Welcome!

Security through Intelligence

Rich Barger

Subscribe to Rich Barger: eMailAlertsEmail Alerts
Get Rich Barger via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Rich Barger

Within the ThreatConnect Intelligence Research Team (TCIRT), we feel that sharing what we know, whether publicly or privately, helps to grow our organization.  We see information sharing as a key investment area, allowing our team to more efficiently save time and money while helping us achieve broader organizational goals. We recognize that Threat Intelligence is not a one size fits all solution, but rather a series of tailored processes.  We also see significant benefits to organizations that implement even the most modest Threat Intelligence sharing processes.  As a resource constrained organization ourselves, we understand how limited budgets, thin staffing rosters, and busy schedules can impact an organization's ability to consume, produce, and share fully analyzed Threat Intelligence. The lack of resources is one of the strongest arguments an organization can... (more)

Victim-nomics: Estimating the “Costs” of Compromise

Since launching ThreatConnect.com, Cyber Squared's Intelligence Support Team has become more effective in managing, analyzing and sharing our Threat Intelligence. While understanding the threat remains one of our core requirements, we have also begun to fill a key gap that, we feel, many within the industry are failing to address. Providing effective Threat Intelligence requires more than just characterizing the threat from a technical perspective.  Instead, you must strike a balance between providing technical context as well as non-technical relevancy to the victim.  Industry ... (more)

Burning Down the House for Fun and Profit

In October of 1962, during the buildup to the Cuban Missile Crisis, a debate between Adlai Stevenson and Valerian Alexandrovich Zorin at the United Nations Security Council, revealed how far the U.S. was willing to go to produce evidence that the Soviet Union was indeed stockpiling tactical nuclear weapons and ballistic missiles in North America. The Soviets, reluctance to be truthful "in the court of world opinion", forced the hand of the U.S. to produce the very intelligence that the Soviets' claimed the U.S. did not have. Once the overhead photos of the missiles were shared pu... (more)

Network Health: Advanced Cyber Threats to the Medical & Life Sciences Industries

In a 2011 report to Congress on Foreign Economic Collection and Industrial Espionage released by the Office of the National Counterintelligence Executive, the authors stated that "Healthcare services and medical devices/equipment will be two of the five fastest growing international investment sectors according to a US consulting firm. The massive research and development (R&D) costs for new products in these sectors, up to $1 billion for a single drug, the possibility of earning monopoly profits from a popular new pharmaceutical, and the growing need for medical care by aging ... (more)

Predicting the 2012 Campaign Compromises

With the 2012 political season upon us, we have just gained a glimpse of the individual candidates and their cyber policies. It is from those cyber policies that we have also heard the candidates address China; specifically Chinese nation state cyber sanctioned or sponsored espionage. To the American voter, “cyber” issues may not be the hot topic that the economy, immigration or the presence of troops in Iraq and Afghanistan are. However, the candidates and their staffs would benefit by recognizing cyber security is not just a second tier national issue for debate, but a very real... (more)