article thumbnail

Symantec uncovered the link between China-Linked Thrip and Billbug groups

Security Affairs

The group has continued launching attacks against entities in Southeast Asia, including military, satellite communications, media and educational organizations. Billbug is a long-established espionage group, active since at least January 2009. Security experts at Symantec speculate that Thrip is a sub-group of Billbug.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Niels Provos, Head of Security Efficacy at Lacework Niels’ subsequent work included a stint as the Head of Security at payments startup Stripe.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

#ModernDataMasters: Carl Smith, PZ Cussons

Reltio

My dad was a military man – now retired – and a very practical, adaptable person. “I The CDO owns the data strategy – it’s the people who generate the data that are the ones that need to be educated. Most are not data-centric at all and although education is not formally under the CDO’s remit, it is something they need to push for.

article thumbnail

#ModernDataMasters: Carl Smith, PZ Cussons

Reltio

My dad was a military man – now retired – and a very practical, adaptable person. . The CDO owns the data strategy – it’s the people who generate the data that are the ones that need to be educated. It would be Cambridge University on 28 th June 2009 at about ten past twelve.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Not every application or network requires military-grade encryption – however, enterprise organizations can’t go wrong with the services offering the most strength. However, it wasn’t until 2009 that a graduate student published research on fully homomorphic encryption (FHE) and set off an exploration period.