Profile

Cover photo
ANTHONY M. FREED
Works at Norse Corporation
783 followers|178,466 views
AboutPostsPhotosYouTube+1's

Stream

ANTHONY M. FREED

Shared publicly  - 
 
0000 The Department of Defense has abruptly canceled a request for proposals (RFP) for private sector contractors to support more than twenty task areas in building out portions of the Pentagon’s cyber branch, U.S. Cyber Command. The potential contracts, which would have included threat intelligence gathering and analysis as well as cyber defense and offense operations, would have been worth as much as $475 million over five years. The DOD stated...
1
Lawrence Bujak's profile photo
 
$475 M wouldn't cover the paper-shuffle  cost of the RFP...

if a program isn't a B or T $ no one cares about it.
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Norse Corporation will showcase its new family enterprise threat intelligence solutions in booth E202 at the InfoSecurity Europe 2015 conference and exhibition, June 2-4, at the Olympia Conference Centre in London. On display will be the new Norse Appliance™ 10g, which actively monitors inbound and outbound network traffic at 10 gbps line speeds to “supercharge” SIEMs and block advanced attacks, and the new Norse …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
000 A team of Chinese researchers say they have devised a methodology to track the movements of subway riders through motion detectors that are standard features on most mobile phones. While GPS signals and those that are part of the cell phone carrier’s network are typically well protected to prevent unwanted surveillance by random attackers, motion sensors such as the accelerometer that enables screen rotation based on …
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
000 Saudi media sources are reporting that senior officials have confirmed that servers operated by the Foreign Ministry of Foreign Affairs (MOFA) were breached following the alleged release of classified Saudi government documents. A group calling itself the Yemen Cyber Army had claimed to have taken control of as many as 3000 Saudi government systems which were the source for the classified materials, and threaten to release …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
02713 The release of Verizon’s 2015 Data Breach Investigation Report (DBIR) revealed that cyberattacks have become increasingly sophisticated since last year. This year the DBIR reported 79,790 security incidents and 2,122 confirmed data breaches in 61 countries across the world. The 2015 DBIR is designed to serve as a useful tool to help organizations prepare their enterprises to conduct individualized self-assessments of risk, so that …
3
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Security researchers have disclosed that within several hours of the discovery of the LogJam vulnerability, as many as 575 cloud service providers were potentially vulnerable to man-in-the-middle (MitM) attacks. LogJam, a subset of the FREAK vulnerability, is a twenty-year old encryption flaw that weakens the TLS (Transport Layer Security) protocol in servers that use export grade DHE ciphers with keys less than 1024-bit. If both a browser a...
1
Add a comment...
Have him in circles
783 people
Theresa Frush's profile photo
Walid Shaari's profile photo
Rayme Brock's profile photo
DIEM TRAN's profile photo
Altharhi Ahmed's profile photo
Md. Forhadur Reza's profile photo
James McGovern's profile photo
Chris Scott's profile photo
Anil VK's profile photo

ANTHONY M. FREED

Shared publicly  - 
 
0000 The Internet Security Alliance (ISA) is urging the Department of Commerce (DOC) to work with the private sector to generate data on cost-effectiveness, prioritization and the incentives needed to generate greater adoption of the NIST Cybersecurity Framework released in February of 2013. The request came in response to a RFI from DOC’s National Telecommunications and Infrastructure Agency (NTIA), which asks industries to suggest what sorts of...
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
12413 I’ve been meandering through the Darknets again, mainly peeking into hidden forums, marketplaces, the onion-pastebin, and the Evil search engine. Along the way, I’ve managed to stumble across a vast array of  premium vendors promoting “fresh” data for sale, amongst other illicit wares. Deviant Mindsets Wandering through some of these perverse wastelands, can literally make me nauseous. I often wonder how law enforcement can …
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
000 Do-it-yourself malware toolkits have been available on the black market for a long time, but now researchers have discovered the first ransomware variation for creating your own extortion campaigns – and it’s free to use. The toolkit, called “Tox,” allows would-be attackers to design their own personalized ransomware attack tool with advanced evasion capabilities, and the research team has confirmed that the malware performs …
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
3022 I just received an email from a new friend of mine who was telling me about her troubles with bringing a company up to compliance standards. She was performing security compliance testing. Testing? My initial response was “Poor you” until I realized that she was wasting her time and the time of the company she was working. Compliance is not security. It never was …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 A newly released website security report reveals that more than half (56%) of the 30,000 plus websites tested had multiple vulnerabilities, and as many as 86% had a least one “serious” vulnerability. The researchers defined a “serious vulnerability” as one in which an attacker could take control over all or part of a website, could compromise user accounts, could gain access sensitive data, or could violate …
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 The Internet Crime Complaint Center (IC3) – a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) – has released its annual report on Internet fraud and web-based crimes (PDF), stating it received a total of 269,422 complaints in 2014 for an estimated $800,492,073 in losses. But that’s just the tip of the proverbial iceberg. “Millions of people in the United …
1
Add a comment...
People
Have him in circles
783 people
Theresa Frush's profile photo
Walid Shaari's profile photo
Rayme Brock's profile photo
DIEM TRAN's profile photo
Altharhi Ahmed's profile photo
Md. Forhadur Reza's profile photo
James McGovern's profile photo
Chris Scott's profile photo
Anil VK's profile photo
Work
Employment
  • Norse Corporation
    Senior Editor of Publications, 2014 - present
  • Tripwire, Inc.
    Community Engagement & Social Media Coordinator, 2014
  • Freelance Security Writer
    2008 - 2013
  • Infosec Island
    Managing Editor, 2010 - 2012
Links
Contributor to
Story
Tagline
Check out Norse Corp - live machine readable attack and threat intelligence...
Introduction

Anthony M. Freed is the Director of Publications for Norse Corporation, and is also the Communications Advisor for the Cyber Security Forum Initiative, which provides Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners

Norse is the leading innovator of live dark intelligence and adaptive security solutions that enable the proactive defense, rapid detection, risk-based response, and faster resolution of advanced cyberattacks. Norse's live dark intelligence platform continuously analyzes high-risk network traffic from the global Internet's darknets and the deep web, to proactively identify the sources, characteristics, and risk-levels of cyberattacks. Learn more at www.norse-corp.com or follow us @NorseCorp on Twitter.

Anthony is an infosec journalist who authored numerous feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets, including The New York Times, Reuters, The Register, Financial Times of London, MSNBC, Fox News, PC/IT/Computer/Tech World, eWeek, SC Magazine, CSO Magazine, Federal News Radio, The Herald-Tribune, Naked Security, and many more. 

Anthony previously wrote about the finance industry before moving into the information security field, and received notoriety as a financial freelance journalist, including having numerous articles published by leading media syndicates such as The Chicago Sun-Times, Business Week’s Business Exchange, Seeking Alpha, InvestorCentric, OpenSalon, Bear Market Investments, Alacra Pulse, ML-Implode, and dozens more.

Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

Basic Information
Gender
Male
ANTHONY M. FREED's +1's are the things they like, agree with, or want to recommend.
Let Me Tell You Some Akamai Security Stories - The Akamai Blog
blogs.akamai.com

I'm a journalist by trade, with two decades of newspaper reporting and editing behind me. I've spent the last decade writing about informati

SCM: System Hardening... Made Easy
www.slideshare.net

System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with: R

nCircle
plus.google.com

nCircle is the leading provider of automated security and compliance auditing solutions

Metricon 8 - This Con Was a Bit Different...
www.tripwire.com

Well, Metricon 8 came and went along with RSA. This con was a bit different - not even a conference, but a working session. Pete Lindstrom (

RSA Conference Attendees Respond: "If I Were a CISO..."
www.tripwire.com

At the RSA Conference, we asked attendees to share with us what they would happen if they became a chief information security officer (CISO)

RSA 2013 Finale: It's Really All About the People
www.tripwire.com

RSAC 2013 has finally come to an end. All in all, if you can look beyond the hype and rampant commercialism that is the trademark of this, t

Techniques to Instill Confidence in Security
www.tripwire.com

Here are two ugly realities about security: Everyone is concerned with their level of security. 100% security is an impossibility. If you ca

What Would You Do If You Became CISO?
www.tripwire.com

It’s good to be the king…or is it? The Chief Information Security Officer or CISO is a position to strive for, avoid, and run away from if y

Security BSidesSF Goes Above and Beyond
www.tripwire.com

For those of you who were lucky enough to be at Security BSides San Francisco 2013, you already know what we know - the event went off witho

RSA Conference
plus.google.com

#rsac, #security, #cybersecurity, #bigdata, #networking

The Convergence of DevOps and Security
www.tripwire.com

Next week is the big RSA Conference in the US (San Francisco), and I'm really looking forward to leading a panel discussion on "Making Rugge

Security Visualization: AfterGlow Cloud
www.tripwire.com

One of the leading thinkers in the realm of security visualization is Raffael Marty, he literally wrote the book on the topic.“Applied Secur

20 Critical Security Controls: Control 4 - Continuous Vulnerability Asse...
www.tripwire.com

Today's post is all about Control 4 of the CSIS 20 Critical Security Controls - Continuous Vulnerability Assessment and Remediation (the las

Beyond the PCI Checkbox. Customer Success Story.
www.tripwire.com

We have many customers who originally have bought Tripwire to comply with a PCI audit. However, we have found that when our Professional Ser

U.S. to friend and foe: Come visit our network flea market!
blogs.csoonline.com

Is it sad that a lot of us find humor and indifference in just how easy it is to rummage through the government's computer networks? Per

Announcement from Infosec Island Members: TakeDownCon: Special Discounts...
www.linkedin.com

Special Training Promotion for Infosec Island Members Sign up for any of the trainings, and enjoy the following: 1. 15

Infosec Island - Apps on Android Market
market.android.com

Infosec Island is the premier resource for all IT and Information Security-related news, articles and commentary. Join the largest IT Securi

First documented case of cyber espionage? - Forbes
www.forbes.com

There have been so many examples of cyber espionage that it is now the norm to just accept that it is rampant.  MI5 in the UK, the German Ch