Meet SenseCy at GovSec/Trexpo (May 13 – May 14, Walter E. Washington Convention Center, Washington, DC)

SenseCy will be present at GovSec/Trexpo (May 13 – May 14, Walter E. Washington Convention Center,  Washington, DC) at the Israeli Pavilion (#2223). Come by and learn about our Cyber Intelligence solutions.

Image

GovSec is the nation’s premier event for Government, Homeland Security, and Law Enforcement professionals looking for proven strategies and cost effective technology so they can achieve their mission of protecting our critical infrastructures, key assets, communities and the nation. GovSec features TREXPO,  the definitive law enforcement conference for tactical training, equipment, technology, and services for law enforcement which offers products that empower law enforcement to fulfill their role as the first line of defense against threats to their communities and agencies.

for registration see: http://govsecinfo.com/events/govsec-2014/home.aspx

SenseCy at the Defensive Cyberspace Operations & Intelligence (DCOI) Conference, Tel Aviv, April 8-9, 2014

We are proud to announce that SenseCy will be attending the DCOI Conference (Defensive Cyberspace Operations & Intelligence)!

Image

SenseCy CTO, Mr. Assaf Keren will be a panelist in a session discussing Cyber Intelligence, and we will host a two hour Seminar.

SenseCy Seminar will review the world of Cyber Intelligence and try to map which types of of data is available for companies and organizations that seek to defend themselves. We will do so utilizing real world intelligence collected and analyzed by SenseCy’s Cyber Intelligence analysts.  The seminar will be held on the second day of the conference (April, 9) at 14:00, at no extra cost. seats are limited so hurry and register!

For our friends and followers only – get a 20% discount off standard rate by using this coupon code: “944420” when registering.

RSA Wrap-up

Mark Twain once wrote that the coldest winter he’s had was a summer spent in San Francisco.

Good thing we came in the winter, and even better that we attended the annual RSA conference –  it was anything but cold. In fact, it was sizzling hot, almost to a boiling point when the water starts to bubble. In many ways the two adjacent, huge conference halls of the Moscone center felt like a giant pot left to boil and waiting to explode. Everyone who’s anyone was there, and then some hundred others you haven’t heard of. From the Industry Giants, who populated the north hall with huge booths, some two story tall, with the complimentary raffles (all offering mini iPads to the lucky winners) and booth babes, to modest small booths on the south side hosting some lesser-known start-ups company. The conference provided a terrific vantage point to view the current state of the industry. To summarize in one sentence – big and growing fast. This year’s expo was almost twice the size of last year’s, with close to 400 companies participating, many more companies “visiting” (or suitcasing) and thousands of visitors. And there is also great variety of products and offerings, almost to a point where the exhibition floor felt like a Middle Eastern bazaar… and the hustle bustle was not limited to the conference site, it was felt in a two miles’ radius, where every hotel, restaurant or bar was stuffed with RSA conference badge wearing folk, talking, having business meeting or just partying the night away.

Prior to the conference there was a bit of negative buzz and calls to boycott the conference due to RSA past involvement (according to Snowden) with the NSA, and some keynote speakers even cancelled their participation and opted to talk at a competing, non-mainstream event called Trustycon (also taking place at San Francisco at the same time). If people actually avoided the RSA due to this controversy, it went unnoticed – there were thousands of visitors who participated and enjoyed this event.

It was difficult, but we were able to identify several prominent trends from this mayhem.

Investment and Consolidation Craze

There’s definitely a feeling of “big fish eat little fish “, where entrepreneurs are being seduced by VCs, smaller companies being snatched by bigger ones, and medium companies being swallowed by the behemoth of the industry. Almost everyone we’ve talked to was either after raising some capital, after opening a US office or prior to meeting a potential investor. There’s some money on the floor and everybody wants a piece of the action. I attribute this both to the herd mentality of VCs (and investors alike), and the fact that in the last year the cyber security industry has become much more accessible to the general public in terms of understanding the needs and solution types required (some of which are yet to be developed).

Threat Intelligence and info Sharing Platforms

We should look outside and understand the type of threats which are out there. Also, information sharing would be a good idea. So why not combine the two an offer a platform where different threat information could be pushed and distributed to customers? Sounds almost obvious, but we are only now seeing a more mature view of the industry on what threat intelligence is and how it should be aggregated, filtered and disseminated.

Cloud

Sure, cloud is THE trendiest of them all. And with it come acute security challenges and possibilities. So there were many companies offering solutions for securing cloud applications, and, on the other hand, many offering cloud based security solutions.

Mobile

Again, not terribly difficult to predict that mobile and BYOD would be a hot topic. And there were myriad solutions for the mobile world. In fact, it has become almost impossible to distinguish between the different solutions, and too many companies appeared to be doing the exact same things. I assume it will take this segment of the industry several more years to reach maturity and allow clarity regarding solutions types and their merit (also safe to assume that mobile solutions companies will be quickly snatched by larger, more established companies to enrich their portfolio and provide a more holistic security approach to organizations).

Industry and US Centric

Kind of superfluous, but needs to be said – this event is very much industry centric, with few customers (or potential buyers) compared to industry participants. Also a very much US centric, which is not surprising, since the main bulk of the industry resides within the states. Notable non-US exhibitors were Germans and Chinese (each with a pavilion) and off course the Russian giant Kaspersky Lab (the only exception to this was the extremely high concentration of Israeli companies, which comprised a whopping 15-20% of exhibitors, and many of the visitors).

I hope these characteristics will erode over time, as the industry needs to open up more to the public and obviously there is a huge global market for cyber security solutions outside the states.

As for us, we did not invest in a booth but rather roamed the halls, trying to meet as many potential partners and sales channels. I gotta say we’ve met some terrific companies, some with very similar views to ours and hopefully we will be able to forge some alliances very soon and attack the US market.

And a final word- what was the greatest gadget on display? It was a small wooden box, semi analog and over 60 years old. Yes, there were two original Enigma deices on display, which attracted many more visitors to the booth displaying them (one of the belonged to the NSA) than any booth babe.

Enigma

SenseCy is Coming to RSA 2014 to Launch our Cyber Intelligence Portal

Hi All! We are very excited to announce that we are going to the RSA 2014 conference in San Francisco next week, to meet the industry’s brightest and launch our Cyber Intelligence Portal. SenseCy is focused on delivering effective cyber intelligence – our operation is based on strong OSINT and deep Virtual HUMINT capabilities, delivering actionable and relevant intelligence to our customers. Our new Cyber Intelligence Portal, currently in the Beta stages, supplies feed-based intelligence focused on hacktivism, cyber crime and cyber news.

The Hacktivism Feed is generated using our intimate knowledge of hacktivism and hacktivist groups. We are able to provide updates regarding global hacktivist operations, including time-sensitive alerts regarding planned activities (future “Ops”), current activities and traces of past activities (defacements).

Our Hacktivism Feeds include the following elements:

  • DDoS Alerts/Notices
  • Defacement Alerts/Notices
  • Campaign Alerts
  • Hacktivism Tools
  • Data Leakage Alerts
  • Group Alerts

Our Cybercrime Feed provides continual updates with regard to intent, trends and customer information or property being sold or distributed. Our analysts have successfully established the credibility of our virtual entities, resulting in their access to the most restricted underground areas.

The Cybercrime Feeds include the following elements:

  • Malware
  • Exploits/Vulnerabilities
  • Exposure of Client Data on the Underground
  • Certificates

The News Feed is the result of the work of SenseCy analysts, who continuously and meticulously collect information from a wide variety of sources, including cyber security blogs, professional forums and discussion groups, IT security vendor announcements, research papers and academic publications. This constant stream of information is automatically aggregated and then filtered by cyber security experts, to ensure that our clients receive only pertinent information and a concise news feed.

If you are interested in meeting us, or just chatting, drop us a line at info@sensecy.com

See you there!

Insights from the CyberTech 2014 Conference

It’s time to say congratulations – SenseCy was officially launched this week at the CyberTech 2014 Conference!

Our Website is online and registration to our News Feed and Intelligence Feeds is open; Visit us at www.sensecy.com

We had the pleasure of exhibiting at this conference, which brought together over 8,000 visitors from nearly 50 countries, and was sponsored by all the industry’s leading vendors. The event also hosted about 50 start-up companies and provided them with a platform to share their innovative products with would-be investors (as one foreign visitor told me – this was the highest concentration of IT Sec per square meter he has ever witnessed, and I tend to agree). We were even lucky enough to have our co-founder and VP Cyber Solutions Mr. Assaf Keren invited to speak at the main assembly about the recent breach of the IDF security systems.

Here are a few of my insights from this event:

  • The industry is trying to find next-generation solutions; almost every booth featured the word “New”, “Innovative” or “Next-Gen”. Other than the usual marketing hype, I perceive this as a genuine effort to try and create better, more holistic solutions, which stems from the realization that current solutions are lacking.
  • Creativity – this is especially true for the start-up scene, where dozens of start-ups are focusing on addressing problems in innovative ways, and creating solutions for problems that did not exist a year or two ago. It is too early to say which of these technologies will prevail, but looking at the recent funding some of these companies have received, it is a safe bet they will bring their products to the market very soon.
  • Need for PPP – the need for PPP (or Private Public Partnership, or at least collaboration) initiatives was never clearer than it is when discussing cybersecurity. It is blatantly obvious that governments cannot provide security for the business sector, but, throughout collaboration, they can assist this sector in being better prepared to mitigate evolving threats (through information sharing and joint development).
  • Need for intelligence – almost every speaker highlighted the need for better, timely intelligence. It is simply not possible anymore to rely on static defense without being aware of what the adversaries are planning and developing.

The one issue I found concerning was that this event (and many others like it, although for the most part participation was free of charge) was very much industry-inclusive, with insufficient public exposure and participation. Certainly, non-IT folks care  little about new malware detection tools, but they should care a great deal about the dangers that point-of-sale (POS) malware generate and should at least try to become more educated about these threats. Perhaps there is a need for other types of events where the general public feels more welcome to come and learn, and the industry should definitely embrace and promote this notion.

All in all, a great event and especially joyous for us here at SenseCy!