Paul KurtzinTruSTAR BlogCommodity Ransomware is HereBrian Krebs recently posted a blog on a slick ransomware-as-a-service interface called “Philadelphia,” enabling almost anyone to launch a…Mar 13, 2017Mar 13, 2017
Paul KurtzinTruSTAR BlogGrizzly Steppe and Carbanak: The Dangers of Miscalculation in CyberspaceHats off to the Department of Homeland Security (DHS) for releasing additional information on Grizzly Steppe — detailing Russian…Feb 23, 20171Feb 23, 20171
Paul KurtzinTruSTAR BlogCybersecurity — 2017 Reality CheckThe cyber security community descends on San Francisco next week for the RSA Security Conference to review the latest products to address…Feb 11, 2017Feb 11, 2017
Paul KurtzinTruSTAR BlogNo Computer is Safe: Now What?The quote “Technology is not the measure of a great civilization” from the first episode of The Man in the High Castle is timely given…Jan 4, 2017Jan 4, 2017
Paul KurtzinTruSTAR BlogA New Cold War Begins and the Private Sector is on the Front LineThe escalation underway between Russia and the United States in cyberspace is a far cry from where we were two years ago with North Korea’s…Dec 19, 2016Dec 19, 2016
Paul KurtzinTruSTAR BlogCybersecurity: “Change or Die”“Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go…Sep 9, 2016Sep 9, 2016
Paul KurtzinTruSTAR BlogDo we need a Cyber Moonshot?Last week Vice President Biden, oncologists, researchers, and drug manufacturers convened in Washington to brainstorm on President Obama’s…Jul 6, 2016Jul 6, 2016
Paul KurtzinTruSTAR BlogIncident Exchange — Beyond the Traffic Light ProtocolThe Traffic Light Protocol (TLP) was developed as a means to facilitate information sharing by using a standardized information…Jul 1, 2016Jul 1, 2016
Paul KurtzinTruSTAR BlogIncident Exchange and Threat Intelligence — pieces of the same puzzleThis is the first post in a 3-part seriesMay 25, 2016May 25, 2016
Paul KurtzinTruSTAR BlogDefenders Take the Higher GroundAttackers are getting faster, and we seem to be perpetually stuck just trying to keep up. The highly-regarded 2016 Verizon Data Breach…May 4, 2016May 4, 2016