Cloud Security Tips

How does the cloud affect cyber security?

David Biser

January 21, 2016 - Posted by David Biser to Security Insight

Cloud Security

The cloud is growing without a doubt. International Data Corporation (IDC) predicts that more than 65% of enterprise IT organizations will be involved in hybrid cloud technologies this year. More and more companies are utilizing various aspects of cloud computing to assist in their IT infrastructure, provide applications to their employees, and store important data. Since the cloud is growing so rapidly and showing no signs of slowing down, it is extremely important for organizations to consider how the security aspects of cloud computing can affect their business.

As with most areas of technology, cloud computing is outpacing security. A proactive approach to security for cloud resources, however, can mitigate future trouble and provide a safe and accessible resource for your company.

When dealing with the cloud environment there are some important factors to keep in mind. Explore... read more >

Ransom32: First New Malware of 2016

JavaScript Ransomware-as-a-Service

David Biser

January 07, 2016 - Posted by David Biser to Threat Intelligence

Each new year brings unexpected surprises, some good and some bad. This blog is about a bad surprise for 2016, the first new malware of the year: Ransom32.

A new variety of much-hated ransomware has hit the Internet. This new ransomware is unique because it is the first known ransomware written in JavaScript. It is provided through Tor as a Ransomware-as-a-Service (RaaS) based on the cloud model so familiar in the IT industry today.

Ransom32 allows infection and encryption of nearly every operating system you can name: Mac, Windows and Linux are all vulnerable to this malware. It is the first ransomware programmed entirely in JavaScript, HTML and CSS. Since it is written in such a way, it allows for easy modification and adaptation to the different operating systems running in your network.

As of now, there is no known way to decrypt your files if Ransom32 encrypts them. It is extremely important that you ensure you have valid and useable back-ups for all... read more >

Preparation is Key to Incident Response Success!

Are you prepared for a security incident? #WarStoryWednesday

David Biser

December 02, 2015 - Posted by David Biser to Security Insight

Before anything else, preparation is the key to success.” Alexander Graham Bell

Most security personnel follow a six-step process when it comes to incident response. These six steps are outlined as follows:

  1. Preparation (before any incident)

    **Incident Occurs**

  2. Detection and...
read more >

Incident Response Impediments

Recent SANS survey reveals major impediments to Incident Response efforts

David Biser

September 15, 2015 - Posted by David Biser to Security Insight

Cyber Attacks Ahead

A recent white paper, “The Race to Detection: A Look at Rapidly Changing IR Practices” published by the SANS Institute and authored by Alissa Torres, sheds some reasonable light into the current state of incident response (IR) practices. The white paper surveyed a wide variety of incident response professionals for recommendations and experiences. All of the concerns from the various IR professionals resonated with what I have seen in my experience as an incident responder. 

The report states that the threat landscape is rapidly changing; with many respondents to the survey reporting that cyber attackers are increasing in their sophistication and efficiency. In fact, many of the criminal organizations involved in cybercrime are adopting the same techniques and tools... read more >

Website Pen Test

Mirror, mirror on the wall, what does my website reveal about my business to all? #WarStoryWednesday

David Biser

September 02, 2015 - Posted by David Biser to Security Insight


If you run a business, chances are that you have a presence on the Internet. A website is considered a critical aspect of a business. Establishing your product or business online is a must. As important as a website is, it is also a vulnerability point for your business – think about the Ashley Madison hack. Hackers can use your website to conduct reconnaissance and then infiltrate your company. When contracted to conduct a penetration test, white hat hackers try to simulate the actions of an actual attacker.

If your organization has a Web presence, this war story is for you.

Website Pen Test War Story: Background

In a recent penetration test, I was hired to simulate an attack against a company that handled PII (personal identifiable information).  The company wanted the test to simulate an attack from external sources (online), to be followed... read more >

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)