Profile

Cover photo
ANTHONY M. FREED
Works at Norse Corporation
819 followers|185,842 views
AboutPostsPhotosYouTube+1's

Stream

ANTHONY M. FREED

Shared publicly  - 
 
3 The Internet of Things (IoT) refers to the networking of endpoint products and objects that can be accessed via the Internet. The objective of this level of networking is to make our every day experiences more streamlined and efficient. Such an evolution is a logical progression in an increasingly networked world that favors optimum performance. However, as we head toward an even more interconnected …
2
2
Matthew J. Harmon's profile photoBert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
32919 When the Bring Your Own Device (BYOD) trend first took off it was hailed as a fantastic opportunity for the enterprise to save money and increase productivity, without negatively impacting morale. What business could resist such a proposition? Unfortunately, in practice the BYOD trend has fallen short of expectations in some areas and caused unforeseen problems in others. This is the ugly truth about …
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Nine codefendants were have been indicted in Brooklyn, New York, and Newark federal courts for their participation in an international operation which hacked into three newswire services to steal unpublished press releases containing confidential financial information that was leveraged to make illicit stock trades. “The defendants were a well-organized group that allegedly robbed the newswire companies and their clients and cheated the secu...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
41503 Recently, I was engaged in a very robust discussion on multiple topics pertaining to cyber and then at some point, the topic on degrees reached the forefront. To level set this discussion, I have all the respect in the world for the person I was debating with but sometimes you have to agree to disagree. The point of contention was why don’t we simply …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 The Securities and Exchange Commission (SEC) issued fraud charges against 32 defendants for conspiring to profit from stock trades based on confidential information about corporate earnings announcements provided by two Ukrainians who are believed to have hacked into newswire services to obtain the data, generating over $100 million in illegal gains. The SEC’s August 10th complaint, which was filed in the U.S. District Court in Newark, was u...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
10201026 We need fear to sell security. We NEED it. If we didn’t make people scared of the threats, then cybersecurity as an industry would end. But what if we didn’t need it? The antiperspirant and deodorant industry doesn’t need to remind us that people can stink. We notice. And if you’re one of those people who thinks, “that’s crazy, people don’t stink and antiperspirant is based …
2
5
Alexsander Antunes's profile photoI AM's profile photo
Add a comment...
Have him in circles
819 people
Károly Domonyi's profile photo
roslyn james's profile photo
Saif Farooqui's profile photo
Georgia O'Keefe Art's profile photo
khalifa mourad's profile photo
Joseph Barcia's profile photo
Jack Daniel's profile photo
Robb Reck's profile photo
Tim Utzig's profile photo

ANTHONY M. FREED

Shared publicly  - 
 
11702 Recently, an international hacking ring was discovered to have stolen more than $100 million. The sophisticated plan demonstrated ingenuity on the part of the attackers. They exploited a core vulnerability of the financial system in one of the digital age’s insider trading schemes, according to one news report.[i] This is the first U.S. prosecuted criminal case in which the hackers teamed up with stockbrokers …
2
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
500 On July 20, the call for comments on the Wassenaar Arrangement initially invoked by the Department of Commerce’s Bureau of Industry and Security (BIS) came to a close. The new proposal would add to the list of controlled technology to include “systems, equipment, components, and software designed for the generation, operation or delivery of, or communications with, intrusion software to include network penetration products …
1
1
Paul Hosking's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 The International Cybersecurity Standards Working Group, an interagency working group spearheaded by the National Institute of Standards and Technology (NIST), has released a draft report which outlines objectives and recommendations for enhancing the U.S. government’s participation in the development of international standards for cybersecurity. The draft report supports the United States Standards Strategy, which was developed in 2010 to u...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 SAP has issued August patch updates to address 22 new vulnerabilities, some impacting SAP HANA and the SAP Mobile Platform, with 15 of the flaws having a high priority rating. The most common vulnerability addressed was related to Cross Site Scripting (XSS), followed closely by information leakage, and a range of other issues. Three of the critical vulnerabilities were reported by ERPScan researchers Dmitry Chastuhin, Vahagn Vardanyan, and R...
2
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Norse analysts crunched the numbers on thousands of security events from the first week in July, tagging the origin of these threats, the most frequently-attacked ports and services, types of attacks, the most-attacked industries, and more: You can download the entire Infographic here… 0000 You Might Also Like: Threat Thursday: Dutch IP Address Hunting Open Proxies in the United States Canadian IP Address Searching …
2
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Security researchers from a UK-based security firm last week disclosed a proof-of-concept exploit that targets misconfigured implementations of Windows Server Update Services (WSUS) at the BlackHat Conference in Las Vegas. The exploit is detailed in a whitepaper titled WSUSpect – Compromising the Windows Enterprise via Windows Update (PDF), and was the subject of a session held by Paul Stone and Alex Chapman. The presentation demonstrated ho...
1
Add a comment...
People
Have him in circles
819 people
Károly Domonyi's profile photo
roslyn james's profile photo
Saif Farooqui's profile photo
Georgia O'Keefe Art's profile photo
khalifa mourad's profile photo
Joseph Barcia's profile photo
Jack Daniel's profile photo
Robb Reck's profile photo
Tim Utzig's profile photo
Work
Employment
  • Norse Corporation
    Senior Editor of Publications, 2014 - present
  • Tripwire, Inc.
    Community Engagement & Social Media Coordinator, 2014
  • Freelance Security Writer
    2008 - 2013
  • Infosec Island
    Managing Editor, 2010 - 2012
Links
Contributor to
Story
Tagline
Check out Norse Corp - live machine readable attack and threat intelligence...
Introduction

Anthony M. Freed is the Director of Publications for Norse Corporation, and is also the Communications Advisor for the Cyber Security Forum Initiative, which provides Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners

Norse is the leading innovator of live dark intelligence and adaptive security solutions that enable the proactive defense, rapid detection, risk-based response, and faster resolution of advanced cyberattacks. Norse's live dark intelligence platform continuously analyzes high-risk network traffic from the global Internet's darknets and the deep web, to proactively identify the sources, characteristics, and risk-levels of cyberattacks. Learn more at www.norse-corp.com or follow us @NorseCorp on Twitter.

Anthony is an infosec journalist who authored numerous feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets, including The New York Times, Reuters, The Register, Financial Times of London, MSNBC, Fox News, PC/IT/Computer/Tech World, eWeek, SC Magazine, CSO Magazine, Federal News Radio, The Herald-Tribune, Naked Security, and many more. 

Anthony previously wrote about the finance industry before moving into the information security field, and received notoriety as a financial freelance journalist, including having numerous articles published by leading media syndicates such as The Chicago Sun-Times, Business Week’s Business Exchange, Seeking Alpha, InvestorCentric, OpenSalon, Bear Market Investments, Alacra Pulse, ML-Implode, and dozens more.

Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

Basic Information
Gender
Male
ANTHONY M. FREED's +1's are the things they like, agree with, or want to recommend.
Let Me Tell You Some Akamai Security Stories - The Akamai Blog
blogs.akamai.com

I'm a journalist by trade, with two decades of newspaper reporting and editing behind me. I've spent the last decade writing about informati

SCM: System Hardening... Made Easy
www.slideshare.net

System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with: R

nCircle
plus.google.com

nCircle is the leading provider of automated security and compliance auditing solutions

Metricon 8 - This Con Was a Bit Different...
www.tripwire.com

Well, Metricon 8 came and went along with RSA. This con was a bit different - not even a conference, but a working session. Pete Lindstrom (

RSA Conference Attendees Respond: "If I Were a CISO..."
www.tripwire.com

At the RSA Conference, we asked attendees to share with us what they would happen if they became a chief information security officer (CISO)

RSA 2013 Finale: It's Really All About the People
www.tripwire.com

RSAC 2013 has finally come to an end. All in all, if you can look beyond the hype and rampant commercialism that is the trademark of this, t

Techniques to Instill Confidence in Security
www.tripwire.com

Here are two ugly realities about security: Everyone is concerned with their level of security. 100% security is an impossibility. If you ca

What Would You Do If You Became CISO?
www.tripwire.com

It’s good to be the king…or is it? The Chief Information Security Officer or CISO is a position to strive for, avoid, and run away from if y

Security BSidesSF Goes Above and Beyond
www.tripwire.com

For those of you who were lucky enough to be at Security BSides San Francisco 2013, you already know what we know - the event went off witho

RSA Conference
plus.google.com

#rsac, #security, #cybersecurity, #bigdata, #networking

The Convergence of DevOps and Security
www.tripwire.com

Next week is the big RSA Conference in the US (San Francisco), and I'm really looking forward to leading a panel discussion on "Making Rugge

Security Visualization: AfterGlow Cloud
www.tripwire.com

One of the leading thinkers in the realm of security visualization is Raffael Marty, he literally wrote the book on the topic.“Applied Secur

20 Critical Security Controls: Control 4 - Continuous Vulnerability Asse...
www.tripwire.com

Today's post is all about Control 4 of the CSIS 20 Critical Security Controls - Continuous Vulnerability Assessment and Remediation (the las

Beyond the PCI Checkbox. Customer Success Story.
www.tripwire.com

We have many customers who originally have bought Tripwire to comply with a PCI audit. However, we have found that when our Professional Ser

U.S. to friend and foe: Come visit our network flea market!
blogs.csoonline.com

Is it sad that a lot of us find humor and indifference in just how easy it is to rummage through the government's computer networks? Per

Announcement from Infosec Island Members: TakeDownCon: Special Discounts...
www.linkedin.com

Special Training Promotion for Infosec Island Members Sign up for any of the trainings, and enjoy the following: 1. 15

Infosec Island - Apps on Android Market
market.android.com

Infosec Island is the premier resource for all IT and Information Security-related news, articles and commentary. Join the largest IT Securi

First documented case of cyber espionage? - Forbes
www.forbes.com

There have been so many examples of cyber espionage that it is now the norm to just accept that it is rampant.  MI5 in the UK, the German Ch