01. Michael Gough, Malware Archaeology, visits theCUBE!. (00:20)
02. The Industry of Hacking. (00:55)
03. The Problem of Malware on Mobile. (02:28)
04. Looking at Windows Logging. (04:04)
05. The Myth of "Sophisticated" Malware. (06:00)
06. How Splunk Relates to Investigating Hacking. (08:42)
07. Data Science Students Focused on Security. (09:30)
08. A Plug For Students Interested in Security. (12:15)
#theCUBE #Splunk #SplunkConf #SiliconANGLE #Security
--- ---
Malware archaeologist to industry: ‘Enable and configure’ #splunkconf
by Marlene Den Bleyker | Sep 24, 2015
Where do you turn when you have a security breach? To a malware archaeologist, of course. Michael Gough, founder of Malware Archaeology, LLC, is a malware archeologist who researches hacker attacks by reviewing log cases, or as he puts it: looks for a needle in a haystack.
Gough sat down with John Furrier, cohost of theCUBE, from the SiliconANGLE Media team, at Splunk .conf 2015 at the MGM Grand in Las Vegas to discuss cybersecurity.
Protect and defend
According to Gough, “You have to know what you are protecting. You can’t have security unless you know what to protect.” He went on to say companies should treat the cloud no differently than any other server.
He also feels industry standards do not go far enough. He said, “We need to look at logging and configuring the end point better than we are doing now.” But his message to all is enable and configure.
The next generation of defenders
Gough believes that there is a lack of cybersecurity experts. He tells the industry that there is a need for education in the field and that the community needs to reach children. “I recommend that kids should talk to teachers and invite ‘white hat’ hackers to speak at schools. We need to reach out to kids and get them excited,” he said.
@theCUBE
#splunkconf
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2015 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Splunk.conf 2015 | Las Vegas
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Splunk.conf 2015 | Las Vegas.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2015 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Splunk.conf 2015 | Las Vegas
Please sign in with LinkedIn to continue to Splunk.conf 2015 | Las Vegas. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Michael Gough, Malware Archaeology | Splunk .conf2015
01. Michael Gough, Malware Archaeology, visits theCUBE!. (00:20)
02. The Industry of Hacking. (00:55)
03. The Problem of Malware on Mobile. (02:28)
04. Looking at Windows Logging. (04:04)
05. The Myth of "Sophisticated" Malware. (06:00)
06. How Splunk Relates to Investigating Hacking. (08:42)
07. Data Science Students Focused on Security. (09:30)
08. A Plug For Students Interested in Security. (12:15)
#theCUBE #Splunk #SplunkConf #SiliconANGLE #Security
--- ---
Malware archaeologist to industry: ‘Enable and configure’ #splunkconf
by Marlene Den Bleyker | Sep 24, 2015
Where do you turn when you have a security breach? To a malware archaeologist, of course. Michael Gough, founder of Malware Archaeology, LLC, is a malware archeologist who researches hacker attacks by reviewing log cases, or as he puts it: looks for a needle in a haystack.
Gough sat down with John Furrier, cohost of theCUBE, from the SiliconANGLE Media team, at Splunk .conf 2015 at the MGM Grand in Las Vegas to discuss cybersecurity.
Protect and defend
According to Gough, “You have to know what you are protecting. You can’t have security unless you know what to protect.” He went on to say companies should treat the cloud no differently than any other server.
He also feels industry standards do not go far enough. He said, “We need to look at logging and configuring the end point better than we are doing now.” But his message to all is enable and configure.
The next generation of defenders
Gough believes that there is a lack of cybersecurity experts. He tells the industry that there is a need for education in the field and that the community needs to reach children. “I recommend that kids should talk to teachers and invite ‘white hat’ hackers to speak at schools. We need to reach out to kids and get them excited,” he said.
@theCUBE
#splunkconf