Hacked. Or, How to Become a Four-Star General

images?q=tbn:ANd9GcRDF4aWqyqWWlRZrQCjYq2_rOjJFbl0IE-7hzBhtYJm8stsARTX

Retired Gen. Keith Alexander is best known as the man at the center of the National Security Agency (NSA) metadata collection program, revealed by whistleblower Edward Snowden. Speaking at the RSA Conference on April 24, Alexander talked about his life after retiring from the NSA in 2014.

Alexander was onstage with Ted Schlein, partner at Kleiner Perkins Caufield & Byers, who asked the former director of the NSA how he became a four-star general. It was all due to a hack, Alexander said.

"Someone hacked into the Department of Defense [DoD] network," he said.

What had happened is that the NSA saw some information from the Department of Defense in foreign space where it should not have been.
"At the time, NSA was not able to look into the DoD network," Alexander recounted. "After 10 days, we were allowed in and found 1,500 pieces of malware."

Alexander said that the malware was discovered on a Friday afternoon and within 24 hours, a plan was put in place to correct the issues and build a better system. At the time, he said, Russia was blamed for the incident. As a result of that incident, US Cyber Command was formed, in June 2009, and Alexander got his fourth star.

There was also some discussion about Snowden. Alexander was asked by Schlein if he were to send Snowden a Christmas card, what would it say?

"I would send him the oath, the one he claims he took. Maybe he should have read it all," Alexander said as the audience broke into spontaneous applause.

While Alexander didn't provide full details on what his company is doing, he did outline the problem space and where IronNet Cyber Security fits in. Alexander said that visibility is important for IT security. As such, situational awareness is critical, and the ability to provide a way of seeing traffic at network speed is critical. The IronNet platform aims to help provide better visibility to help organizations defend their own networks, he said.
Eweek: http://bit.ly/1zjNtfv

« Disapproved: UK College of Policing Blacklists Former Officers for Data Misdeeds
Will Cyber Insurance Providers Reward Good Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.