/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Phillip Carter

@carter_pe
11 posts
2022-09-25
Smart piece on #ZeroTrust by @mims: “The consistent theme is that every component of a system should be skeptical, even if you've identified yourself and gained access, that you are who you say you are and are doing what you should be doing.” https://www.wsj.com/... https://twitter.com/...
2022-09-25 View on X
Wall Street Journal

A look at some of the challenges of zero-trust, which creates friction for users and employees as businesses try to fight hackers; only 22% of companies use MFA

Hackers keep tricking employees to gain access to corporate networks, so companies are changing their approach to make it harder to wreak havoc once they're in Tweets: @divinetechy...

2022-09-24
Smart piece on #ZeroTrust by @mims: “The consistent theme is that every component of a system should be skeptical, even if you've identified yourself and gained access, that you are who you say you are and are doing what you should be doing.” https://www.wsj.com/... https://twitter.com/...
2022-09-24 View on X
Wall Street Journal

A look at some of the challenges of zero-trust systems that can create friction for users and employees, as businesses increasingly adopt them to fight hackers

Christopher Mims / Wall Street Journal :

2021-04-27
“Devices appeared at US facilities such as Fort Bragg... Fort Hood... or tiny desert outposts... before later traveling to the Lafarge Cement Factory in Northern Syria. They would reappear back in the US—often at private residences—presumably the homes of military personnel.” https://twitter.com/...
2021-04-27 View on X
Wall Street Journal

A look at the risks posed by data, including geolocation, harvested from common apps for phones belonging to US intelligence officers and military personnel

Apps show troop movements buried in data available for purchase: ‘a major risk to national security’

2020-12-20
“The attack blended extraordinarily stealthy tradecraft, using cyber tools never before seen in a previous attack, with a strategy that zeroed in on a weak link in the software supply chain that all U.S. businesses and government institutions rely on...” https://twitter.com/...
2020-12-20 View on X
Reuters

An analysis of publicly available web records shows SolarWinds hackers accessed the networks at Cox Communications and the local government in Pima County, AZ

including the highest reaches of the U.S. government — is certain of exactly what the hackers had infiltrated, let alone the full extent of what was taken. https://www.bloomberg.co...

“The attack blended extraordinarily stealthy tradecraft, using cyber tools never before seen in a previous attack, with a strategy that zeroed in on a weak link in the software supply chain that all U.S. businesses and government institutions rely on...” https://twitter.com/...
2020-12-20 View on X
Wired

Experts say the SolarWinds hack shows that the US still has no good answers to combat “supply chain” attacks, which are “ridiculously difficult” to detect

Despite years of warning, the US still has no good answer for the sort of “supply chain” attack that let Russia run wild.

2020-12-19
“The attack blended extraordinarily stealthy tradecraft, using cyber tools never before seen in a previous attack, with a strategy that zeroed in on a weak link in the software supply chain that all U.S. businesses and government institutions rely on...” https://twitter.com/...
2020-12-19 View on X
ZDNet

Microsoft says compromised SolarWinds apps were on its networks but that no customer data was stolen; it denies report hackers used its systems to attack others

Catalin Cimpanu / ZDNet :

“The attack blended extraordinarily stealthy tradecraft, using cyber tools never before seen in a previous attack, with a strategy that zeroed in on a weak link in the software supply chain that all U.S. businesses and government institutions rely on...” https://twitter.com/...
2020-12-19 View on X
Reuters

An analysis of publicly available web records shows SolarWinds hackers accessed the networks at Cox Communications and the local government in Pima County, AZ

LONDON (Reuters) - Suspected Russian hackers accessed the systems of a U.S. internet provider and a county government in Arizona …

2020-01-24
Brings to mind the old proverb: “if you owe the bank $1 million, that's your problem. If you owe the bank $1 billion, that's the bank's problem.” https://twitter.com/...
2020-01-24 View on X
ProPublica

Inside the IRS's probe into Facebook, including emails from 2008 where Sandberg and Ted Price, Facebook's head of tax, discuss tax havens for parking profits

The social media behemoth is about to face off with the tax agency in a rare trial to capture billions that the IRS thinks Facebook owes. Tweets: @mccarthyryanj , @stevecimino , @k...

2020-01-02
“The final tally of the Cloud Hopper campaign—both in the total potential access to networks and how much data China ultimately stole—remains unknown to researchers and Western officials.” https://www.wsj.com/...
2020-01-02 View on X
Fox Business

Report: Cloud Hopper, a hacking campaign by Chinese state-sponsored group APT10, was larger than previously thought and may have been active as late as Nov 2019

both in the total potential access to networks and how much data China ultimately stole—remains unknown to researchers and Western officials.” https://www.wsj.com/... Eric Garland ...

2020-01-01
“The final tally of the Cloud Hopper campaign—both in the total potential access to networks and how much data China ultimately stole—remains unknown to researchers and Western officials.” https://www.wsj.com/...
2020-01-01 View on X
Fox Business

WSJ: Cloud Hopper, a hacking campaign by Chinese state-sponsored group APT10, was larger than formerly known, and may have been active as late as November 2019

The hackers seemed to be everywhere.  —  In one of the largest-ever corporate espionage efforts, cyberattackers alleged … Source: Wall Street Journal .

2019-12-31
“The final tally of the Cloud Hopper campaign—both in the total potential access to networks and how much data China ultimately stole—remains unknown to researchers and Western officials.” https://www.wsj.com/...
2019-12-31 View on X
Fox Business

WSJ: Cloud Hopper, a hacking campaign by Chinese state-sponsored group APT10, was far bigger than formerly known, hitting 12+ cloud providers including IBM, HPE

The hackers seemed to be everywhere.  —  In one of the largest-ever corporate espionage efforts, cyberattackers alleged …