Venture Atlanta Conference 2016
Venture Atlanta
Jun 5 /

Information Security Primer

Atlanta, a nationally-recognized hub for information security (InfoSec) innovation, has seen a number of companies bloom and prosper in this sector over the last 15 years. But despite advances in threat detection and remediation, cyber security threats persist. From the Epsilon spear-phishing data breach, which came to light last April, to October’s malware attack on NASDAQ’s cloud-based communication tool, Director’s Desk; from the spear-phishing attack on RSA’s SecurID authentication system by an “unnamed nation state,” to the hacking of 1.5 million credit card records from Global Payments, 2011 was aptly named, “The Year of the Breach.”

[Click here for infographic on the worst data breaches in the last decade.]

According to Gartner, Inc., cybercrime is set to grow 10 percent per year through 2016 and the cost of even a moderate breach can be enormous. This is especially so if the cost of an investigation, data restoration, the replacement of compromised hardware, software and sometimes culpable personnel are taken into account. The impact can be even graver if the loss of reputation, shareholder value, and customers result from the breach. A serious breach can even destroy a business. With the stakes so high, it is no surprise that the infoSec market is predicted to be worth $10 billion by 2014.

Worldwide InfoSec Spend Infographic by CounterAttack. [Click on image to enlarge]

The most obvious targets for cybercrime are financial data: budgets, forecasts, banking information, company credit card numbers, bank accounts and payroll information. But there are other targets, too. Intellectual property, marketing plans, contact information, product specs, disaster recovery plans, data stored in POS systems or transmitted by credit card processing hardware, employee personal data, the contents of every email sent through mail servers, and, potentially the most damaging of all, customer data, are all viable targets for attackers.

Atlanta has had a long history of infoSec leadership. Former members of Internet Security Systems (ISS), which was founded in 1994, and was acquired by IBM in 2006, have launched many other companies in the infoSec field.  Damballa, Oversight Systems, Endgame Systems, SPI Dynamics (acquired by HP) and Reflex Systems are just some of the companies in Atlanta with ISS DNA. The founding partners at TechOperators, a leading venture capital firm whose focus includes early-stage infoSec start-ups, includes ISS alums Thomas Noonan and Glenn McGonnigle.

Glenn McGonnigle, general partner at TechOperators

“As the sector grows, talented engineers are starting their own companies, and they’re being very successful because they know the landscape of the industry. There’s nothing but upside for companies that understand where they sit in the space and have solutions that are new and innovative in areas that haven’t been well-addressed, or disrupt the status quo of the existing market space,” said Glenn McGonnigle, general partner at TechOperators.

In recent years, security technology has evolved from firewalls, virus protection, tokens, and implementing secure http to measures to reduce hacktivism, to provide secure platforms and environments for the Cloud, as well as solutions for corporations that are increasingly embracing ‘Bring Your Own Device’ (BYOD).  At the forefront of this fight against data theft are Atlanta companies Damballa, Pindrop Security, Social Fortress, Endgame Systems, and Reflex Security.  Endgame Systems, Damballa Inc., and Pindrop Security provide data security services. Social Fortress, an encryption solution, and Reflex Systems specializes in virtualization.

But attacks take place in both the virtual and physical world. A 2011 study by the Ponemon Institute reported that 637,000 notebook computers are lost in airports every year, and two-thirds are never recovered. Some of those laptops will contain information that could be personally or professionally damaging to individuals and corporations.

Conversely, many techniques allow cyber criminals to do their dirty work remotely. Phishing, keystroke logging and viral attacks with worms, Trojan horses, malware and spyware all take place in the virtual world and are as popular as ever. The damage inflicted by some of these methods may not always be immediately apparent but can be just as far-reaching as the theft of a data-rich physical device. In fact, studies indicate that data servers are still the primary target for cyber attacks.

According to the 2012 Verizon Data Breach Investigation Report (DBIR), 94 percent of successful attacks were to data servers, and despite the availability of counter-measures — 96 percent were reported as “not high difficulty” — 97 percent of the breaches could have been avoided by implementing simple or intermediate controls. Despite well-documented consequences and known solutions, attitudes toward protecting data assets are dangerously cavalier.

Perhaps the best defense in the fight against cybercrime isn’t just superior technology counter-measures. Adoption of strong data access policies and a well-trained and vigilant workforce are just as essential for a comprehensive defense against attacks.

The continued use of social networks by employees and consumers alike, increased access to the Internet and corporate networks by mobile devices and the rise of the remote worker present cybercriminals with even more points of attack. The infoSec sector is, in turn, presented with ever more opportunities to create value. And for Atlanta’s infoSec companies, the future couldn’t be brighter.


June 2012 Newsletter




When he felt ready in 2004 after months punting in his backyard while working in sales he took his pregnant wife and four year old to the US and signed a Authentic NFL Jerseys three year contract with the Green Bay Packers. But after months of pre season training on a few hundred dollars a week, he was dropped just minutes before the season started.”We teach and educate the candidates of very specific breathing and relaxation exercises, focus exercises,” Shai says. “These help people get in touch with their body, sensuality, senses. And then we teach about human sexuality. They have to be very knowledgeable about sexual dysfunction. We teach them some Baratas Ray Ban clinical practices about how to work with clients.” Once they’ve gone through their training, interns start working with clients and therapists under the supervision of the experienced surrogate who’s been teaching them. And yes, we realize that even though we are using very clinical language, half of you still spent that last sentence picturing an Eyes Wide Shut situation. “So she tells us what to do, and then watches us from the shadows? And the whole thing is in some kind of . dungeon, I assume?” No. Or at least, that’s not how the ones we spoke to do it.Jay Cutler earned a massive new contract in the off season and will need to prove he is worth that money. With Brandon Marshall and Alshon Jeffrey he has the best one two punch at receiver in the NFL, as well as the excellent Matt Fort, though his offensive line is a bit unbalanced. Bodyweight workouts such as push ups, pull ups, dips, mountain climbers, burpees, and crunches are added after cardio exercises. These workouts are performed in sets of 20 40 to boost results and combine raw strength with muscular endurance. Stretching is also vitally important, as it improves circulation and helps elongate and strength muscles.Cardinals manager Whitey Herzog stormed out of the dugout and laid into Denkinger with a series of visible obscenities as replay after replay on television and in the stadium showed that Orta was out at first. Todd Worrell re enacted the play on multiple occasions to try to demonstrate Denkinger’s error to him. However, with no instant replay rule in baseball, the Cardinals’ protests were to no avail, as Denkinger refused to budge.Fill out the information required (which is typically email address and Internet provider). Occasionally you Cheap ray ban sunglasses sale will not be given access due to the cable provider’s restrictions. Select the game you want to watch from the selections on the right side of the screen. You can also watch a replay of a game if you missed it. Once you click cheap football jerseys china on the game, a smaller window will load. This window will stream the game live. This is typically done commercial free, as well.

One Response to Information Security Primer

  1. Pingback: Georgia Cos Tackle Growing Info Security Concerns | Georgia Technology News