Video", "TV Show"],"authors": ["Timothy Stevens"],"images": ["https://images1.newscred.com/Zz0xMDZlNDFhMTY4YTI1YjQ0MTRkNDk2YzgzOGE0YmVlMA=="],"category": ["report_category:business_performance"],"industry": ["industry:media_entertainment"],"summary": "Broadcasters that want to grow their OTT presence face big challenges. When even kids can make high-quality video from their homes, how do you stand out? Discover three ways you can differentiate your service. ","h1": "How to retain viewers with your online video services","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "e20139ffa76564c7255d7107e94c29a1","url": "want-to-build-an-inspiring-brand-here-are-tips-from-cmos-at-airbnb-cvs-health-and-centene","title": "Want To Build An Inspiring Brand? Here Are Tips From CMOs At Airbnb, CVS Health And Centene","published": "2017-03-27T14:26:54Z","source": "Forbes","pop": 1,"age": 156,"rank": 114, "topics": ["CVS Health"],"authors": ["John Ellett"],"images": ["https://images2.newscred.com/Zz0yMDMwNjczN2I2ZTE0NDQyY2IyMDhmYTE4M2QwY2NmNQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Consumers today don&rsquo;t simply want to engage with brands, they want to be inspired. Companies like Airbnb, CVS Health and Centene are creating loyal customer relationships because they are doing business with a sense of purpose that their customers believe in. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "20ea950619c8f5dfe50ed197f3cbe7f1","url": "seo-lesson-artificial-intelligence","title": "SEO Lesson: Artificial Intelligence","published": "2017-03-27T14:21:56Z","source": "Business2Community","pop": 2,"age": 156,"rank": 93, "topics": ["Steven Spielberg", "Google Plus", "BusinessOnline", "Robotics & Artificial Intelligence"],"authors": ["Roee Ganot"],"images": ["https://images2.newscred.com/Zz1iMDAwMjYzY2ZhMjczYjQxZmIyNzgzOWNhMzBjYzEzZA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Artificial intelligence has been predicted to change our future for some time now. Movies ranging from &ldquo;Terminator&rdquo; to Steven Spielberg&rsquo;s &ldquo;AI&rdquo; have offered us contrasting visions of the future with artificial intelligence &ndash; at times terrifying and at times pushing us to new frontiers.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "3aa39876e97c7f954ebbee229c587b50","url": "employee-passwords-are-behind-massive-security-breaches","title": "Employee Passwords Are Behind Massive Security Breaches","published": "2017-03-23T06:00:11Z","source": "VentureBeat","pop": 1,"age": 161,"rank": 115, "topics": ["Social Commerce", "LinkedIn Corporation", "Mark Zuckerberg", "Yahoo", "Tumblr", "Pinterest", "MySpace", "NYC Start-Ups", "Facebook"],"authors": ["Dashlane", "Emmanuel Schalit"],"images": ["https://images2.newscred.com/Zz1lMTdiODhkZGQ2YTVkYmZmZTk0YTczMDU4NGMzNDRmMQ=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:agriculture"],"summary": "<p thirtyword=\"secondpart\">Yahoo, MySpace, Tumblr, and LinkedIn made headlines in the last 12 months for their enormous data breaches. Hackers released the data for 1.5 billion Yahoo accounts, 167 million LinkedIn users, 360 million user records on Myspace, and over 65 million Tumblr accounts.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "11dcaeb4b1497b97c74143f1ab0be27a","url": "critical-infrastructure-off-the-web-out-of-danger","title": "Critical Infrastructure: Off The Web, Out Of Danger?","published": "2017-03-22T18:07:32Z","source": "CSO Magazine","pop": 1,"age": 161,"rank": 115, "topics": ["NATO", "Cybercrime", "Pearl Harbor", "James Dean", "Education"],"authors": ["Taylor Armerding"],"images": ["https://images3.newscred.com/Zz0yNGUzZDY2NzU0YWI4YTVmNDc1NjZiYzVlY2IxMDkzNg=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > The debate over the chances of a catastrophic cyber attack taking down a major part of the nation&rsquo;s critical infrastructure (CI) has been ongoing for a generation.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d440f39a291e9a9cce71fd93b01e9fd6","url": "how-do-you-market-to-a-machine","title": "How do you market to a machine?","published": "2017-03-21T12:48:56Z","source": "Verizon Enterprise Solutions","pop": 8,"age": 162,"rank": 41, "topics": ["Super Bowl", "Robotics & Artificial Intelligence", "Advertising", "Christmas"],"authors": ["Claudia Seeger"],"images": ["https://images2.newscred.com/Zz0zMmNiOGVmMmNmMjgwZWQzMjdjMzAzNzBkMGVkNDliNQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:retail"],"summary": "Technology has already changed marketing exponentially—but what’s next? Your future target audience could be full of Alexas and Watsons. And what would this mean for your ad campaigns? ","h1": "AI in marketing: How do you market to a machine?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "9b379001b6d6e87313fb05e33caaf585","url": "the-complete-beginner-s-guide-to-big-data-in-2017","title": "The Complete Beginner's Guide To Big Data In 2017","published": "2017-03-14T12:44:30Z","source": "Forbes","pop": 7,"age": 169,"rank": 48, "topics": ["Robotics & Artificial Intelligence", "Business Intelligence"],"authors": ["Bernard Marr"],"images": ["https://images3.newscred.com/Zz0wNzMwMDNlODY0MmZjMDcwNTk1YTJmZDMyN2JhMjZmMg=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Big Data is a term that has been around for some time now but there is still confusion about what it actually is. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "a632fbc0bedcfe967bafa4404336d79b","url": "interoperability-the-key-to-the-emerging-smart-city","title": "Interoperability: The Key To The Emerging Smart City","published": "2017-03-14T06:00:00Z","source": "ReadWrite","pop": 4,"age": 169,"rank": 72, "topics": ["Kansas", "Ecosystem", "Kansas City", "Innovation"],"authors": ["Tom Blewitt"],"images": ["https://images1.newscred.com/Zz04NjcxMTExNTAyMjVjMzg1ZTQwYWIxNDBlNDJiODZjOA=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Smart city technologies continue to experience rapid growth, both in the development of new devices and their applications within the city environment. Globally, cities&rsquo; investment in Internet of Things (IoT) technologies will increase by $97 billion from 2015 &ndash; 2019. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "0ebaca73da7b716a3b543cb5aec435cc","url": "google-s-clever-tool-for-emergency-services-is-now-saving-lives","title": "Google’s Clever Tool For Emergency Services Is Now Saving Lives","published": "2017-03-13T06:00:00Z","source": "The Next Web","pop": 1,"age": 169,"rank": 104, "topics": ["Fine Art", "Google Plus", "Wifi"],"authors": ["Már Másson Maack"],"images": ["https://images4.newscred.com/Zz0wZGZlZDQ3ZDRkMWE3NmMzZTI1NWVlMmU2ZGMzOWNjMw=="],"category": ["report_category:technology_innovation"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"firstpart\" > The time-wasting possibilities of smartphones are mesmerizing &mdash; sending&nbsp;funny crochet pics to grandma or spending hours mastering the art of crushing candy. But now, instead of smartphones only wasting your life, they might actually start saving it.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "d840a895d58948552359cb6f7b117b7b","url": "uber-hiring-a-coo-what-a-red-hot-startup-needs-to-learn-from-boring-old-firms","title": "Uber Hiring A COO: What A Red-Hot Startup Needs To Learn From Boring Old Firms","published": "2017-03-09T16:56:18Z","source": "Forbes","pop": 1,"age": 173,"rank": 106, "topics": ["Uber", "Mark Zuckerberg", "Sheryl Sandberg", "Startups"],"authors": ["Howard Yu"],"images": ["https://images2.newscred.com/Zz0zMmFjYTdhNzU5NjFiZWVlMWZlNzMzZjE4NDFiMjU3ZA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">On Tuesday, Uber&rsquo;s CEO, Travis Kalanick, announced that he is hiring his #2. In a terse statement that appeared on the Uber blog, the CEO said he is &ldquo;actively looking for a Chief Operating Officer&rdquo; (COO). </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "339b2efdec06f5e49e9e0d747afbd5fa","url": "top-5-applications-for-the-industrial-internet-of-things","title": "Top 5 Applications For The Industrial Internet Of Things","published": "2017-03-09T11:41:06Z","source": "Raconteur","pop": 6,"age": 174,"rank": 55, "topics": ["Machine Learning", "Automobiles", "Productivity", "Robotics & Artificial Intelligence"],"authors": ["Finbarr Toesland"],"images": ["https://images2.newscred.com/Zz1lZWVkMzFmMzE3ZmNkOGM3MzRlZGYwMDI0ZmVlYTQ3MQ=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The growth of the internet of things (IoT) is drastically changing how consumers interact with their cars, homes and appliances, but the aptly named second digital revolution has major implications for industry too. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "d921aac41ce74be05c60da3c8d2d3244","url": "i-admit-it-i-m-biased","title": "I Admit It: I’m Biased","published": "2017-03-08T10:00:00Z","source": "Verizon Enterprise Solutions","pop": 9,"age": 175,"rank": 34, "topics": ["Safety in manufacturing", "Education"],"authors": ["Cary Cusumano"],"images": ["https://images4.newscred.com/Zz0wMGFmMTg5NWE0NWYwOTQ4ZDhhYmZlZmQ1MzU0YzI0Mw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "You’re collecting more and more customer data. But what are you doing with it? You need to do more than just use it for presentations and follow-up meetings. Discover what’s preventing you from getting the most from your CX data and developing a bias for action. ","h1": "I Admit It: I'm Biased","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "6e66e3cc4e836b7a402b0bcb96e726d1","url": "a-cmo-s-greatest-challenge-growing-your-brand-s-ecotone","title": "A CMO's Greatest Challenge -- Growing Your Brand's Ecotone","published": "2017-03-07T23:01:47Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Ecosystem"],"authors": ["John Winsor"],"images": ["https://images4.newscred.com/Zz04Y2Q2NzUzOGFjM2Y1YWJiM2Q1YWFhYjIyYTQ3ZjQzZg=="],"category": [""],"industry": [""],"summary": "<p thirtyword=\"secondpart\">In today&rsquo;s social media-driven world, your brand&rsquo;s customers are becoming their own content creators, media channels, and networks. &nbsp;There are many approaches to think about these evolved relationships &ndash; community, eco-system, or influencers are just a few. </p> ","h1": "","type": "","outcome": [""]},{"id": "94ffb020edcd52cb4daa08d5acc92a0e","url": "the-future-of-all-business-proximity-scale-and-business-model-innovation","title": "The Future Of All Business: Proximity, Scale And Business Model Innovation","published": "2017-03-07T18:57:18Z","source": "Forbes","pop": 1,"age": 173,"rank": 106, "topics": ["Energy Industry", "Drone", "Energy", "Robotics & Artificial Intelligence", "Solar Energy", "Environment", "Green Energy", "Emerging Technologies", "Innovation"],"authors": ["Robert C. Wolcott"],"images": ["https://images3.newscred.com/Zz02M2JiNDE5MjMxMzU3ZTUzNTFjMWMzNThkZjg4OGMyYQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">We are witnessing the beginning of a proximity onslaught. Emerging technologies and new business models enabling companies to produce and provide products and services ever closer to the moment of demand. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "5b5a6fb770f3d90a3cb0e4c6cf31e3a2","url": "customer-experience-mystification","title": "Customer Experience Mystification","published": "2017-03-06T17:54:56Z","source": "Verizon Enterprise Solutions","pop": 6,"age": 177,"rank": 56, "topics": [],"authors": ["Maria Fernandez-Riddick"],"images": ["https://images4.newscred.com/Zz1hOGJmMGNjMTA1ZDVhNDFhNTFhNTk1OTA3ZGM4MGMwZg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "CX isn’t just another empty buzzword. It represents an evolution in the way we think about the customer journey. We demystify CX and explore what you need to focus on, how it’s different to customer service and why CX terminology is often misunderstood. Find out how you can make your CX strategy truly customer-centric. ","h1": "Customer Experience Explained","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "c5b24253805868bbbfc79cdd52334778","url": "how-brands-of-the-future-need-to-utilise-voice-search","title": "How brands of the future need to utilise voice search","published": "2017-03-06T16:44:31Z","source": "The Drum","pop": 1,"age": 175,"rank": 107, "topics": ["Google Inc.", "Google Plus", "Digital Marketing"],"authors": ["Lois Wentworth"],"images": ["https://images4.newscred.com/Zz1hMGY5OWUwYzAwNTdjZDdlOTJkYTU4MmJkNzFlY2Q1Nw=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Voice search is pretty exciting territory at the moment. Those up-to-date in the digital marketing sphere may have been discussing optimising for long-tail keywords for a while now, both in web content and PPC campaigns. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "08ba72668bc0e48f090e1ad0e17a59c2","url": "a-360-degree-approach-to-digital-transition","title": "A 360-Degree Approach To Digital Transition","published": "2017-03-06T16:35:41Z","source": "Forbes","pop": 1,"age": 167,"rank": 103, "topics": ["Silicon Valley", "Innovation"],"authors": ["Bain Insights"],"images": ["https://images2.newscred.com/Zz1lYTUwYjNhNzczZmE1MTNjMzczOTliY2IyMmMwNDBiNQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Given the pace at which digital innovation is disrupting industries globally, it&rsquo;s not surprising that most management teams feel pressure to find and deploy the right technology as fast as their budgets will allow. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "854755f5cb85300e5761163aa23aa77e","url": "remote-workforce-nps-the-most-important-metric-you-re-missing","title": "Remote Workforce NPS: The Most Important Metric You’re Missing","published": "2017-03-03T10:00:00Z","source": "Business2Community","pop": 1,"age": 179,"rank": 117, "topics": [],"authors": ["Eyal Katz"],"images": ["https://images3.newscred.com/Zz1kNWJiYjNhNWYyZDgxZGQwZGYwZDdiODU0NDM5MzM3YQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">There are so many different metrics and acronyms, you&rsquo;re forgiven if you don&rsquo;t recognize this one.\r\nYou must have noticed, though, how much the way people work is changing. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "08f144e23eb64c43c32c063988aa0a83","url": "the-4-pillars-of-digital-transformation","title": "The 4 Pillars of Digital Transformation","published": "2017-03-02T18:57:11Z","source": "Verizon Enterprise Solutions","pop": 6,"age": 180,"rank": 52, "topics": ["Virtual Reality", "Robotics & Artificial Intelligence", "Jobs (profession)"],"authors": ["Danny Johnson"],"images": ["https://images3.newscred.com/Zz00ZjBmOTU1MTYxODYzOWZiMjBjNmUxM2Q1YmZjMmI1ZQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Technology has radically changed the way we work. And the next wave of change is set to be even more disruptive. Being at the forefront of that change means having firm foundations. Here are the four pillars we believe support a platform for successful digital transformation. ","h1": "The 4 pillars of digital transformation","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "2484311ca81219597ec9882aab60db16","url": "the-democratisation-of-energy","title": "The Democratisation of Energy","published": "2017-03-02T15:07:52Z","source": "Raconteur","pop": 2,"age": 179,"rank": 90, "topics": ["Apps", "App Economy", "Rush (2008 TV series)", "Ecosystem", "Siemens", "Frequency", "Education", "Mobile Phone"],"authors": ["Felicia Jackson"],"images": ["https://images1.newscred.com/Zz02YWY5ZDA0YjNhZjBlMmZiMzJhNWZjMzcyNjQzZjdhYw=="],"category": [""],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Technological developments are already blurring the line between producers, distributers and consumers. Companies are increasingly looking for opportunities to become power producers in the new urban energy rush and could become significant contributors in the future.\r\n</p> ","h1": "","type": "","outcome": [""]},{"id": "0eba3ac0cd4fc74103b337ec94bc6c75","url": "to-improve-information-security-enterprises-and-government-must-share-information","title": "To Improve Information Security, Enterprises and Government Must Share Information","published": "2017-03-02T14:55:31Z","source": "NetworkWorld","pop": 2,"age": 179,"rank": 90, "topics": ["Yahoo", "Information Security", "Security", "Computer & Network Security"],"authors": ["Lior Div"],"images": ["https://images1.newscred.com/Zz1kZmQ5YzA4MzRjYzc4OTllOGQ1YjQwNmU3ZjlmM2JlYw=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "d1e7fcbf48944ca896b31a626634b035","url": "help-me-help-you-sincerely-your-customer","title": "Help Me, Help You. Sincerely, Your Customer.","published": "2017-03-01T18:38:13Z","source": "Verizon Enterprise Solutions","pop": 4,"age": 182,"rank": 67, "topics": [],"authors": ["Erin Van Remortel"],"images": ["https://images2.newscred.com/Zz04ODBjNjExNTNlYzI3ZWZjYzAwMDI1YjBkMDVjNTkzZA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Customer experience is a key differentiator for your business. But how can you improve the service you’re offering? Could it be you’re missing out on input from the one group that has all the answers? ","h1": "How Complaints Can Help You Improve CX.","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "ec9b4ae8e3d0661a6082961f5ae92eb5","url": "entrepreneurs-18-optimistically-mind-blowing-predictions-about-the-future","title": "Entrepreneurs' 18 Optimistically Mind-Blowing Predictions About The Future","published": "2017-03-01T17:45:19Z","source": "Forbes","pop": 0,"age": 181,"rank": 137, "topics": ["Dubai", "Automobiles", "Middle East"],"authors": ["Elizabeth MacBride"],"images": ["https://images3.newscred.com/Zz00NTA1NDA0ZDIyMDY5OTFjMjczMDM0MjI1YmMyZGMxMg=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Self-driving cars are coming to Dubai. What&rsquo;s next? 18 predictions about the future from entrepreneurs, including flying cars, artificial eyes and AI that diagnoses even the rarest diseases. Over the past couple of months, more of the work of the Dubai Future Foundation has been crossing my desk. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "79f79c7f76b85922be3ff9620ec4fa2e","url": "how-companies-are-saving-money-and-making-millennials-happier","title": "How Companies Are Saving Money AND Making Millennials Happier","published": "2017-02-22T15:15:22Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Millennial Generation", "Composition", "Personal Finance", "United States", "The Americas"],"authors": ["Sarah Landrum"],"images": ["https://images1.newscred.com/Zz03NDY3ZjZjODBhYWJkMjljMWYyOGM4MTY1NTI4YWM0MA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The demographic composition of the United States is changing almost before our eyes. By some estimates, and in some sectors of the workforce, 2020 will mark the turning point at which millennials will finally represent a majority in the workforce. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "c7fc1434d18e908ea3082bbfb1b9addb","url": "what-is-the-right-connectivity-option-for-your-iot-project","title": "What is the right connectivity option for your IoT project?","published": "2017-02-22T10:20:09Z","source": "Verizon Enterprise Solutions","pop": 5,"age": 185,"rank": 59, "topics": ["Business Strategy"],"authors": ["Faraz Shafiq"],"images": ["https://images3.newscred.com/Zz0wMzI3NGViNmEzZGZhYTdkNjEzY2U0Y2M3MGE0NjhkNg=="],"category": ["report_category:internet_of_things"],"industry": ["industry:agriculture"],"summary": "Organizations have big plans for the Internet of Things (ioT). They are planning to use it to transform their whole business. However, it seems many organizations are still struggling just to get their IoT initiatives off the ground. One of the biggest issues is getting the right infrastructure in place. To help you accelerate you journey, here is a high-level guide that will help you choose the right connectivity for your IoT project. ","h1": "What’s the Right IoT Connectivity Option for your IoT Project?","type": "type:analyst:articles","outcome": [""]},{"id": "780f8b04b74efc6d3de15f28953488ea","url": "rsa-2017-notes-privileged-accounts-and-blunders","title": "RSA 2017 Notes: Privileged Accounts and Blunders","published": "2017-02-21T11:00:00Z","source": "CSO Magazine","pop": 1,"age": 185,"rank": 109, "topics": ["Vortex", "Access control"],"authors": ["Dave Lewis"],"images": ["https://images3.newscred.com/Zz01MTJkOGQyODYwMWVmODg0NTBjNjBkNmZiODVjZmFjYQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Privileged accounts are a necessary evil for a lot of organizations. These accounts allow for users to be able to do work that, in some cases, lead to unfortunate results if misused. But, how many organizations do a good job at tracking and controlling these accounts?</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "da4176d9dd82b819006dca8f2663e204","url": "get-a-new-perspective-on-cybersecurity","title": "Get a new perspective on cybersecurity","published": "2017-02-21T08:37:26Z","source": "Verizon Enterprise Solutions","pop": 8,"age": 185,"rank": 38, "topics": ["Communications", "Cyber Security", "Cybercrime", "Data Breach", "Security"],"authors": ["Verizon Enterprise Solutions"],"images": ["https://images3.newscred.com/Zz1hMDA1Mzk0NWU1MGZhZDJiYTdjYmFjZDllZGE4YWQ0Ng=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "The Data Breach Digest is back. We bring you 16 more tales from the frontline of cybersecurity. And this year, they’re written from the perspective of key stakeholders from acros the business—including HR and corporate communications. Here’s how to get the most from the latest edition. ","h1": "Get a New Perspective on Cybersecurity with This Year's Data Breach Digest","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "54b51747d9f719f8ab3b104d502b58ff","url": "the-internet-of-things-that-can-attack-you","title": "The Internet of Things That Can Attack You","published": "2017-02-20T15:00:01Z","source": "Forbes","pop": 0,"age": 185,"rank": 138, "topics": ["Malware", "Connected Home", "Weather", "Flood", "Weather Impact"],"authors": ["CIO Central Guest"],"images": ["https://images3.newscred.com/Zz0wYzU4ZmU1NTFmMTUxMGI4MmE5MDg0MTE0MGM4ZmM1ZQ=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">The Internet of Things crashed into the old Internet on Oct 21st, and it wasn&#8217;t pretty. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "101cb225d05c857c8179ae0e76df6e38","url": "ai-is-here-to-save-your-career-not-destroy-it","title": "Ai Is Here to Save Your Career, Not Destroy It","published": "2017-02-20T11:00:08Z","source": "VentureBeat","pop": 1,"age": 185,"rank": 109, "topics": ["Robotics & Artificial Intelligence", "Careers", "Jobs (profession)"],"authors": ["Dharmesh Shah"],"images": ["https://images3.newscred.com/Zz0zYjUxMTAxYWJhNTMyODZmMzI0YmE5MGM2YWU2M2Y0ZQ=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Imagine: Humans waging an epic battle against technology, with human intelligence inevitably subjugated by artificial overlords. Plenty of folks would line up with front-row tickets and popcorn in hand. But it&rsquo;s also the very real manifestation of a universal fear &mdash; jobs relegated to machines, livelihoods handed over to bots.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "7fad10099130588dc9ee5dec909fa1bc","url": "are-we-reaching-the-limits-of-technology","title": "Are we reaching the limits of technology?","published": "2017-02-20T08:55:47Z","source": "Verizon Enterprise Solutions","pop": 4,"age": 185,"rank": 68, "topics": ["Automobiles", "Virtual Reality", "Robotics & Artificial Intelligence", "Harness", "Computing", "Business Intelligence"],"authors": ["Vic Bhagat and Shawn Hakl"],"images": ["https://images4.newscred.com/Zz1jYzU0YzU2NTNiYTVhM2I5Y2U5OWU3MDI0MmViZWIzMw=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "The Internet of Things, big data, artificial intelligence and virtual reality are all creating exciting opportunities. But they’re also demanding an exponential growth in computing power and connectivity. Are today’s computers and networks up to the job—or are we reaching the limits of what they can deliver? ","h1": "Quantum computing and SDN","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "2f868a7653f223ebb1a5f80db10487d2","url": "innovation-is-the-art-of-defining-boundaries","title": "Innovation Is The Art Of Defining Boundaries","published": "2017-02-16T18:52:14Z","source": "Forbes","pop": 1,"age": 185,"rank": 120, "topics": ["Fine Art", "Most Valuable Player", "Entrepreneurship", "Drone", "Startups", "Innovation"],"authors": ["Tom Goodwin"],"images": ["https://images1.newscred.com/Zz1lZmFhMmVhOGRkZWMxYjZiMjJiMmMwMDA5MzdmYjViNA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">Everyone is talking about innovation it seems. From Innovation Labs to Hacks, working with startups to MVP sprints, the tide is turning and to best protect our business we need to unleash the power of creativity to forge ahead.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "98826567c53157afb5b3b770076970c6","url": "how-tech-is-turning-cmos-into-chief-collaboration-officers","title": "How tech is turning CMOs into Chief Collaboration Officers","published": "2017-02-16T16:02:54Z","source": "The Next Web","pop": 0,"age": 185,"rank": 138, "topics": ["Millennial Generation", "Shopping", "Digital media", "Online Shopping", "Online Media"],"authors": ["Paul Davies"],"images": [],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">For marketers, the easy days are over. Once upon a time, maybe four or five years ago, it was fairly straightforward to segment customers, predict their behavior and schedule broad but impactful marketing campaigns.\r\nTechnology has changed all that. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "9286ea89953618d1569327bba8f49562","url": "have-your-metrics-become-your-master","title": "Have Your Metrics Become Your Master?","published": "2017-02-16T15:57:28Z","source": "Verizon Enterprise Solutions","pop": 2,"age": 187,"rank": 98, "topics": ["Safety in manufacturing"],"authors": ["Cary Cusumano"],"images": ["https://images3.newscred.com/Zz01OTQwNTg5ZDQ4MmE1NGVjYzRkZjhiODRkNDFhNWQ1Mg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "What’s the top priority of your CX strategy—improving your metrics or delivering what customers really want? Find out why one CX professional was stunned to silence and how you can take the right approach to CX. ","h1": "Have Your CX Metrics Become Your Master?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "dafb8d4e673d90dde392dbca25ddb314","url": "iot-and-ai-improving-customer-satisfaction","title": "IoT And AI: Improving Customer Satisfaction","published": "2017-02-15T18:43:25Z","source": "Forbes","pop": 1,"age": 185,"rank": 109, "topics": ["Business Strategy", "Customer Support", "Entrepreneurship", "Robotics & Artificial Intelligence", "Act-On", "Education"],"authors": ["Daniel Newman"],"images": ["https://images4.newscred.com/Zz00ODQ0ODhlOTc3YTBhMDA4MzVjZmY0YTUyMmY2MWU4Yg=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">True&mdash;the Internet of Things (IoT) and artificial intelligence (AI) hold huge promise in helping us better engage and satisfy our customers. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "058d1225bea319e39f5263a5aed34860","url": "taking-digital-transformation-beyond-the-digital","title": "Taking Digital Transformation Beyond The Digital","published": "2017-02-14T13:11:45Z","source": "Forbes","pop": 1,"age": 185,"rank": 109, "topics": ["Software", "Cloud Computing", "Computing", "Computer Software", "Innovation"],"authors": ["Joe McKendrick"],"images": ["https://images3.newscred.com/Zz1iZWJjMDU5YmY2MjMyMzBhMGQ1YmQyNTdjOTJmYzExZQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">With every technology wave comes vast amounts of budgets spent with the hopes that shiny new solutions will magically and instantly lift organizations out of their calcified, sluggish processes up the sleek slope of hyper-competitiveness. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "bb5aa8b4388e25ce719206b39e2e107e","url": "insurers-turn-to-outsourcing-to-shore-up-data-security","title": "Insurers turn to outsourcing to shore up data security","published": "2017-02-14T12:36:01Z","source": "Information Management","pop": 999997,"age": 0,"rank": 888887, "topics": ["Personal Finance", "Cyber Security", "InSecurity", "Cybercrime", "Outsourcing", "Security", "Computer & Network Security", "Cyber Insurance"],"authors": ["Nathan Golia"],"images": ["https://images1.newscred.com/Zz0wYjgxMmU5ZjBmNDBmM2IyOTFmNWI1YmRmMmI1NTA3MA=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:insurance"],"summary": "<p thirtyword=\"secondpart\">Two-thirds of insurers have increased the amount of outsourcing they use to combat cyber threats in the past two years, as the number of threats rises, according to a Moody's survey of 50 insurance carriers.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b409cac38479f7e5559a94d78f1ca64c","url": "big-banks-must-adapt-to-the-digital-age-or-die","title": "Big banks must adapt to the digital age or die","published": "2017-02-13T15:16:30Z","source": "Raconteur","pop": 1,"age": 185,"rank": 120, "topics": ["Software", "Music", "Marc Andreessen", "Music Industry", "Banking", "Silicon Valley", "Startups", "Advertising", "Computer Software", "Entertainment Industry"],"authors": ["Oscar Williams-grut"],"images": ["https://images2.newscred.com/Zz1hYzg5NjliNWYyOWJiZTcwYjQ2Y2E2ZGUxMjQwMGMzMQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"firstpart\" > &#8220;Software is eating the world,&#8221; Silicon Valley venture capitalist Marc Andreessen declared in a famous article five years ago. After munching through advertising, media and transportation, software&#8217;s appetite is now being satisfied by banking and finance.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "e60dc314d5ab19bb3101c32577d5e878","url": "where-smbs-have-the-upper-hand","title": "Where SMBs have the upper hand","published": "2017-02-13T10:51:09Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 156,"rank": 114, "topics": ["Virtual Reality"],"authors": ["Catherine Sugarbroad"],"images": ["https://images4.newscred.com/Zz0wZTU2OWZlOTBkODZhYjQxMjEyODhmNWRmNGY3ODllYg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Today’s technology is making it easier for small and medium-sized businesses (SMBs) to compete with the largest of enterprises—and even to disrupt them. They can access advanced productivity tools in the form of Software-as-a-Service (SaaS). And they have a global marketing reach thanks to social media. So, what can enterprises learn from SMBs when it comes to digital transformation? ","h1": "A culture of innovation: what can SMBs teach us?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "6202e6b5353a7bb70f7c29e95a23540a","url": "numbers-aren-t-enough-cx-professionals-need-to-be-storytellers-too","title": "Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too","published": "2017-02-09T17:57:35Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Careers"],"authors": ["Cary Cusumano"],"images": ["https://images1.newscred.com/Zz01ZWNmNDcyMmI2NzRjZmU5YzcxZTE2Y2QzMjhhNWE3MA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Data can only tell you so much. If you want to really understand your customers’ journey, you need more than just numbers. To drive greater CX, you need to learn from the stories of happy and unhappy customers.\r\n\r\nRead more > ","h1": "Anecdotal Data IS Data:  CX Professionals Need to Be Story Tel","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f964cb77f0a9c46dc49f63aacde1d6f2","url": "3-common-jobs-ai-will-augment-or-displace","title": "3 common jobs AI will augment or displace","published": "2017-02-07T23:13:58Z","source": "VentureBeat","pop": 1,"age": 166,"rank": 116, "topics": ["Japanese", "Customer Support", "Automation", "Personal Finance", "Business Insurance", "Robotics & Artificial Intelligence", "Outsourcing", "Jobs (profession)"],"authors": ["Adam Devine", "WorkFusion"],"images": ["https://images1.newscred.com/Zz01NDU0NzgxNjhlNDM2YThhZTVmMmUzOTVmZjZkZGI4MA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">It&rsquo;s clear artificial intelligence (AI) and automation will dramatically affect the job market, but there&rsquo;s conflicting ideas on just how soon this will happen. </p> ","h1": "","type": "type:analyst:articles","outcome": [""]},{"id": "082383e1b77b29801a951b31ce4d71cd","url": "go-local-or-go-home","title": "Go local or go home","published": "2017-02-06T10:31:16Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 184,"rank": 108, "topics": ["Startups", "Yelp"],"authors": ["Janet Schijns"],"images": ["https://images3.newscred.com/Zz01YWJlMWZkZGRlNTk1NmU5ZWY0NWMwMzAxOTRhNGNjYQ=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "Have you noticed?  Local businesses are driving a level of creativity in customer experience that’s catching some larger enterprises by surprise. Yup, local – it’s a “thing,” and that “thing” is paying big dividends to those small businesses that want to go further and faster, and do it more profitably than their less tech-minded competitors. ","h1": "Go Local or Go Home","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "2a691fdfd3fb4341ce1c1a0864600625","url": "when-it-comes-to-cx-don-t-get-hung-up-on-the-jargon","title": "When it comes to CX, don’t get hung up on the jargon","published": "2017-02-02T16:10:24Z","source": "Verizon Enterprise Solutions","pop": 3,"age": 184,"rank": 84, "topics": ["Machine Learning", "Shopping", "Robotics & Artificial Intelligence"],"authors": ["Gordon Littley"],"images": ["https://images4.newscred.com/Zz1lZGJhZjdhZTcyZTQ0MTJkNGE3ZTRjM2JhMWFkMGY5Nw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "You want to improve your customer experience. And you’ve read that artificial intelligence, contextual learning, machine reasoning and similar technologies are the answer. But which of these tools is right for your business? Maybe you’re asking the wrong question. ","h1": "When it comes to getting customer insights, don't get hung up on the jargon","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "55bd509fdda83c1c44d012e757248d60","url": "the-automated-future-of-the-fashion-store-where-self-checkouts-and-human-touch-collide","title": "The Automated Future Of The Fashion Store: Where Self-Checkouts And Human Touch Collide","published": "2017-02-01T15:36:05Z","source": "Forbes","pop": 1,"age": 180,"rank": 118, "topics": ["Retail", "Seattle", "Mobile Phone"],"authors": ["Rachel Arthur"],"images": ["https://images2.newscred.com/Zz0zZWZmNDZmNjMwMTg0ZDc4OTBmNDQzNGEyNDM1ZjYwOQ=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">There was a media frenzy when Amazon Go was announced in December 2016. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f0de47d1596833716a1c71179502b4b4","url": "patients-are-about-to-see-a-new-doctor-artificial-intelligence","title": "Patients are about to see a new doctor: artificial intelligence","published": "2017-02-01T14:56:00Z","source": "VentureBeat","pop": 999997,"age": 0,"rank": 888887, "topics": ["Healthcare Policy", "Supercomputer", "World Health Organization", "Doctor", "Healthcare Costs", "Robotics & Artificial Intelligence"],"authors": ["Alston Ghafourifar", "Entefy"],"images": ["https://images2.newscred.com/Zz1jZTVhODI3NzliN2VkZTk4ZWNjOTU4ZDNmM2Q3MTc2OQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">The World Health Organization has estimated that there is a global shortfall of approximately 4.3 million doctors and nurses, with poorer countries disproportionately impacted. In the U.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "2f264e914c6996c26338cea35df2fa3b","url": "when-will-you-be-able-to-get-behind-the-wheel-of-a-self-driving-car","title": "When will you be able to get behind the wheel of a self-driving car?","published": "2017-01-30T12:51:45Z","source": "T3","pop": 1,"age": 185,"rank": 120, "topics": ["Driverless Cars", "Automobiles"],"authors": ["David Nield"],"images": ["https://images2.newscred.com/Zz0zNGMzOGI2MjRhYjY2OGI1ZTE4MDM5NzE3YWY4NGJmNQ=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > Self-driving cars are all over the news these days, and the rapid pace of development shows no signs of slowing down, as we saw at CES in January. So when will you, an ordinary man or woman on the street, be able to take a trip in an autonomous vehicle?</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "563b26022d183d1fe3c535c4f4f340db","url": "will-machine-learning-eliminate-the-need-for-ad-agencies","title": "Will Machine Learning Eliminate The Need For Ad Agencies?","published": "2017-01-27T08:00:00Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Futuristic", "Machine Learning", "Harley-Davidson, Inc.", "Inspiration", "Consumer Electronics Show", "Las Vegas"],"authors": ["On Marketing"],"images": ["https://images4.newscred.com/Zz1lZDVmYWM4YWVmOGQ0YTE5MjY3MjI0ZjQxM2VkODA3Mw=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "<p thirtyword=\"secondpart\">This article is by Mark-Hans Richer, founder and president, Richer Inc., and former CMO of Harley-Davidson.\r\nIt&#8217;s post-CES season and naturally all the buzz is about cool, futuristic things that will change the world as we know it. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "3b8c11b39d995e031909485123eeafb2","url": "4-chatbot-predictions-for-2017","title": "4 chatbot predictions for 2017","published": "2017-01-26T09:09:22Z","source": "VentureBeat","pop": 999997,"age": 0,"rank": 888887, "topics": ["Apps"],"authors": ["Jonathan Shriftman", "Snaps"],"images": ["https://images3.newscred.com/Zz0xNDI1ZmE5MTk1ODQzZDZmZmJmMDM0YWU0ZjEzOTZkYQ=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "<p thirtyword=\"firstpart\" > More than 30,000 branded chatbots and 6,000 voice-activated skills hit the market during 2016. Now, chatbots and peer-to-peer messaging apps will move beyond last year&#8217;s market-entry issues and into mainstream use. For mobile messaging, 2017 is poised to be the Year of the Customer.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "afd150100fffa676091e661a8763bedd","url": "2017-predictions-innovation-and-perspiration","title": "2017 predictions: Innovation and perspiration","published": "2017-01-25T16:35:24Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 181,"rank": 137, "topics": ["Perspiration", "Niels Bohr", "Innovation"],"authors": ["Verizon Enterprise Solutions"],"images": ["https://images1.newscred.com/Zz1kNTAxZGQyYjU0MTIxMzFlNWViZTM5MTllNWZiZTE4NA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "Innovation is vital and core to what IT does. But IT is also about finding better ways of doing things that rarely get noticed—when was the last time anybody said “Wow, hasn’t the CRM system been running smoothly”? Updating business continuity plans or changing network providers might not have the same allure as a buzzy Internet of Things project, but that doesn’t mean they aren’t important. They could be vital to your success. ","h1": "2017 IT predictions: innovation and perspiration","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "47438575aa152561458071fb81afe4c2","url": "5g-pushing-ahead","title": "5G: Pushing ahead","published": "2017-01-20T12:49:42Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 91,"rank": 119, "topics": ["Digital Signage", "Payments Industry"],"authors": ["Matt Montgomery"],"images": ["https://images1.newscred.com/Zz03ZjQ3OGRhY2E3ZmViN2JkM2QzMGQ3YjlkM2UxOWQ3OA=="],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "5G promises a level of performance that’s going to be essential to support your digital ambitions. But while there’s lots of talk about 5G, there’s not much concrete detail about exactly what it will offer—or when. Find out where we’re at with 5G now and when you can expect to see the benefits. ","h1": "5G: pushing ahead","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "7964c9cc932669b8ecb0e63e28a505d5","url": "the-impact-of-machine-learning-on-the-customer-experience","title": "The impact of machine learning on the customer experience","published": "2017-01-19T17:20:21Z","source": "VentureBeat","pop": 999997,"age": 0,"rank": 888887, "topics": ["Machine Learning", "Benedict Cumberbatch", "Act-On", "Alan Turing", "Computing"],"authors": ["Graham Cooke", "Qubit"],"images": ["https://images3.newscred.com/Zz03NzU2ZTE1Nzk0MWQ2MmM0YjFjNzBlNjUxYjkzNjc3Ng=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Machine learning is revolutionizing many parts of business, and customer experience is no different. Beyond examples like driverless cars, machine learning has the potential to impact our lives and the lives of our customers in a big way. Is there room for important in your customer experience? Machine learning could make all the difference. ","h1": "The impact of machine learning on the customer experience","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "7a4dc981487d7bbcf930f6d0d136d817","url": "is-your-organization-a-data-science-leader-or-laggard","title": "Is Your Organization A Data Science Leader Or Laggard?","published": "2017-01-19T16:56:36Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Science & Research", "Education"],"authors": ["Bernard Marr"],"images": ["https://images4.newscred.com/Zz1jNmYwNjdhNDdmY2ViM2RhOWY1YWIwYzcyZmY2YWVkYg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Many businesses are still not getting value from their investments in big data and analytics. Forrester Research has looked at what factors influence the likelihood of success. It's used this information to group companies into three categories: “Insight leaders”, “The pack” and “Laggards”. Which does your organization fall into? And can you do better? ","h1": "Is Your Organization A Data Science Leader Or Laggard?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "edefd7783012db054c8a1e2209029f70","url": "customer-loyalty-is-not-about-the-customer","title": "Customer loyalty is not about the customer","published": "2017-01-13T14:21:26Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 162,"rank": 130, "topics": ["Customer Support", "Education (International)", "How Things Work", "Physics", "Thermodynamics", "Education"],"authors": ["Cary Cusumano"],"images": ["https://images1.newscred.com/Zz03NmYyMDE4NTAwN2MyZTkxMzRmMzk0Nzk4NTE3NjIyYw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "We all know the loyalty of customers can make or break a business. But do you really know how that loyalty works? We’ve looked at the physics behind customer loyalty. Find out the key to keeping your customers loyal and get our top tips for how you can improve your relationship with them. ","h1": "Customer loyalty is not about the customer","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "52e62ff7687615905d721e554491bc5a","url": "obscurity-no-more-4-steps-to-securing-the-ot-environment-for-manufacturing","title": "Obscurity No More: 4 Steps to Securing the OT Environment for Manufacturing","published": "2017-01-09T15:00:00Z","source": "Verizon Enterprise Solutions","pop": 2,"age": 167,"rank": 96, "topics": ["Security", "Performance Management"],"authors": [],"images": ["https://images3.newscred.com/Zz1jODQ3Njg0OTdjMjEyZGJkODUxYjUwNThjYzYwZWNiYQ=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:manufacturing_automotive"],"summary": "<p thirtyword=\"secondpart\">No one's going to bother to hack into my old legacy system. Sound familiar? Many manufacturers rely on &ldquo;security by obscurity,&rdquo; assuming they have nothing worth stealing, and take a casual attitude toward security. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "b85b40df559153e922a4054d11f26c80","url": "six-questions-to-determine-if-your-employees-have-adequate-collaboration-tools","title": "Six Questions to Determine If Your Employees Have Adequate Collaboration Tools","published": "2017-01-09T15:00:00Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 160,"rank": 129, "topics": ["Mobile Technology", "Mobile Banking", "Virtualization", "Financial Services", "Banking"],"authors": [],"images": ["https://images1.newscred.com/Zz0wOTUxNzYxMDZiYTc3ZGI0YmM0MTE1OGNlZWI5NmVjOA=="],"category": ["report_category:customer_experience"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"secondpart\">When it comes to how the financial services industry is deploying digital technology, customers are a happy lot.\r\nWith a huge focus on improving the customer experience, they have been provided impressive digital tools with easy-to-use interfaces. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "c538391969f3fcf87c0f0d2907d1d1fb","url": "from-cubicle-to-coffee-shop","title": "From cubicle to coffee shop","published": "2016-12-21T10:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Millennial Generation", "Coffee", "Baby Boomers", "Table tennis", "Entrepreneurship", "Careers", "Home Loan", "Startups"],"authors": ["Verizon Enterprise Solutions"],"images": ["https://images4.newscred.com/Zz1iY2I5YzdmNDA5OTE0NmVlMzBmZThjYzYyOTkwNTdjNw=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Gen Y—millennials—have grown up with tech and they want to work for ethical businesses. How much will the business world change when they’ve taken over from the skeptical, pragmatic Gen Xers? We interviewed millennials and Gen Xers from Verizon to find out how far their views on work differ. The results may surprise you. ","h1": "From cubicle to coffee shop: generational attitudes on work and career","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "6360136ee47724fe5b19bfd8c78a8763","url": "do-you-really-understand-millennials","title": "Do you really understand millennials?","published": "2016-12-20T10:06:41Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Millennial Generation", "Baby Boomers"],"authors": ["Verizon Enterprise Solutions"],"images": ["https://images2.newscred.com/Zz04YzQ0NDY4ODYwMTE3M2FkN2M4YWQ5OTNmMjc1NjU5MQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Do you really know your customers – and your employees? Or do you just know the generational stereotypes that surround them? You can’t assume millennials spend all day on social media or that generation X is made up of technophobes. We interviewed members of these generations about their attitudes to technology and more. How can you best engage your workforce and your customer base?  By figuring out what they really think. ","h1": "Do you really understand millennials?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "d366e0de3c8492d55d008b27ace99c4b","url": "what-s-the-future-of-on-premises-hosting","title": "What’s the future of on-premises hosting?","published": "2016-12-19T18:17:25Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Education"],"authors": ["Danny Johnson"],"images": ["https://images4.newscred.com/Zz05MGMyYTZkYWQ2M2MxYzMxOTk0ZmQ3NzE4YWZjNjQyYg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Barring a few startups, there aren’t many companies that have the luxury of starting with a blank slate. Almost everybody has legacy apps and on-premises equipment. Is “rip and replace” the only way forward? More and more companies are moving mission-critical apps to the cloud, but it’s misleading to talk about “cloud” as if it’s a single thing. There isn’t a “one size fits all” solution because companies need a mix of performance, price and security levels. And even with all these options, sometimes the on-premises option is still best. The answer is to get all these different delivery models to work together. How can you do that? ","h1": "What's the future of on-premises hosting?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "a776900ea1942ce949f2ad20369aa8e6","url": "how-to-build-an-effective-cio-cmo-partnership","title": "How to build an effective CIO/CMO partnership","published": "2016-12-16T13:08:13Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Business Strategy", "Marketing"],"authors": ["Vic Bhagat, CIO and Tony Recine, CMO"],"images": ["https://images1.newscred.com/Zz1jZTgyN2Y1MjE1NGI0YTYyOWNlODI0ZDFhNmJlMTc2OA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "The CIO/CMO rivalry has been a hot topic for a while. CMOs want to drive forward their digital agenda to engage customers. CIOs see this as their domain. But the relationship between these two roles doesn’t have to be contentious. In fact, for both to succeed it needs to be a partnership. ","h1": "How can CIOs and CMOs build effective partnerships to deliver results?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "1441b25121e36239f141a0573efe1245","url": "how-to-deliver-great-cx-across-every-channel","title": "How to deliver great CX across every channel","published": "2016-12-16T10:35:33Z","source": "Verizon Enterprise Solutions","pop": 2,"age": 180,"rank": 91, "topics": ["Cyber Monday", "Personal Computer"],"authors": ["Gordon Littley"],"images": ["https://images3.newscred.com/Zz0wOTFjZGVmYTFkZmRjMGM0NzYwMDI5MTNkNTFlNjI5Ng=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Are you meeting your customers’ expectations? Providing a great customer experience most of the time isn’t enough. Customers expect a consistent, personalized experience no matter how they interact with you—whether it’s online, via social or in-store. How can you achieve that and have customers coming back for more? ","h1": "How can you deliver great CX across every channel? With adaptive CX.","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "05a69b855857402f8a402fc4376d2ec3","url": "6-reasons-virtual-networks-are-a-no-brainer-for-financial-service-firms","title": "6 Reasons Virtual Networks are a No Brainer for Financial Service Firms","published": "2016-12-12T20:10:15Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 78,"rank": 114, "topics": ["Computer Hardware", "Financial Services", "Banking"],"authors": ["Patrick Broussard, Distinguished Architect - Global Solutions Verizon Enterprise Solutions Financial Vertical"],"images": ["https://images1.newscred.com/Zz1kMDIwODJmOGFjMDM4YTRiZjVlNTIwMTljNzg4ZDc2OA=="],"category": ["report_category:technology_innovation"],"industry": ["industry:financial_services"],"summary": "<p thirtyword=\"secondpart\">My customers want a self-service kiosk in the lobby. \r\nWe&rsquo;re exploring a micro website for niche investing. \r\nSound familiar?&nbsp; In today&rsquo;s fast-moving world, odds are high that your customers wanted these things yesterday, and you need to move fast to gain a competitive advantage.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "9e7a6fca49a44343d283bcbbafab7fc2","url": "beyond-segmentation-back-to-personal-service","title": "Beyond segmentation, back to personal service","published": "2016-12-06T13:53:12Z","source": "Verizon Enterprise Solutions","pop": 3,"age": 28,"rank": 79, "topics": ["Personal Finance"],"authors": ["Tony Recine"],"images": ["https://images2.newscred.com/Zz0yOTMyY2MxODI0ZTc3YjdjZWFkMDM5NGM2NDRkZWM5MQ=="],"category": ["report_category:customer_experience"],"industry": ["industry:financial_services"],"summary": "Are you still using crude segmentation measures, like age or income? Making customers re-enter information when they contact you? Customers now expect much better. The answer is to use the latest big data and analytics to identify addressable microsegments. Products and levels of service can then be tailored to improve customer satisfaction, reduce churn and increase profits. ","h1": "Beyond segmentation, back to personalized service","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "010ba34d0abe7c8cc4be28cb0eb224bd","url": "taking-chatbots-beyond-small-talk","title": "Taking chatbots beyond small talk","published": "2016-12-01T16:27:05Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 125,"rank": 110, "topics": ["Customer Service", "Clerical Jobs"],"authors": ["Gordon Littley"],"images": ["https://images1.newscred.com/Zz01NjJhNWNhNWRiZGJmMWZjZmZhOGExNWJmMGZhMGFiYw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "What’s on your “contact us” page? Most companies now offer customers a wide range of ways to interact: email, phone, live chat, social media...but one of the most interesting developments is the emergence of bot platforms ","h1": "Taking customer service chatbots beyond small talk","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "b21290df120d31df960c984b69868d5f","url": "bp-strengthens-its-digital-ties-by-building-a-fitbit-for-oil-and-gas-facilities","title": "BP strengthens its digital ties by building a 'Fitbit' for oil and gas facilities","published": "2016-12-01T04:07:49Z","source": "Business Insider","pop": 999997,"age": 0,"rank": 888887, "topics": ["Fitbit", "San Francisco", "Minds On", "General Electric", "Wearable Tech"],"authors": ["Eugene Kim"],"images": ["https://images4.newscred.com/Zz05MWNlYmQ1YTAwMTgwYmEyN2FlOGJmOTYwZjY5YWFlZg=="],"category": ["report_category:internet_of_things"],"industry": ["industry:energy_utilities"],"summary": "<p thirtyword=\"secondpart\">SAN FRANCISCO &mdash; For a company like BP, which has been in the oil and gas business for over a century, adopting&nbsp;new technologies could be a difficult task. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "422bdf3bf1bb28475fe278e945b75b64","url": "smart-apps-can-improve-medical-devices","title": "Smart apps can improve medical devices","published": "2016-12-01T03:57:34Z","source": "InfoWorld","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mobile Health", "Software", "Apps", "Oncology", "Automobiles", "Disease Management", "Biotechnology", "Medical Devices", "Cancer", "SIRI", "Men's Health", "Patient-Centered Care", "Health Insurance Industry", "Wearable Tech", "Computer Software"],"authors": ["Carlos Melendez"],"images": ["https://images3.newscred.com/Zz04MTg4NDBmNGY5MzNlOTYyOGNhZWQzNWJiMzhmMGU0ZQ=="],"category": ["report_category:internet_of_things"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">It seems like every day we&#8217;re hearing about how smart apps are impacting our world. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f0a180f1b835823dc6da19e9837bf120","url": "vr-offers-television-producers-hollywood-in-a-box","title": "VR offers television producers 'Hollywood in a box'","published": "2016-12-01T03:27:24Z","source": "AFP Relax News","pop": 999997,"age": 0,"rank": 888887, "topics": ["Virtual Reality", "Parallax", "Hollywood", "Visual Effects", "United States", "The Americas", "Geometry"],"authors": [],"images": ["https://images4.newscred.com/Zz1hNTliYzlmYTEzNTg5ODJmMWJjZThjYTUzMGM1ZmMwMw=="],"category": ["report_category:technology_innovation"],"industry": ["industry:media_entertainment"],"summary": "<p thirtyword=\"secondpart\">On a soundstage no bigger than a large bedroom a cameraman takes up various angles to film a helicopter that isn't there, landing in a field that isn't there either. &nbsp;Until recently, virtual reality was the preserve of the gaming crowd but producers say the technology is on the cusp of a boom which could change forever the way television is made. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "934184f753f06ad7a24284543e841af6","url": "vp-why-messaging-apps-are-issuing-in-a-new-era-of-commerce","title": "VP: Why messaging apps are issuing in a new era of commerce","published": "2016-12-01T02:59:23Z","source": "PSFK","pop": 999997,"age": 0,"rank": 888887, "topics": ["Apps", "Snapchat", "E-Commerce", "Mobile Commerce"],"authors": ["PSFK Op-Eds"],"images": ["https://images2.newscred.com/Zz04OGE2NDljMjNkMzRiYzAzN2RjZjhmNjU1NzVlMDA5OQ=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">In today&rsquo;s retail sphere, every brand is striving to lead the pack in e-commerce and m-commerce solutions, but the reality is that many brands are failing to provide the essence of a true 1:1 experience for their consumers. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "2005c28d3d23cb5151f39be96b51f75e","url": "what-s-the-role-of-the-sale-in-the-digital-era","title": "What's the role of the sale in the digital era?","published": "2016-11-28T18:54:36Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Retail Sales", "Black Friday", "Marketing", "Cyber Monday"],"authors": ["Verizon Enterprise Solutions"],"images": ["https://images4.newscred.com/Zz01MDI2Y2U3NmQzNTRlOWE5MTI4ZTgwOGZiYTVmMjhmMw=="],"category": ["report_category:business_performance"],"industry": ["industry:retail"],"summary": "It used to be that sales were about clearing out stock before the start of the new season—trying to make the best of over-optimistic production orders.  But with modern analytics, ERP systems and dynamic supply chains well-run retailers shouldn’t have much excess stock to shift.  So what's the role of the sale in the digital era? ","h1": "Tag: The role of the sale in the digital era","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "7e1d6c6bfa76c674738cdc67c6ddeb93","url": "the-secret-solution-to-all-ok-most-of-your-it-ot-challenges","title": "The Secret Solution to All (OK, Most) of Your IT/OT Challenges","published": "2016-11-22T20:50:58Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 167,"rank": 132, "topics": ["Information Technology and Services", "Utilities", "Smart Grids"],"authors": [],"images": ["https://images3.newscred.com/Zz0yODM4ODMzOTM5NGNkYWRiNmRhNzU1ZTc2ZjU1NjA3Mg=="],"category": ["report_category:business_performance"],"industry": ["industry:manufacturing_automotive"],"summary": "<p thirtyword=\"secondpart\">Operational technology (OT) and information technology (IT) used to be separate: separate products, separate functions, separate goals. But today in many industries, such as manufacturing, energy and utilities, there is a convergence of IT and OT. </p> ","h1": "The Secret Solution to All (OK, Most) of Your IT/OT Convergence Challenges","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "f97cbc92e650dfc50cba747e47f84b58","url": "the-business-case-for-virtual-reality","title": "The business case for virtual reality.","published": "2016-11-21T17:09:46Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mobile Technology", "Nintendo", "Video Games", "Computer Games", "Virtual Reality", "Sony", "Google Plus", "Entertainment Industry"],"authors": ["Richard Lucquet"],"images": ["https://images1.newscred.com/Zz1jYzQ1MTNlZDFlMGEwZDBmNzlhYWY1MjJkNWYxY2I2Yw=="],"category": ["report_category:technology_innovation"],"industry": ["industry:healthcare"],"summary": "It has long been billed as the future of video games, but the majority of investment in virtual reality (VR) is happening away from gaming. VR is finding a foothold in industries as diverse as travel, home design and emergency services. And this time around it’s delivering real benefits. ","h1": "The Business Case for Virtual Reality Applications","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "278569781fc9c598dc352eb2d34bad69","url": "ddos-and-digital-supply-chain-butterflies","title": "DDoS and digital supply chain butterflies.","published": "2016-11-10T18:12:20Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 166,"rank": 116, "topics": ["Hackers", "Consumer Products", "Butterfly", "Supply Chain"],"authors": ["John Loveland"],"images": ["https://images2.newscred.com/Zz1hZDJlYTRjYjA3YTI3NGJkYzRjN2VkODQyOGNlMDVlZA=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "While the dust may have settled from mid-October’s massive Distributed Denial of Service (DDoS) attacks, the implications are still being hotly debated. The hackers highlighted not only the susceptibility of the millions of so-called Internet of Things (IoT) devices, but just as importantly, the vulnerability of the entire Internet through the compromise of single point of failure network nodes. ","h1": "The Dyn DDoS Attack: Exposure continues to grow","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2387cfc622c8c8458051b43b359c907a","url": "why-customers-are-starting-to-care-about-supply-chains","title": "Why customers are starting to care about supply chains.","published": "2016-11-04T12:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Consumer Products", "Supply Chain", "Shopping", "Online Shopping"],"authors": ["Faraz Shafiq"],"images": ["https://images2.newscred.com/Zz02ZGZmNTNhOGJiMzZjYWZlYjE2MjU1ZDBmMjA5ZjZmMQ=="],"category": ["report_category:internet_of_things"],"industry": [""],"summary": "Supply chains play an important role in making a sale. Many consumers want to know where products come from and how they were made—who stitched those sneakers, how was that cattle treated? Technology makes it easier to give them the answers and help improve your visibility and quality too. ","h1": "Why customers are starting to care about supply chain transparency","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "a5b8c36f2b1bc424108255aa3e64081b","url": "the-next-cybersecurity-nightmare-could-be-from-industrial-systems","title": "The next cybersecurity nightmare could be from industrial systems","published": "2016-11-02T17:35:24Z","source": "Forbes","pop": 2,"age": 167,"rank": 96, "topics": ["Cyber Security", "Cybercrime", "Massive Attack", "Security"],"authors": ["Lee Mathews"],"images": ["https://images2.newscred.com/Zz1mMDM3OTc3Y2UxZWY0N2U1NGY2MGUwZDYyZmY2NDMxOQ=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:energy_utilities"],"summary": "<p thirtyword=\"firstpart\" > Earlier this month, a massive DDoS attack crippled Internet access for millions of Americans. Now, security experts are warning that it could be a sign of things to come.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "fd53b81678a9dfd82aeca3509ed40caa","url": "five-ways-to-get-your-mobile-moving","title": "Five ways to get your mobile moving","published": "2016-11-02T17:29:02Z","source": "Raconteur","pop": 999997,"age": 0,"rank": 888887, "topics": ["Marketing", "Online Advertising", "Evergreen Content", "Advertising"],"authors": ["Raconteur"],"images": ["https://images3.newscred.com/Zz1lNGI2ZmMxNWUzZWE4YzQ3YTEzYzkzNzFhNTY0M2E5Ng=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">&ldquo;The appeal of mobile is obvious,&rdquo; says Richard Nunn, chief revenue officer at RhythmOne, an online advertising company that connects digital audiences with brands through premium content across devices. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "ef60cee233e81b6ec266ce70bcd31a0f","url": "top-10-tech-predictions-for-2017-from-idc","title": "Top 10 tech predictions for 2017 from IDC","published": "2016-11-02T17:04:38Z","source": "Forbes","pop": 1,"age": 166,"rank": 102, "topics": ["Ecosystem", "Global Issues", "Global Economy", "Innovation"],"authors": ["Gil Press"],"images": ["https://images2.newscred.com/Zz1jNTc1OGZmYzc3MjdmZGQ4MTI0OGVhOTdiNDUxN2FhNQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:technology_professional_services"],"summary": "<p thirtyword=\"secondpart\">IDC released today its 10 IT industry predictions for 2017 in a webcast with Frank Gens, IDC&rsquo;s senior vice president and chief analyst. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "f63920966bb89d1df418c0c0957aaf1c","url": "unencrypted-pagers-a-security-risk-for-hospitals-power-plants","title": "Unencrypted pagers a security risk for hospitals, power plants","published": "2016-11-02T16:38:08Z","source": "CSO Magazine","pop": 999997,"age": 0,"rank": 888887, "topics": ["Communications", "Cyber Security", "Cybercrime", "Security"],"authors": ["Maria Korolov"],"images": ["https://images4.newscred.com/Zz1lOTAwMjU4N2ZjYzgyM2ExMzQ2MzEyNzcxYjMwYjExZg=="],"category": ["report_category:security_and_risk_management"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"firstpart\" > For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent without encryption, attackers can listen in and even interfere with the communications.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_peace_of_mind"]},{"id": "2a3830b55d948d8b850f559ecf1b747f","url": "chatbots-gimmick-or-game-changer","title": "Chatbots: gimmick or game changer?","published": "2016-10-28T18:00:00Z","source": "Verizon Enterprise Solutions","pop": 1,"age": 155,"rank": 101, "topics": ["Language & Linguistics", "Google Inc.", "White House", "Google Plus", "SIRI", "United States", "The Americas"],"authors": ["Gordon Littley"],"images": ["https://images4.newscred.com/Zz00OGEwZjYwOWJlMTI3NDkwYmJhNmY3MjFlNDYwYmNlMw=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Chatbots are the “next big thing” in customer service and sales. They’re going to reduce wait times, cut costs and increase revenue. But how many of us have actually had a great experience with a bot? The way to improve customer acquisition is to improve the customer experience. Will chatbots help you do that? ","h1": "Customer service chatbots: gimmick or game changer?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "afcbd29c5360fddeb14ac5a8ff4e420c","url": "ibm-apple-bring-watson-into-the-ios-enterprise","title": "IBM, Apple, bring Watson into the iOS enterprise","published": "2016-10-27T00:06:28Z","source": "Computerworld","pop": 999997,"age": 0,"rank": 888887, "topics": ["Apps", "App Economy", "Thought & Cognition", "Apple", "Enterprise IT", "IBM", "Apple iPhone", "Mobile Phone"],"authors": ["Jonny Evans"],"images": ["https://images3.newscred.com/Zz02MjYzMTA5YmJkZDdiZGUyYzQxZjg2NjlkOWNlZGUyNg=="],"category": ["report_category:technology_innovation"],"industry": ["industry:technology_professional_services"],"summary": "<p thirtyword=\"firstpart\" > The transformative potential of the iOS enterprise took a huge step forward this week, with IBM giving iPhone users in-app access to the powerful cognitive capabilities of IBM Watson, using MobileFirst for iOS apps.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "1892bbd22d8a633367d6a9543a31ae56","url": "cross-channel-analytics-why-you-must-integrate-online-and-off-and-how","title": "Cross-channel analytics: Why you must integrate online and off (and how)","published": "2016-10-26T23:26:46Z","source": "VentureBeat","pop": 999997,"age": 0,"rank": 888887, "topics": ["Online Sales", "Marketing", "Business-to-business (B2B)", "Digital Marketing"],"authors": ["VB Staff"],"images": ["https://images3.newscred.com/Zz0zZjYyYWRmZGI2Mzk0NTkzYmY1MDE1YjhmNmM2MjZkNg=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">&ldquo;Everything you used to do to be successful as a company isn&rsquo;t good enough anymore,&rdquo; says Michael Healey, CEO of Yeoman Technologies. &ldquo;Because inevitably what people do is they overanalyze the digital. &ldquo;Great. That does not tell me the story. Ecommerce is not a &ldquo;thing,&rdquo; he adds. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "e499c8cfbde20a8c761c76a09b5a823c","url": "resonant-releases-rf-innovation-and-the-transition-to-5g-wirelesstechnology-whitepaper","title": "Resonant releases 'RF Innovation and the Transition to 5G WirelessTechnology' whitepaper","published": "2016-10-26T23:15:06Z","source": "Manufacturing Close - Up","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mobile Technology", "Antenna", "Mobile Devices", "Wireless Networks", "Frequency", "Innovation"],"authors": [],"images": ["https://images4.newscred.com/Zz1hNzY4NDZjMTc1NmI0Yzg2Njk1NDkxMTFmZmI4NTk2Yg=="],"category": ["report_category:business_performance"],"industry": ["industry:manufacturing_automotive"],"summary": "<p thirtyword=\"firstpart\" > Resonant reported the public availability of its latest whitepaper titled, \"RF Innovation and the Transition to 5G Wireless Technology,\" which provides insight on the RF needs of 5G devices.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "ff82e99e777db48e3f8c322530533f4c","url": "3-reasons-why-the-clinical-trial-recruitment-model-is-broken","title": "3 reasons why the clinical trial recruitment model is broken","published": "2016-10-26T23:09:35Z","source": "HIT Consultant","pop": 999997,"age": 0,"rank": 888887, "topics": ["Medical Research", "Clinical", "Clinical trial", "Drug Research", "Pharmaceuticals"],"authors": ["Erica Garvin"],"images": ["https://images3.newscred.com/Zz0zNTBjNGFlYzA1NDE3NTc0ZTg1YTcwZDUwYWViYjQ4Ng=="],"category": ["report_category:business_performance"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">Today&rsquo;s clinical trial recruitment model efforts are missing the mark. Here&rsquo;s how pharma can fix it, ePatientFinder&rsquo;s Tom Dorsett explains.\r\nDrug development is risky business. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "391786a220fb65196c916b1e87d0bf32","url": "holiday-shopping-is-almost-upon-us-here-s-how-retailers-will-keep-up","title": "Holiday shopping is almost upon us: Here's how retailers will keep up","published": "2016-10-20T15:41:27Z","source": "Fashionista","pop": 999997,"age": 0,"rank": 888887, "topics": ["Shopping", "Halloween", "Holidays"],"authors": ["Maria Bobila"],"images": ["https://images1.newscred.com/Zz03NjRmMWI1MTcwYTVkZmNkZDkwMmQ2Zjg0MDVjZDllMA=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">The biggest season for retail is expected to outperform last year's.\r\nEven if you're still in the throes of planning your \"Stranger Things\" Halloween costume, the inevitable holiday shopping season is just around the corner. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "b9beb3fa481a542553a558e7f991e1de","url": "software-defined-networking-not-just-for-datacenters-anymore","title": "Software-defined networking: Not just for datacenters anymore","published": "2016-10-20T15:36:19Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Software", "Virtualization", "Agility", "Computer Software"],"authors": ["Moor Insights", "Strategy"],"images": ["https://images4.newscred.com/Zz00NzEyMGE4ZmNiMjE2YzM2OWJkMTEzNjU3Njc0MmMxNw=="],"category": ["report_category:business_performance"],"industry": ["industry:technology_professional_services"],"summary": "<p thirtyword=\"secondpart\">Software-Defined Networking (SDN) and Network Function Virtualization have promised to revolutionize the datacenter. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "efb666f2db5f1255e608e5fbfaf71f23","url": "gartner-s-top-10-predictions-for-it-organizations-in-2017-and-beyond","title": "Gartner's top 10 predictions for IT organizations in 2017 and beyond","published": "2016-10-19T20:18:44Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Gartner", "Google Plus", "Shopping", "Online Shopping"],"authors": ["Louis Columbus"],"images": ["https://images4.newscred.com/Zz0xYjE4ZGFiODYwYzQ1NDM2NDhhNjFhYjExMjAxZjNlNw=="],"category": ["report_category:technology_innovation"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">Gartner predicts $2.5M per minute in IoT spending and 1M new IoT devices sold every hour by 2021.\r\nBy 2022, a blockchain-based business will be worth $10B.\r\nBy 2020, new businesses and business models will emerge based on smart contracts and blockchain efficiencies.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "7e753aaa8a20d73ab5b8eeae9cc85fb7","url": "the-top-performing-energy-companies-through-q3-2016","title": "The top performing energy companies through Q3 2016","published": "2016-10-19T20:06:28Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Turkey", "Russia", "Vladimir Putin", "Istanbul", "Oil"],"authors": ["Robert Rapier"],"images": ["https://images3.newscred.com/Zz1mMzVlNjEyYmFlMDYzYzA0MTBlNjIyMTc3YWYyMzBkYQ=="],"category": ["report_category:business_performance"],"industry": ["industry:energy_utilities"],"summary": "<p thirtyword=\"secondpart\">[Picture] &nbsp;Vladimir Putin, Russia&rsquo;s president, speaks during the 23rd World Energy Congress in Istanbul, Turkey, on Monday, Oct. 10, 2016. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "17b009e0009baac26a5a932d03726e7f","url": "unpacking-the-hype-four-takeaways-from-the-2016-sf-musictech-summit","title": "Unpacking the hype: Four takeaways from the 2016 SF MusicTech Summit","published": "2016-10-19T19:55:03Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Technology Jobs", "Automotive", "Music Industry", "Ford Motor Company", "Spotify", "Streaming Music", "Birthdays", "Birthday", "Startups", "Entertainment Industry"],"authors": ["Cherie Hu"],"images": ["https://images2.newscred.com/Zz0yNGMyNDMzNGQzYTk3ZmEwZjVkZTk2YmFkYzgzZTcwNQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:media_entertainment"],"summary": "<p thirtyword=\"secondpart\">On Monday, the&nbsp;SF MusicTech Summit&nbsp;became a legal adult, celebrating its 18th birthday with hundreds of musicians, startups, labels and publishers in attendance. 18 years is a long time to be navigating disruption, and the music industry has yet to budge from the edge of its seat.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "9c495c5732d499704f25b8fa35319464","url": "destination-digital—it-s-all-ball-bearings-nowadays","title": "Destination digital—it’s all ball bearings nowadays.","published": "2016-10-19T17:30:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Chevy Chase", "Actor"],"authors": ["Tamara McCleary"],"images": ["https://images4.newscred.com/Zz0yNDBiNDM3NTU2MTBiYjExZDM3ZDE3NzZjNzI1ODQ4Zg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "One of my favorite movies from 1985 is the American comedy action-thriller, Fletch, where actor Chevy Chase plays the protagonist, a private detective. The iconic line from the movie happens when Fletch finds himself in a bind while playing the undercover role of an airplane mechanic, and is questioned about the problem with the airplane’s engine. ","h1": "Destination digital: The CIO and CMO relationship","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "fa0e0ef653172e09b0e1847afe35e5d1","url": "stay-ahead-of-customer-expectations","title": "Stay ahead of customer expectations.","published": "2016-10-17T11:45:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["McKinsey & Company", "Rush (2008 TV series)", "Entrepreneurship", "Startups", "Innovation"],"authors": ["Chris Formant"],"images": ["https://images3.newscred.com/Zz02MjVhNWRmNzJlYjAxMDQ1Njg2YmE3ZmI5NWM1MTdlMg=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "Just follow what your competitors are doing and you risk being blind-sided by disruption that they didn’t see coming either. Innovations from outside your industry are driving expectations in yours. To stay ahead, you need to understand which of your customers’ needs aren’t being met—and fulfill them. ","h1": "Stay ahead of customer expectations","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "8f85aa3afa94fb765dfa234e0553d32c","url": "our-top-tips-for-tackling-cybercrime","title": "Our top tips for tackling cybercrime.","published": "2016-10-17T11:19:26Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 178,"rank": 136, "topics": ["Cyber Security", "Cybercrime", "Security", "Rabbit"],"authors": [],"images": ["https://images1.newscred.com/Zz03MWFlNTRkYTRkMTVkZmRiMTI5YWFhZmRjZGMxMjQ0NA=="],"category": ["report_category:security_and_risk_management"],"industry": [""],"summary": "During cybersecurity month, we’re releasing cybercrime profiles of 18 of the most common or lethal security threats you face. See them here. ","h1": "Stay secure with our top cybercrime tips","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "83f5f274c96ddf3151ec97518b03bd8f","url": "doubling-down-on-digital-transformation-big-data-strategy-and-the-iot","title": "Doubling down on digital transformation: Big Data, strategy and the IoT.","published": "2016-10-14T16:09:25Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Pets", "Big Data", "Weird", "Business Intelligence"],"authors": ["Tamara McCleary"],"images": ["https://images1.newscred.com/Zz02NDVlZDM1Mjk3OTcwOGI1NDRiZDEzODE0MzA3NzIzOA=="],"category": ["report_category:business_performance"],"industry": ["industry:agriculture"],"summary": "More popular than a Kardashian (maybe) is the industry buzz at every tech conference you and I have attended the past few years discussing Big Data, the IoT, and what it means to our future and our business bottom line. Already drowning in loads of data stored in warehouses, it’s the dark and unstructured data causing involuntary salivation as we are irresistibly drawn in by its potential, but not entirely sure how to eat this strange and wonderful fruit. ","h1": "Digital & IoT Transformation | Verizon Enterprise Solutions","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "fee6cba0786e79d3134e85e7414224ea","url": "the-answer-isn-t-just-more-network-it-s-better-network","title": "The answer isn’t just more network; it’s better network.","published": "2016-10-13T17:00:00Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 154,"rank": 128, "topics": ["Education"],"authors": ["Tony Recine"],"images": [],"category": ["report_category:technology_innovation"],"industry": [""],"summary": "We all know that digital transformation and increased use of cloud and video are increasing the demands on the network. If network performance falls or there’s an outage, the implications could be massive. But the answer isn’t just more network—it’s smarter network. ","h1": "The answer isn’t just more network; it’s better network","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f4c57369f032b9511cc0f6244a97ed0b","url": "disney-s-iger-sees-mobile-video-future-with-or-without-twitter","title": "Disney’s Iger sees mobile video future, with or without Twitter","published": "2016-10-13T03:54:13Z","source": "Bloomberg","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mobile Technology", "Business Executive", "New England Patriots", "Netflix", "Robert Kraft", "Twitter Inc", "Walt Disney", "Boston College", "Online Video", "Massachusetts", "Education"],"authors": ["Brendan Coffey", "Christopher Palmeri"],"images": ["https://images2.newscred.com/Zz01OWM4NWQ5NjAxMWZiZTNlYTljNWQwZjQwNTRiMjcwNQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:media_entertainment"],"summary": "<p thirtyword=\"firstpart\" > (Bloomberg) -- Walt Disney Co. Chief Executive Officer Bob Iger said the company&rsquo;s future lies in using technology to make more direct connections to consumers, although he declined to say whether he was interested in buying Twitter Inc. or Netflix Inc.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "52ae9334751df5911750b56ed4d10aa7","url": "research-and-markets-adds-report-mobile-payments-in-the-u-s-5thed-pos-will-increase-54pc-in-2016","title": "Research and Markets Adds Report: Mobile payments in the U.S. (5thEd.): POS will increase 54% in 2016","published": "2016-10-13T03:44:13Z","source": "Entertainment Close - Up","pop": 999997,"age": 0,"rank": 888887, "topics": ["Payments Industry", "Mobile Payments", "Mobile Commerce", "Education"],"authors": [],"images": ["https://images3.newscred.com/Zz05OGZlOWI1MDFjZDAwZGZmYWNmNTA2MWExNWVhZjMwNg=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">Research and Markets announced the addition of the \"Mobile Payments in the U.S., 5th Edition\" report to its offerings.\r\nThe report forecasts mobile payments made at the retailer point of sale will increase 54 percent in 2016 over 2015 with continued robust growth through 2019. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "3edb5707d9b7f453f4168a6d30b03a89","url": "construction-companies-partner-with-nasa-on-centennial-challenge","title": "Construction companies partner with NASA on Centennial Challenge","published": "2016-10-13T03:36:15Z","source": "Manufacturing Close - Up","pop": 999997,"age": 0,"rank": 888887, "topics": ["Excavation", "Mars", "NASA", "Space Exploration", "United States", "The Americas", "Bradley University", "Education"],"authors": [],"images": ["https://images4.newscred.com/Zz03MTRiMDdhZWRkNDkwY2VmZTc3OTBjODkyNDcxMWM4Yg=="],"category": ["report_category:technology_innovation"],"industry": ["industry:construction"],"summary": "<p thirtyword=\"secondpart\">Caterpillar said that it is working with Bechtel, Brick and Mortar Ventures and Bradley University to sponsor NASA's latest Centennial Challenge-the 3D-Printed Habitat Challenge.\r\n\"As technology evolves, so do our machines. The competition is designed in three phases. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "34b30f5e7c8e7e79c1b5adfc54f7f1fc","url": "a-no-is-a-half-yes-this-startup-s-secret-to-getting-into-a-top-accelerator","title": "\"A no is a half yes\": This startup's secret to getting into a top accelerator","published": "2016-10-13T03:31:15Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mergers and Acquisitions", "Astronomy", "Robotics & Artificial Intelligence", "Healthcare & Pharmaceutical Industry", "Health Insurance Industry", "Startups", "Nanotechnology"],"authors": ["Katheryn Thayer"],"images": ["https://images3.newscred.com/Zz05OTg3MTY1OGVjOTJlZmNlZTY2NjUwMTIzNTkxMjNjNg=="],"category": ["report_category:internet_of_things"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">From left to right, Nanotech Galaxy CEO Alexandros Louizos, COO Jasjit Maggu and CTO Jacob Lindeman.\r\nTechstars is among&nbsp;the most prestigious&nbsp;accelerators in the world. It&rsquo;s helped grow over 700 startups, 90% of which are still active or have been acquired. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "6af31730cd691197c282b367f0b34c4e","url": "agility-doesn-t-come-easy-for-enterprises","title": "Agility doesn’t come easy for enterprises.","published": "2016-10-12T16:36:25Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Agility", "Rewards Program", "Startups"],"authors": ["Chris Formant"],"images": ["https://images1.newscred.com/Zz02MGI1MzdkNDA1ZGUzNzVkOTI2MjA1OGI1MGEzZWNiOA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Technology means that enterprises can be just as agile as a start-up. What’s holding enterprise agility back is culture. Software-defined everything can help. It can make it easier and faster to allocate and reallocate resources, launch new applications and use third-party services. ","h1": "Enterprise agility doesn't come easy","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "32b1298a76240d3339aaf82dfbe2e264","url": "why-an-ecosystem-matters-for-your-digital-transformation","title": "Why an ecosystem matters for your digital transformation.","published": "2016-10-12T16:35:21Z","source": "Verizon Enterprise Solutions","pop": 0,"age": 126,"rank": 124, "topics": ["Automobiles", "Ecosystem", "Henry Ford", "Coal"],"authors": ["Janet Schijns"],"images": ["https://images4.newscred.com/Zz0yNDAyZjBhMjg3NDQyNzY2MzE5ZmY3MzQzMzQ4OGNhYg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Businesses cannot function at their best if their ecosystem is out of balance - this is a common-sense business equation in our technology-powered world, and has been for many decades. In the digital world, as organizations seek new methods for sustainable growth, their ecosystems continue to play a crucial role. ","h1": "Why a Business Ecosystem Matters for your Digital Transformation","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "b3144aa5fb2c9861963015cfd415f0ff","url": "amazon-to-dominate-digital-but-shoppers-still-set-for-a-phygital-holiday-selling-season","title": "Amazon to dominate digital, but shoppers still set for a 'phygital' holiday selling season","published": "2016-10-05T19:46:50Z","source": "Forbes","pop": 0,"age": 170,"rank": 134, "topics": ["Olivia Newton-John", "Board of Directors", "Shopping"],"authors": ["Barbara Thau"],"images": ["https://images3.newscred.com/Zz02N2ZkZjRjZTIwODY0ZWJjYWFjYzdjYjdlMDU4YmNiNg=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">&ldquo;The trend to watch is the way that online, mobile, and store channels influence each other,&rdquo; said Rod Sides, vice chairman, Deloitte LLP, and retail and distribution sector leader, in a statement. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "f26a3f3179904d625e04eb7e921cad9a","url": "tech-enables-transformation-but-culture-makes-or-breaks-it","title": "Tech enables transformation, but culture makes or breaks it.","published": "2016-10-05T12:00:01Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Social Commerce", "Topshop", "Shopping", "Pinterest", "Clothing", "Fashion", "London"],"authors": ["Farhana Chaudhry"],"images": ["https://images4.newscred.com/Zz05MmNkYjhmNGNhZDY4ZDE3NDZiNzhmMTJiZmRkNTkyMw=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Why do digital transformations fail? Technology is a big part of it—legacy systems, inadequate network resources, creaking software stacks. But having the right tech only gets you so far—you also need a culture that engages your employees and promotes constant innovation. ","h1": "Tech enables transformation, but work culture makes or breaks it","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "f34189ae75386df50a8c88ea1c98c8d3","url": "are-you-digitally-brave","title": "Are You Digitally Brave?","published": "2016-10-04T17:30:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Mel Gibson", "Innovation"],"authors": ["Tamara McCleary"],"images": ["https://images3.newscred.com/Zz1kYmUzNmZjMDQyYTQ2NzhmMWZhNDYxNWQ5OWM0OTQ5YQ=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "The word “brave” for me conjures up a multitude of images from parents with toddlers to Mel Gibson convincing a legion to follow him into battle. But in business what “brave” means to me is a company willing to cannibalize outdated business models to create relevance and success for an organization’s future. ","h1": "The Necessity of Self-Disruption","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "b19ea2a70e7fe4918cc833d3657adb1c","url": "your-cx-says-more-about-your-brand-than-your-logo-does","title": "Your CX says more about your brand than your logo does.","published": "2016-09-30T14:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Agility", "Board of Directors", "Careers"],"authors": ["Tony Recine"],"images": ["https://images2.newscred.com/Zz0wMWIyNzNkNTZkOGI0MWRmYWE2NGIxOTdiMDUwZjFlZA=="],"category": ["report_category:customer_experience"],"industry": [""],"summary": "It’s not uncommon for companies today to invest heavily in their brand image. But even if you have a flashy new logo, if your service isn’t up to scratch it’s likely that you’ll fail. Today, customer experience matters more and more. How are you meeting new expectations? ","h1": "More than just a logo: the importance of customer experience strategy","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "8d0ad5674b309b88d43bbfbda7e5b81a","url": "shopping-the-friendly-airports-3-ways-technology-can-boost-a-32b-industry","title": "Shopping the friendly airports: 3 ways technology can boost a $32B industry","published": "2016-09-28T22:14:18Z","source": "Forbes","pop": 999997,"age": 0,"rank": 888887, "topics": ["Airport", "Market Trends", "Shopping"],"authors": ["Bryan Pearson"],"images": ["https://images3.newscred.com/Zz04MTNiOWEwOTc2ZTY4OGY4MDllMmIxMWQwNjgwZDdhZQ=="],"category": ["report_category:customer_experience"],"industry": ["industry:travel_hospitality"],"summary": "<p thirtyword=\"secondpart\">Think of the last time you walked through an airport. What images come to mind &ndash; gate numbers or &ldquo;on sale&rdquo; signs?\r\nOdds are a shop of some kind popped into your head. </p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "43f896a872cfb4b620cfb81a46fb0d28","url": "3-industries-that-will-be-transformed-by-ai-machine-learning-and-big-data-in-the-next-decade","title": "3 industries that will be transformed by AI, machine learning and big data in the next decade","published": "2016-09-28T22:07:59Z","source": "Forbes","pop": 0,"age": 148,"rank": 125, "topics": ["Machine Learning", "Robotics & Artificial Intelligence", "Health Insurance Industry", "Startups", "Computing", "Business Intelligence"],"authors": ["Bernard Marr"],"images": ["https://images4.newscred.com/Zz1kYzY0ZGQwNzVjZjc2NTA3ZmNkZTUwMThlNjA1ZmJlYg=="],"category": ["report_category:internet_of_things"],"industry": ["industry:healthcare"],"summary": "<p thirtyword=\"secondpart\">Historically, when new technologies become easier to use, they transform industries.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "eb5fe5a02263dedd9e55b609257a74ae","url": "technavio-adds-new-report-on-the-global-energy-management-systems-market","title": "Technavio adds new report on the global energy management systems market","published": "2016-09-28T22:00:16Z","source": "Manufacturing Close - Up","pop": 999997,"age": 0,"rank": 888887, "topics": ["Smart Grids", "Education"],"authors": [],"images": ["https://images2.newscred.com/Zz1jOGNjNmRiZGE3YzBlZjUwMWJjZTRjODRhYzMwNDNmMQ=="],"category": ["report_category:business_performance"],"industry": ["industry:energy_utilities"],"summary": "<p thirtyword=\"firstpart\" > The global energy management systems market is expected grow at a CAGR of more than 16 percent during the period 2016-2020, according to Technavio's latest report.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "f000d85fd499802823ee089d0f6a0d3b","url": "how-corporate-strategic-investors-look-at-ar-vr-deals","title": "How corporate strategic investors look at AR/VR deals","published": "2016-09-28T21:55:05Z","source": "VentureBeat","pop": 999997,"age": 0,"rank": 888887, "topics": ["Verizon Communications Inc.", "Investors", "Virtual Reality", "QUALCOMM Incorporated", "Investing", "Startups"],"authors": ["Dean Takahashi"],"images": ["https://images2.newscred.com/Zz03MDkyYzZlNjcwMDEyZGE1Y2Y0OWUwZDc3OGZhOWM3MQ=="],"category": ["report_category:technology_innovation"],"industry": ["industry:media_entertainment"],"summary": "<p thirtyword=\"firstpart\" > Corporate investors have been fueling a lot of the fundings for augmented reality and virtual reality startups. Like venture capitalists, they&rsquo;re excited about the opportunities that AR and VR offer. But their aims are often different.</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "bf5ed8761711c39729482fe05ffb742d","url": "contemporary-information-officer-how-modern-day-cios-can-meet-the-challenges-of-digital-disruption","title": "Contemporary Information Officer: How modern-day CIOs can meet the challenges of digital disruption.","published": "2016-09-28T12:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": [],"authors": ["Vic Bhagat"],"images": ["https://images4.newscred.com/Zz00ZDQ2OTBhZjkwNzRhZTA2NTMyNGRlNzg0YjlmOWUzYg=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "Many CIOs believe that their interdepartmental colleagues see them as an obstacle rather than an asset. But CIOs are better placed than anyone to tackle the challenges of digital disruption and turn them into competitive advantage. If they fail to do so, CIO could stand for “career is over.” ","h1": "As CIO, You Can Help Set the Digital Agenda","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_business_results"]},{"id": "1eca17452df2aa0d164c09e3f8560863","url": "organizational-hacking-–-will-it-help-you-arrive-at-destination-digital","title": "Organizational hacking – will it help you arrive at destination digital?","published": "2016-09-22T17:00:00Z","source": "Verizon Enterprise Solutions","pop": 999997,"age": 0,"rank": 888887, "topics": ["Music", "Regulation", "Google Glass", "Google Plus", "Mathematics", "Art+Design - Glass, Ceramics & Tile", "Calculator", "Wearable Tech", "Education"],"authors": ["Mike Zirkle"],"images": ["https://images2.newscred.com/Zz0wYzkzNzcyOGVmNGI3N2RmNzcwZmI2NTAxY2JkZGE2ZA=="],"category": ["report_category:business_performance"],"industry": [""],"summary": "The term “digital” has been used, and reused, over and over again.  Some say it’s lost its punch.  But actually it's more relevant than ever - how can you hack your way to destination digital? ","h1": "Organizational hacking – will it help you arrive at destination digital?","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]},{"id": "37283294a9527d2512766cf9f15c1e82","url": "are-people-actually-seeing-now-and-buying-now","title": "Are people actually seeing now and buying now?","published": "2016-09-21T21:54:34Z","source": "Fashionista","pop": 999997,"age": 0,"rank": 888887, "topics": ["Tommy Hilfiger", "Burberry Group", "Alexander Wang ", "Ralph Lauren", "New York Fashion Week", "Adidas", "Tom Ford", "Topshop", "Jackets", "Fashion & Style", "Michael Kors", "Thakoon", "Fashion", "Monaco", "London"],"authors": ["Dhani Mau"],"images": ["https://images3.newscred.com/Zz00ZDM5ZmE2ZTBhOTU5YmRkNDc2OGJjYmRmY2Q4YzdjNg=="],"category": ["report_category:customer_experience"],"industry": ["industry:retail"],"summary": "<p thirtyword=\"secondpart\">From Tommy to Tom Ford, a look at how the shift to shoppable runway shows is working.\r\n</p> ","h1": "","type": "type:analyst:articles","outcome": ["achieve_business_outcomes:better_experiences"]}],"assets": [{"id": 11289,"url": "/resources/reports/rp_pci-retail-report-2014_en_xg.pdf","page": "","title": "PCI Report - Retail Industry Focus","h1": "PCI Report - Retail Industry Focus","summary": "","published": "2014-03-19T14:48:26Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:retail]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11304,"url": "/resources/reports/rp-2014-pci-compliance-report-finance-industry-focus_en_xg.pdf","page": "","title": "Verizon 2014 PCI Compliance Report - Finance Industry Focus","h1": "Verizon 2014 PCI Compliance Report - Finance Industry Focus","summary": "","published": "2014-04-04T10:22:27Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:financial]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11325,"url": "/resources/reports/rp-2014-pci-compliance-report-hospitality-industry-focus_en_xg.pdf","page": "","title": "Verizon 2014 PCI Compliance Report - Hospitality Industry Focus","h1": "Verizon 2014 PCI Compliance Report - Hospitality Industry Focus","summary": "","published": "2014-04-29T11:42:20Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:hospitality]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11595,"url": "/resources/reports/rp_reinventing-the-bank-for-the-mobile-world-trend-report_en-xg.pdf","page": "","title": "Reinventing the Bank for the Mobile World Trend Report","h1": "Reinventing the Bank for the Mobile World Trend Report","summary": "","published": "2015-01-23T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "internet-of-things","industry": "[industry:financial]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11615,"url": "/resources/reports/rp_the-internet-of-things-IoT-is-poised-to-radically-change-insurance-companies_en-xg.pdf","page": "","title": "The Internet of Things (IoT) is poised to radically change insurance companies","h1": "The Internet of Things (IoT) is poised to radically change insurance companies","summary": "","published": "2015-02-09T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "internet-of-things","industry": "[industry:insurance]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11621,"url": "/resources/reports/rp_pci-report-2015-executive-summary_en_xg.pdf","page": "/verizon-insights-lab/pci-report/2015/","title": "Verizon 2015 PCI Compliance Report Executive Summary","h1": "Verizon 2015 PCI Compliance Report Executive Summary","summary": "Read the summary for report highlights and key findings.","published": "2015-02-11T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 14.2857,"age": 14,"rank": 22},{"id": 11650,"url": "/resources/reports/rp_strategies-for-the-connected-workplace_en_xg.pdf","page": "","title": "Strategies for the Connected Workplace","h1": "Strategies for the Connected Workplace","summary": "","published": "2015-03-02T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11676,"url": "/resources/reports/rp_verizon-2015-state-of-the-iot-report-insurance-industry-perspective_en_xg.pdf","page": "","title": "Verizon 2015 State of the IoT Report - Insurance Industry Perspective","h1": "Verizon 2015 State of the IoT Report - Insurance Industry Perspective","summary": "","published": "2015-03-09T14:43:32Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[industry:insurance]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11714,"url": "/resources/reports/rp_iot-and-the-humanization-of-healthcare-technology_en_xg.pdf","page": "","title": "IoT and the Humanization of Healthcare Technology","h1": "IoT and the Humanization of Healthcare Technology","summary": "","published": "2015-04-06T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[industry:healthcare]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11730,"url": "/resources/reports/rp_pci-public-sector-report-2015_en_xg.pdf","page": "/verizon-insights-lab/pci-report/2015/resources/","title": "Verizon 2015 PCI Compliance Report - Public Sector","h1": "Verizon 2015 PCI Compliance Report - Public Sector","summary": "","published": "2015-04-16T13:51:58Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[industry:statelocgov]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11731,"url": "/resources/reports/rp_pci-healthcare-report-2015_en_xg.pdf","page": "/verizon-insights-lab/pci-report/2015/resources/","title": "Verizon 2015 PCI Compliance Report - Healthcare","h1": "Verizon 2015 PCI Compliance Report - Healthcare","summary": "","published": "2015-04-16T13:54:24Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[industry:healthcare]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11732,"url": "/resources/reports/rp_pci-energy-utilities-report-2015_en_xg.pdf","page": "/verizon-insights-lab/pci-report/2015/resources/","title": "Verizon 2015 PCI Compliance Report - Energy and Utilities","h1": "Verizon 2015 PCI Compliance Report - Energy and Utilities","summary": "","published": "2015-04-16T13:56:31Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[industry:utility]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11816,"url": "/resources/reports/rp_the-cxos-guide-to-managing-expansion-while-controlling-costs-and-compliance-considerations_en_xg.pdf","page": "","title": "The CXO&#39;s Guide To Managing Expansion… While Controlling Costs & Compliance Considerations","h1": "The CXO&#39;s Guide To Managing Expansion… While Controlling Costs & Compliance Considerations","summary": "","published": "2015-07-13T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11818,"url": "/resources/reports/rp_5-ways-technology-can-accelerate-your-growth_en_xg.pdf","page": "","title": "5 Ways Technology Can Accelerate Your Growth","h1": "5 Ways Technology Can Accelerate Your Growth","summary": "","published": "2015-07-13T15:06:47Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11819,"url": "/resources/reports/rp_8-questions-c-level-executives-should-ask-to-determine-whether-their-technology-can-support-their-growth-strategy_en_xg.pdf","page": "","title": "8 Questions C‐Level Executives Should Ask To Determine Whether Their Technology Can Support Their Growth Strategy","h1": "8 Questions C‐Level Executives Should Ask To Determine Whether Their Technology Can Support Their Growth Strategy","summary": "","published": "2015-07-13T15:09:42Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 11916,"url": "/resources/reports/rp_hbr-customer-experience-in-the-digital-age_en_xg.pdf","page": "/verizon-insights-lab/hbr/2015/customer-experience/","title": "Customer experience in the digital age: The new competitive edge","h1": "Customer experience in the digital age: The new competitive edge","summary": "","published": "2015-10-07T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "customer-experience","industry": "[]","type": "reports","pop": 1.20482,"age": 83,"rank": 120},{"id": 11979,"url": "/resources/reports/rp_2015-protected-health-information-data-breach-report_en_xg.pdf","page": "","title": "2015 Protected Health Information Data Breach Report","h1": "2015 Protected Health Information Data Breach Report","summary": "","published": "2015-12-15T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12179,"url": "/resources/reports/rp_2015-north-american-utility-grid-intelligence-competitive-strategy-innovation-and-leadership-award_en_xg.pdf","page": "","title": "2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award","h1": "2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award","summary": "","published": "2016-01-28T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "internet-of-things","industry": "[industry:utility]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12187,"url": "/resources/reports/rp_verizon-hospitality-security-advisory_en_xg.pdf","page": "","title": "Security Advisory: threats to payment systems in the hospitality sector.","h1": "Security Advisory: threats to payment systems in the hospitality sector.","summary": "","published": "2016-02-02T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:hospitality]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12246,"url": "/resources/reports/rp_data-breach-digest_xg_en.pdf","page": "/verizon-insights-lab/data-breach-digest/2016/","title": "2016 Data Breach Digest Report ","h1": "2016 Data Breach Digest Report ","summary": "","published": "2016-02-26T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12298,"url": "/resources/infographic/ig_som-iot-infographic_en_xg.pdf","page": "/verizon-insights-lab/state-of-the-market-internet-of-things/2016/","title": "Reengineering the World","h1": "Reengineering the World","summary": "","published": "2016-03-30T08:51:16Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "infographic","pop": 999999,"age": 0,"rank": 9999},{"id": 12313,"url": "/resources/the_future_of_infrastructure_2016_en_xg.pdf","page": "/verizon-insights-lab/the-future-of-infrastructure/2016/","title": "The future of infrastructure","h1": "The future of infrastructure","summary": "","published": "2016-04-05T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "internet-of-things","industry": "[]","type": "reports","pop": 0.555556,"age": 180,"rank": 141},{"id": 12315,"url": "/resources/verizon_forrester_mobility_report_en_xg.pdf","page": "/verizon-insights-lab/forrester-cx/2016/","title": "Verizon Forrester Mobility Report 2016","h1": "Verizon Forrester Mobility Report 2016","summary": "","published": "2016-04-07T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "missing-category","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12330,"url": "/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf","page": "/verizon-insights-lab/dbir/2016/","title": "2016 Data Breach Investigations Report - Executive Summary","h1": "2016 Data Breach Investigations Report - Executive Summary","summary": "","published": "2016-04-24T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12331,"url": "/resources/reports/rp_2016-DBIR-Financial-Data-Security_en_xg.pdf","page": "","title": "2016 Data Breach Investigations Report - Financial services","h1": "2016 Data Breach Investigations Report - Financial services","summary": "","published": "2016-04-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:financial]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12332,"url": "/resources/reports/rp_2016-DBIR-Healthcare-Data-Security_en_xg.pdf","page": "","title": "2016 Data Breach Investigations Report - Healthcare","h1": "2016 Data Breach Investigations Report - Healthcare","summary": "","published": "2016-04-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:healthcare]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12333,"url": "/resources/reports/rp_Data-Breaches-by-Industry-Hospitality_en_xg.pdf","page": "","title": "2016 Data Breach Investigations Report - Hospitality","h1": "2016 Data Breach Investigations Report - Hospitality","summary": "","published": "2016-04-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:hospitality]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12334,"url": "/resources/reports/rp_2016-DBIR-Public-Sector-Security_en_xg.pdf","page": "","title": "2016 Data Breach Investigations Report - Public sector","h1": "2016 Data Breach Investigations Report - Public sector","summary": "","published": "2016-04-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12335,"url": "/resources/reports/rp_2016-DBIR-Retail-Data-Security_en_xg.pdf","page": "","title": "2016 Data Breach Investigations Report - Retail","h1": "2016 Data Breach Investigations Report - Retail","summary": "","published": "2016-04-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:retail]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12336,"url": "/resources/reports/rp_Data-Breaches-by-Industry-Technology_en_xg.pdf","page": "","title": "2016 Data Breach Investigations Report - Technology","h1": "2016 Data Breach Investigations Report - Technology","summary": "","published": "2016-04-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[industry:tech]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12364,"url": "/resources/hybrid_it_summary_part_1_of_4_executive_summary_en_xg.pdf","page": "","title": "Hybrid IT Summary Part 1 of 4 Executive Summary","h1": "Hybrid IT Summary Part 1 of 4 Executive Summary","summary": "","published": "2016-06-07T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12379,"url": "/resources/verizon_451_report_en_xg.pdf","page": "","title": "Verizon 451 Report","h1": "Verizon 451 Report","summary": "","published": "2016-07-01T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12391,"url": "/resources/reports/rp_digital-transformation-in-financial-services_xg_en.pdf","page": "","title": "Transform your network to build up credit with your customers.","h1": "Transform your network to build up credit with your customers.","summary": "A quarter of financial services firms say that execution of their digital initiatives occurs sporadically at best. How can you improve?","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12392,"url": "/resources/reports/rp_digital-transformation-in-media-and-entertainment_xg_en.pdf","page": "","title": "Is your digital infrastructure a showstopper?","h1": "Is your digital infrastructure a showstopper?","summary": "Digital transformation has already revolutionized the media and entertainment industry. Where should you invest to stay ahead of the digital curve?","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 0.555556,"age": 180,"rank": 141},{"id": 12393,"url": "/resources/reports/rp_digital-transformation-in-technology-and-professional-services_xg_en.pdf","page": "","title": "Is your digital strategy the next big thing?","h1": "Is your digital strategy the next big thing?","summary": " Over half of technology and professional services companies feel vulnerable to their competitors’ digital strategies. How can you gain the edge?","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12394,"url": "/resources/reports/rp_digital-transformation-in-manufacturing_xg_en.pdf","page": "","title": "Manufacturing the right digital strategy.","h1": "Manufacturing the right digital strategy.","summary": " ","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12395,"url": "/resources/reports/rp_digital-transformation-in-energy-and-utilities_xg_en.pdf","page": "","title": "Providing the power for your digital transformation.","h1": "Providing the power for your digital transformation.","summary": " ","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12396,"url": "/resources/reports/rp_digital-transformation-in-insurance_xg_en.pdf","page": "","title": "Transform your network to help prevent customer churn.","h1": "Transform your network to help prevent customer churn.","summary": " ","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12397,"url": "/resources/reports/rp_digital-transformation-in-retail_xg_en.pdf","page": "","title": "How aligned is your network to your digital strategy?","h1": "How aligned is your network to your digital strategy?","summary": " ","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12398,"url": "/resources/reports/rp_digital-transformation-in-transportation-and-distribution_xg_en.pdf","page": "","title": "How well are you delivering digital?","h1": "How well are you delivering digital?","summary": " ","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12399,"url": "/resources/reports/rp_digital-transformation-in-healthcare_xg_en.pdf","page": "","title": "Transform your network for a healthier digital prognosis.","h1": "Transform your network for a healthier digital prognosis.","summary": " ","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12400,"url": "/resources/reports/wp_digital-transformation-obstacles-and-how-to-overcome-them_xg_en.pdf","page": "","title": "Digital Transformation Obstacles and How to Overcome Them","h1": "Digital Transformation Obstacles and How to Overcome Them","summary": "","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "hardgate","category": "missing-category","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12401,"url": "/resources/infographics/ig_IDC-infographic_xg_en.pdf","page": "/verizon-insights-lab/idc-market-spotlight/2016/","title": "Why do digital transformations fail?","h1": "Why do digital transformations fail?","summary": "A quarter of financial services firms say that execution of their digital initiatives occurs sporadically at best. How can you improve?","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "business-performance","industry": "[]","type": "infographic","pop": 16.6667,"age": 12,"rank": 16},{"id": 12402,"url": "/resources/reports/wp_infobrief_overcome-the-obstacles-to-digital-transformation_xg_en.pdf","page": "","title": "Overcome the obstacles to digital transformation","h1": "Overcome the obstacles to digital transformation","summary": "","published": "2016-07-14T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "notreqd","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12426,"url": "/resources/finance_value_proposition_for_security_en_xg.pdf","page": "","title": "Finance value proposition for security","h1": "Finance value proposition for security","summary": "","published": "2016-08-29T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "notreqd","category": "security-risk-management","industry": "[industry:financial]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12427,"url": "/resources/finance_value_proposition_with_digital_enablement_en_xg.pdf","page": "","title": "Finance value proposition for digital enablement","h1": "Finance value proposition for digital enablement","summary": "","published": "2016-08-29T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "notreqd","category": "internet-of-things","industry": "[industry:financial]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12428,"url": "/resources/finance_value_proposition_for_en_xg.pdf","page": "","title": "Finance value proposition for Mobility","h1": "Finance value proposition for Mobility","summary": "","published": "2016-08-29T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "notreqd","category": "customer-experience","industry": "[industry:financial]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12442,"url": "/resources/whitepapers/wp_data-breach-digest-update-cms-security_xg_en.pdf","page": "/verizon-insights-lab/data-breach-digest/2016/","title": "Data Breach Digest Update - CMS security: Keeping the pirates at bay","h1": "Data Breach Digest Update - CMS security: Keeping the pirates at bay","summary": "One of the cybercrime case studies in the Data Breach Digest involved pirates hacking into a global shipping company’s content management system to access data that aided their plunder. Learn how to protect yourself.","published": "2016-09-09T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "","pop": 999999,"age": 0,"rank": 9999},{"id": 12458,"url": "/resources/whitepapers/wp_data-breach-digest-update-hacktivist-attack_xg_en.pdf","page": "/verizon-insights-lab/data-breach-digest/2016/","title": "Data Breach Digest Update - Hacktivist attack: Shedding light on the matter","h1": "Data Breach Digest Update - Hacktivist attack: Shedding light on the matter","summary": "Data Breach Digest scenario #8 focused on a critical infrastructure breach by a hacktivist. But it’s not just high-profile organizations that are at risk. Get our top tips for mitigating and responding to hacktivist attacks.","published": "2016-10-05T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "","pop": 999999,"age": 0,"rank": 9999},{"id": 12459,"url": "/resources/giving_up_control_article_en_xg.pdf","page": "","title": "Giving up control article","h1": "Giving up control article","summary": "","published": "2016-10-06T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "customer-experience","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12505,"url": "/resources/reports/rp_hbr-verizon-hybrid-it-takes-center-stage-2016_en_xg.pdf","page": "/verizon-insights-lab/hybrid-it-solutions/","title": "Hybrid IT takes center stage","h1": "Hybrid IT takes center stage","summary": "","published": "2016-10-26T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12510,"url": "/resources/whitepapers/wp_data-breach-digest-update-data-ransomware_xg_en.pdf","page": "/verizon-insights-lab/data-breach-digest/2016/","title": "Data Breach Digest Update - Data ransomware: User and file space error","h1": "Data Breach Digest Update - Data ransomware: User and file space error","summary": "Scenario #15 of the cybercrime case studies detailed how employees at one small company had access to their files held to ransom. Discover how you can avoid finding yourself in a Catch 22 situation.","published": "2016-10-28T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 12564,"url": "/resources/reports/rp_hbr-the-enterprise-lacks-a-big-data-strategy-for-iot-transformation_xg_en.pdf","page": "/verizon-insights-lab/hbr/2017/big-data/","title": "Harvard Business Review - Big Data","h1": "Harvard Business Review - Big Data","summary": "Can you handle the volume, variety and velocity of IoT data?","published": "2017-01-23T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "internet-of-things","industry": "[]","type": "reports","pop": 1.36986,"age": 146,"rank": 116},{"id": 12569,"url": "/resources/reports/rp_data-breach-digest-2017-sneak-peek_xg_en.pdf","page": "","title": "Data Breach Digest IoT Calamity: the Panda Monium","h1": "Data Breach Digest IoT Calamity: the Panda Monium","summary": "Read about one of the 2017 Data Breach Digest characters, Panda Monium. This scenario looks at what happened when one university was attacked by an Internet of Things (IoT) botnet barrage of 5,000 hosts.","published": "2017-02-02T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 1.27389,"age": 157,"rank": 118},{"id": 12579,"url": "/resources/reports/rp_data-breach-digest-2017-perspective-is-reality_xg_en.pdf","page": "/verizon-insights-lab/data-breach-digest/2017/","title": "Data Breach Digest: Perspective is reality","h1": "Data Breach Digest: Perspective is reality","summary": "Our 16 new cybercrime case studies provide insight into the biggest threats you face—plus tips on how to prevent them.","published": "2017-02-08T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 3.01205,"age": 166,"rank": 86},{"id": 135266,"url": "/verizon-insights-lab/forrester-cx/2015/","page": "","title": "Turn your customer experience into competitive advantage.","h1": "Turn your customer experience into competitive advantage.","summary": "","published": "2015-07-29T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "customer-experience","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 135332,"url": "/verizon-insights-lab/digital-transformation/2015/#sdn","page": "","title": "Get IT and business on the same page with software-defined networking.","h1": "Get IT and business on the same page with software-defined networking.","summary": "","published": "2015-11-05T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 135499,"url": "/verizon-insights-lab/enterprise-cloud-report/2015/","page": "","title": "Cloud is now business as usual.  Are you a skeptic or a native?","h1": "Cloud is now business as usual.  Are you a skeptic or a native?","summary": "From skeptic to native, which of our three cloud  personas best describes your cloud strategy?","published": "2016-03-16T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 135518,"url": "/external/media/podcast/som-iot-2.mp3","page": "/verizon-insights-lab/state-of-the-market-internet-of-things/2016/","title": "SoM IoT Podcast","h1": "SoM IoT Podcast","summary": "Discover what's behind consumer IoT adoption – and what the implications are for customer experience and data privacy.","published": "2016-02-03T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135519,"url": "/external/media/podcast/som-iot-1.mp3","page": "/verizon-insights-lab/state-of-the-market-internet-of-things/2016/","title": "Value of IoT","h1": "Value of IoT","summary": "Learn more about data analytics and how businesses are turning massive streams of data into potential revenue.","published": "2016-04-04T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135520,"url": "/external/media/podcast/som-iot-3.mp3","page": "/verizon-insights-lab/state-of-the-market-internet-of-things/2016/","title": "State of the IoT Market","h1": "State of the IoT Market","summary": "Hear Mark Bartolomeo, Verizon VP of Connected Solutions, talk about the state of the IoT market and the biggest challenges to wider adoption.","published": "2016-02-12T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135521,"url": "http://www.verizon.com/about/sites/default/files/state-of-the-internet-of-things-market-report-2016.pdf","page": "/verizon-insights-lab/state-of-the-market-internet-of-things/2016/","title": "State of the Market: Internet of Things 2016","h1": "State of the Market: Internet of Things 2016","summary": "","published": "2016-06-09T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "missing-category","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 135522,"url": "http://youtu.be/fKMYgv-4qvw","page": "/verizon-insights-lab/the-future-of-infrastructure/2016/","title": "What's next for your cloud?","h1": "What's next for your cloud?","summary": "","published": "2016-04-15T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135525,"url": "http://youtu.be/JNOUveTLMXU","page": "/verizon-insights-lab/the-future-of-infrastructure/2016/","title": "Think mobile first.","h1": "Think mobile first.","summary": "Today, mobile is second nature. It’s at the heart of every successful brand, including yours. It helps you deliver better experiences and business results.","published": "2016-04-15T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135526,"url": "http://youtu.be/RdKAjG-TINs","page": "/verizon-insights-lab/the-future-of-infrastructure/2016/","title": "You are going to be breached.","h1": "You are going to be breached.","summary": "","published": "2016-04-15T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135527,"url": "http://youtu.be/lBs63CaNnLE","page": "/verizon-insights-lab/the-future-of-infrastructure/2016/","title": "Build a hyperconnected workforce.","h1": "Build a hyperconnected workforce.","summary": "Work is about what you do, not where you are. Collaboration tools are breaking down the boundaries of business, making you more efficient and productive.","published": "2016-04-22T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135528,"url": "http://youtu.be/cfwlrxIgVzA","page": "/verizon-insights-lab/the-future-of-infrastructure/2016/","title": "Failure's not an option.","h1": "Failure's not an option.","summary": "","published": "2016-04-15T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "videos","pop": 0.657895,"age": 152,"rank": 131},{"id": 135533,"url": "http://youtu.be/Rxulo78gyGc","page": "","title": "Agriculture: How Internet of Things (IoT) is changing the game","h1": "Agriculture: How Internet of Things (IoT) is changing the game","summary": "Find out how the Internet of Things (IoT) is having a major impact on agriculture, enabling farmers to make better use of resources, prevent disease and increase crop yields.","published": "2016-04-12T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135535,"url": "https://youtu.be/T26yRG601dM","page": "","title": "Energy: How Internet of Things (IoT) is changing the game","h1": "Energy: How Internet of Things (IoT) is changing the game","summary": "","published": "2016-04-05T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[industry:utility]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135536,"url": "https://youtu.be/rLrI7OizLBM","page": "","title": "Healthcare: How Internet of Things (IoT) is changing the game","h1": "Healthcare: How Internet of Things (IoT) is changing the game","summary": "Find out how the Internet of Things (IoT) can improve the delivery of healthcare for a growing and aging population.","published": "2016-04-10T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135537,"url": "https://youtu.be/yq-v5b3S-jA","page": "","title": "Smart Cities: How Internet of Things (IoT) is changing the game","h1": "Smart Cities: How Internet of Things (IoT) is changing the game","summary": "","published": "2016-04-07T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135538,"url": "https://youtu.be/YxFT8CNeWcA","page": "","title": "Manufacturing: How Internet of Things (IoT) is changing the game","h1": "Manufacturing: How Internet of Things (IoT) is changing the game","summary": "Discover how the Internet of Things (IoT) is having a major impact on manufacturing, enabling businesses to better source materials, track assets and become more lean..","published": "2016-04-11T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135546,"url": "/verizon-insights-lab/forrester-cx/2016/","page": "","title": "Will you transform or perish?","h1": "Will you transform or perish?","summary": "You must deliver a better mobile experience if you want to succeed.&nbsp;","published": "2016-04-12T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "customer-experience","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 135551,"url": "/external/media/podcast/135551-verizon_hybridIT.mp3","page": "","title": "Hybrid IT","h1": "Hybrid IT","summary": " Learn about the best practices of a hybrid IT approach.","published": "2016-04-12T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "business-performance","industry": "[]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135565,"url": "/external/media/podcast/135565-dbir2016-healthcare.mp3","page": "/verizon-insights-lab/dbir/2016/","title": "A 7-minute Healthcare Cybersecurity Update","h1": "A 7-minute Healthcare Cybersecurity Update","summary": "Bryan Sartin, Exec. Director of Global Security Svcs & Brian Campbell, Managing Director of Prof Svcs for Healthcare","published": "2016-04-27T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "hardgate","category": "security-risk-management","industry": "[]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135566,"url": "/external/media/podcast/135566-dbir2016-public.mp3","page": "","title": "Our Public Sector Data Security Discussion","h1": "Our Public Sector Data Security Discussion","summary": "Bryan Sartin, Exec. Director of Global Security Svcs & Jessica Hill, Manager of Prof Svcs for Public Sector","published": "2016-04-27T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135567,"url": "/external/media/podcast/135567-dbir2016-manufacturing.mp3","page": "/verizon-insights-lab/dbir/2016/","title": "Smarter Manufacturing Security in 7 Minutes","h1": "Smarter Manufacturing Security in 7 Minutes","summary": "Bryan Sartin, Exec. Director of Global Security Svcs & Chintan Gohil, Manager of Prof Svcs for Manufacturing","published": "2016-04-27T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[]","type": "podcast","pop": 0.598802,"age": 167,"rank": 136},{"id": 135568,"url": "/external/media/podcast/135568-dbir2016-retail.mp3","page": "/verizon-insights-lab/dbir/2016/","title": "Verizon Retail Cybersecurity Roundtable","h1": "Verizon Retail Cybersecurity Roundtable","summary": "Bryan Sartin, Exec. Director of Global Security Svcs & Brad Rossiter, Manager of Prof Svcs for Retail","published": "2016-04-27T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[industry:retail]","type": "podcast","pop": 999999,"age": 0,"rank": 9999},{"id": 135571,"url": "https://youtu.be/7KHrsSU-Zak","page": "/verizon-insights-lab/dbir/2016/","title": "DBIR2016 Overview","h1": "DBIR2016 Overview","summary": "For the ninth time, the 2016 Data Breach Investigations Report (DBIR) lifts the lid on what's really happening in cybersecurity. ","published": "2016-04-26T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "security-risk-management","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135573,"url": "/resources/reports/rp_DBIR_2016_Report_en_xg.pdf","page": "/verizon-insights-lab/dbir/2016/","title": "2016 Data Breach Investigations Report","h1": "2016 Data Breach Investigations Report","summary": "100,000+ incidents, including 2,260 analyzed breaches. 82 countries. One report.","published": "2016-04-27T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "softgate","category": "security-risk-management","industry": "[]","type": "reports","pop": 999999,"age": 0,"rank": 9999},{"id": 135587,"url": "https://youtu.be/cMFnPWZbxF8","page": "","title": "Verizon Integrated Managed Services","h1": "Verizon Integrated Managed Services","summary": "","published": "2016-05-10T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "missing-category","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135673,"url": "https://youtu.be/kzFaopuHwMg","page": "","title": "Your partner behind the scenes.","h1": "Your partner behind the scenes.","summary": "","published": "2016-07-18T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "missing-category","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135685,"url": "https://youtu.be/16iTdPW1wAQ","page": "/verizon-insights-lab/idc-market-spotlight/2016/","title": "Digital Transformation Video - Verizon Enterprise Solutions","h1": "Digital Transformation Video - Verizon Enterprise Solutions","summary": "","published": "2016-08-09T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "technology-innovation","industry": "[]","type": "videos","pop": 14.2857,"age": 7,"rank": 22},{"id": 135702,"url": "https://youtu.be/QN8NxLQThTY","page": "/products/business-communications/customer-contact-solutions/virtual-contact-center/campaign/","title": "New Millennium, New Expectations, New Customer Experiences","h1": "New Millennium, New Expectations, New Customer Experiences","summary": " ","published": "2016-08-25T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "customer-experience","industry": "[]","type": "videos","pop": 2.17391,"age": 46,"rank": 99},{"id": 135716,"url": "http://youtu.be/4dqjYShTLXs","page": "","title": "Verizon Intelligent Lighting Solutions","h1": "Verizon Intelligent Lighting Solutions","summary": "","published": "2016-09-09T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999},{"id": 135720,"url": "https://youtu.be/tqlrUQOp17U","page": "","title": "Verizon Intelligent Track and Trace: Cold Chain Solution","h1": "Verizon Intelligent Track and Trace: Cold Chain Solution","summary": "Verizon Intelligent Track and Trace: Cold Chain tracks and monitors your cargo in route to its final destination.","published": "2016-09-07T00:00:00Z","source": "Verizon Enterprise Solutions","gating": "","category": "internet-of-things","industry": "[]","type": "videos","pop": 999999,"age": 0,"rank": 9999}]}

