IMPLEMENTING AN EFFECTIVE CYBERSECURITY STRATEGY

SIGNAL MAGAZINE - ERIC HIPKINS
SEP. 24, 2018

Responsive measures, definitions and diplomacy are crucial. Recently, Secretary of State Michael Pompeo, in response to Executive Order 13800, released recommendations to the President of the United States on the subject of cybersecurity. Included was an emphasis both on domestic policy and international cooperation to achieve several key diplomatic, military and economic goals. The specific […]

WELCOME TO CYBERIA

WORLD PIPELINES - GORDON COPE
SEP. 20, 2018

R9B COO, John Harbaugh, was recently featured in World Pipelines magazine.  The magazine is the leading international magazine for the oil and gas pipeline industry, covering all aspects of pipeline engineering, construction and maintenance. Download the document below to read the full interview.

ERIC HIPKINS INTERVIEWED IN 2019 TAG CYBER SECURITY ANNUAL INTERVIEWS WITH CYBER LUMINARIES

TAG CYBER - EDWARD AMOROSO
SEP. 19, 2018

Advanced Tools to Support the Hunt As cyberspace has emerged as the fifth domain of warfare, now with its own combatant command, addressing challenges has shifted. This is complicated by the crossover that exists between what might constitute an act of war and what is better classified as criminal activity. We are still on the […]

R9B NAMED A DISTINGUISHED VENDOR BY TAG CYBER IN ITS 2019 ANNUAL

SEP. 18, 2018

New York City, NY – Sept. 19, 2018 – R9B, a leading provider of advanced cybersecurity products, services, and training, is proud to announce its designation as a Distinguished Vendor in the upcoming 2019 TAG Cyber Security Annual. R9B joins a hand-selected group of the world’s leading cybersecurity technology companies, as chosen by Dr. Edward […]

R9B FEATURED IN HILL TIMES INSIDERS GUIDE

SEP. 17, 2018

R9B was featured in The Hill Times, a Canadian twice-weekly newspaper that covers Parliament, the federal government and federal politics.  Click here to see the full edition.

HAPPY INDEPENDENCE DAY, AMERICA!

Eric Hipkins
Jul. 4, 2018

Happy Independence Day, America! The Founding Fathers of the United States had more than rebellion in mind when they signed the Declaration of Independence. They wanted a better world for themselves, their families, and all those who would one day live under the banner of America. They built a country upon the assurance of rights […]

‘PREPARING THE BATTLEFIELD’: HACKERS IMPLANT DIGITAL GRENADES IN INDUSTRIAL NETWORKS

MCCLATCHY DC BUREAU - TIM JOHNSON
JUL. 3, 2018

The United States pioneered the use of cyberweapons when it shattered Iran’s nuclear centrifuges in 2010 but such devastating cyber tools have spread and are now boomeranging to make industrial digital sabotage a growing concern to the United States. The weapons can wreak destruction and kill people. Experts say cyber weapons can turn off power […]

R9B AWARDED TRAINING CONTRACT FOR U.S. ARMY WARRANT OFFICER ADVANCED COURSE

JUL. 2, 2018

Multiyear prime contract to deliver advanced cyber training fuels R9B’s expansion in the southern United States. COLORADO SPRINGS, Colo., July 2, 2018 /PRNewswire/ — R9B (root9B, LLC), a leading provider of advanced cybersecurity products, services, and training announced today that it was awarded a prime contract from the Mission and Installation Contracting Command – Fort Gordon, for development and […]

CONTROVERSIAL ‘HACK BACK’ DEBATE UNDECIDED AFTER NEW DETAILS

THE FIFTH DOMAIN - JUSTIN LYNCH
JUN. 28, 2018

When the cybersecurity firm Mandiant detected Chinese hackers were infiltrating networks of their clients sometime around 2013, the company did not stand idly by, according to a new book by David Sanger. In “The Perfect Weapon,” released June 19, the national security correspondent at The New York Times describes how Mandiant’s investigators “reached back through […]

CYBERSECURITY AND THE EVOLUTION OF MANAGED SECURITY SERVICES

AARON SHAHA
JUN. 20, 2018

What can cybersecurity learn from economics? Some might recognize the current skills gap as a product of demand outstripping supply. This is great news for the computer science major hoping to capitalize on years behind the keyboard. Less so for the chief information security officer (CISO) whose budget may not allow for extravagances like hiring […]

PART 1 – BEYOND THE BUZZ: ARTIFICIAL INTELLIGENCE AND CYBERSECURITY

MIKE MORRIS
MAY 25, 2018

Artificial intelligence (AI) is everywhere, but it seems everyone views it differently. To some, it harkens a new era in computing, business, and the very way people live their lives. To others, it is more a product of the Hollywood Hills than Silicon Valley. Movie studios have certainly done their part to imagine what a […]

CYBERSECURITY BUSINESS WITH SA OPERATIONS INVESTS IN AI

THE SAN ANTONIO BUSINESS JOURNAL - KRISTEN MOSBRUCKER
MAY. 16, 2018

A Colorado Springs-based cybersecurity company made a strategic investment in a collaboration with a business building artificial intelligence software. Root9b LLC, doing business as R9B, invested in Santa Monica, California-based Champion Technology Company Inc. The price of the deal was not disclosed. R9B expects to use the company’s product alongside R9B’s tools for real-time data […]

WHY R9B TAKES A PROACTIVE AND ‘ACTIVE ADVERSARY PURSUIT’ APPROACH TO CYBERSECURITY

THE TECH REPUBLIC - MICHAEL KASSNER
MAY. 11, 2018

Using passive technology is not enough to defeat cyberattackers, according to the experts at root9B (R9B)–active adversary pursuit is required. Military speak is no longer reserved for members of the world’s armed forces—terms like attack surface and kill chain are now being promoted by commercial cybersecurity experts with good reason. Simply put, very little—with the possible exception […]

R9B INTRODUCES ARTIFICIAL INTELLIGENCE-BASED EXPERT SYSTEM TO HUNT OPERATIONS

MAY. 7, 2018

R9B executes strategic partner investment and alliance with Champion Technology COLORADO SPRINGS, Colo., May 7, 2018 /PRNewswire/ — R9B (root9B, LLC), a leading provider of cybersecurity products and services, announced today a strategic partner investment into Champion Technology, the provider of a next-generation expert system and analytic platform, DarkLight®. The companies will form a technology partnership to leverage […]

PUTTING ARTIFICIAL INTELLIGENCE TO WORK TO ENHANCE CYBERSECURITY

MICHAEL MORRIS
MAY. 7, 2018

Across industry, existing defensive capabilities that rely on static automated sensors and log analysis are unable to detect malicious activity distributed across multiple devices and networks. Network defenders are stretched, having to recognize threats that have already penetrated the network perimeter as well as those crossing organizational boundaries. The challenge is compounded by the rapid […]

RISKY BIZ SOAP BOX: ROOT9B ON AGENTLESS THREAT HUNTING

PATRICK GRAY
MAY. 4, 2018

“Hey everyone and welcome to the Risky Biz Soap Box, the podcast where vendors pay us to tell you all about their stuff. This is basically the podcast series where we nerd out on stuff people have built.  It’s marketing for them, and on the listener side it’s really just designed to let you know […]

CYBERSECURITY TOOL TRACKS ADVERSARIES FASTER

THE NATIONAL DEFENSE MAGAZINE - VIVIENNE MACHI
MAY. 1, 2018

The Defense Department and other government agencies can now benefit from an updated cybersecurity platform that actively pursues adversaries within networks worldwide. R9B, a Colorado Springs, Colorado-based cybersecurity firm, recently released Orion 2.0, an upgrade to its current system which enables customers to rapidly reduce the average time to identify a network breach. The legacy […]

WHAT IS CRYPTO? PART 3: CRYPTO ASYMMETRY

MATT WEEKS | @SCRIPTJUNKIE1
APR. 24, 2018 | THE FRONT LINE

Previous: What is Crypto? Part 2: Secret Keys If you remember, all the types of cryptographic algorithms and modes discussed in the last post still assume that Alice and Bob first securely shared secret keys. Of course, it isn’t always practical in today’s world to expect people or businesses to first physically meet up to […]

HOTTEST CYBERSECURITY PRODUCTS AT RSA 2018

CSO ONLINE - PETER SAYER
APR. 17, 2018

Visitors to RSA, the world’s largest security conference held in San Francisco in April, can hear about the latest strategies for fighting cyberattacks. They can also check out the exhibition areas, where they can see the latest hardware and software to protect their valuable corporate assets. ORION 2.0 Key features: This agentless software suite provides […]

TECH SECURITY FIRM UNVEILS ‘HUNT’ ENHANCED PLATFORM INTEGRATED TO DHS CYBER SHARING SYSTEM

INSIDE CYBERSECURITY
APR. 12, 2018

Cybersecurity firm root9B has announced an updated software platform to enhance its “hunt” capabilities in pursuing cyber intruders, and will integrate with systems used by the Department of Homeland Security in sharing cyber-threat intelligence. “This version continues to leverage R9B’s real-world, operational expertise while introducing new and improved features to enhance the effectiveness of corporate […]

R9B TO LAUNCH ORION 2.0 AT RSA CONFERENCE 2018

APR. 12, 2018

Cybersecurity Platform Introduces New and Improved HUNT Capabilities COLORADO SPRINGS, Colo., April 12, 2018 /PRNewswire/ — R9B (root9B, LLC), a leading provider of advanced cybersecurity training, products, and services, announced today it will launch version 2.0 of its HUNT platform, ORION, during RSA Conference 2018.  This version continues to leverage R9B’s real-world, operational expertise while introducing new and […]

R9B HUNT PROOF OF VALUE

APR. 11, 2018

root9B (R9B) understands how cyber attackers identify and target their victims and know that traditional passive solutions are ineffective against resourced and motivated adversaries. There are weekly reports of businesses and government entities falling victim to devastating cyberattacks. Your business depends on maintaining the trust and security of your network and the information vital to […]

ORION VS CARBON BLACK’S CB RESPONSE

APR. 11, 2018

Cyber-based threats to sensitive data, intellectual property, and critical infrastructure continue to grow in number and disruptive potential. In order to stay ahead of hackers, criminals, and other adversaries, smart security professionals are increasingly adopting HUNT, a methodology for proactive threat detection and elimination. Calling on tactics, techniques, and procedures first developed in the US […]

DATA HANDLING FAQ

APR. 11, 2018

What type of data does ORION gather from my network? ORION routinely gathers metadata about your system, which can include: drivers, processes, netstat, system binaries, registry settings, and file names in Windows auto execution paths. Other data that may be gathered to confirm evidence of intrusion include: potentially malicious binaries, fi le names of certain […]

THIRD GAS PIPELINE DATA SYSTEM SHUTS A DAY AFTER CYBERATTACK

NAUREEN MALIK AND RYAN COLLINS
APR. 3, 2018

A third U.S. pipeline company reported its electronic system for communicating with customers has stopped working, a day after a cyberattack resulted in a similar shutdown. The Department of Homeland Security, which said Monday it’s gathering information about the potential intrusion, had no immediate comment on the latest shutdown. Tuesday’s closure affected Oneok Inc., which operates natural […]

R9B NAMES DOUG WILLIAMS EXECUTIVE VICE PRESIDENT OF PRODUCT DEVELOPMENT

MAR. 22, 2018

R9B Appoints Senior Researcher and Data Scientist to Support HUNT Market Momentum COLORADO SPRINGS, Colo., March 22, 2018 /PRNewswire/ — R9B (root9B, LLC), a leading provider of advanced cybersecurity managed services, technology and training for commercial and government clients, announced today Doug Williams is joining the company as executive vice president of product development. Doug will lead product development, quality […]

WHAT IS CRYPTO? PART 2: SECRET KEYS

MATT WEEKS | @SCRIPTJUNKIE1
MAR. 20, 2018 THE FRONT LINE

Previous: Part 1: What is Crypto? The last post introduced what crypto is at a high level. Now, let’s get into specifics. We will cover various types of encryption, including block ciphers and one-time pads. Block ciphers A block cipher is the basic unit of what’s called symmetric, or secret key, cryptography. It takes a […]

R9B’S ERIC HIPKINS AND MIKE MORRIS ACCEPTED INTO FORBES TECHNOLOGY COUNCIL

MAR. 20, 2018

Forbes Technology Council Is an Invitation-Only Community for World-Class CIOs, CTOs and Technology Executives. COLORADO SPRINGS, Colo., March 20, 2018 /PRNewswire/ — Eric Hipkins, chief executive officer, and Mike Morris, chief technology officer of R9B (root9B, LLC), have been accepted into the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives. Mr. Hipkins and Mr. Morris […]

TOOLS FOR THE CYBER HUNTER

ED AMOROSO
MAR. 6, 2018 | THE BOARDROOM

Just weeks after my first textbook on computer security was published in 1994, a far superior book emerged from two of my colleagues. Firewalls and Internet Security, by Bill Cheswick and Steve Bellovin was not only a more interesting work, but it was hatched from the trenches of a live gateway rather than from the safety […]

GTRI JOINS R9B PARTNER PROGRAM TO DELIVER SECURE CLOUD SOLUTIONS

MAR. 5, 2018

Partnership provides cloud-based cybersecurity solutions for government and business customers COLORADO SPRINGS, Colo., March 5, 2018 /PRNewswire/ — R9B (root9B, LLC), a leading provider of advanced cybersecurity technology, services, and training for commercial and government clients, announced today that GTRI, a Denver-based innovator in security and cloud solutions, has joined R9B’s Partner Program. GTRI will now offer R9B’s products […]

THREAT INTELLIGENCE: TAX RELATED CYBER SCAMS

FEB. 20, 2018 | THE FRONT LINE

The 2018 tax season is officially underway and so too are malicious hacking campaigns aimed at stealing your business’s sensitive tax-related data. R9B’s Vice President of Threat Intelligence, Keith Smith, sat down to highlight the threat of tax related scams using compromised business email accounts. He also offers some proactive steps your business can take […]

WHAT IS CRYPTO?

MATT WEEKS | @SCRIPTJUNKIE1
FEB. 15, 2018 | THE FRONT LINE

Are you a consumer who wants to make sure your personal data really is secure? Are you a developer who wants to secure data in a new app or other piece of software? Do you have an idea for a new kind of super-strong encryption you want to roll out? Are you thinking about shipping […]

THREAT INTELLIGENCE: CYBERATTACKS AND THE UTILITY INDUSTRY

FEB. 2, 2018 | THE FRONT LINE

CYBERATTACKS AND THE UTILITY INDUSTRY In 2010, the Bushehr Nuclear Plant in Iran came under a cyberattack involving the Stuxnet worm. Since that attack, government authorities are increasingly concerned about the security of Industrial Control Systems (ICS)1 and defense of their critical infrastructure. The consequences of a cyberattack against ICS systems could be devastating: potential of […]

3 EDUCATIONAL OFFERINGS UNIQUE TO COLORADO

CLARE MCCARTHY
JAN. 26, 2018

Twenty years ago, you could be forgiven for thinking everyone in Colorado worked in ranching, mining, or energy—historic pillars of the Centennial State’s economy. But Colorado’s job market has diversified significantly since Puff Daddy last dominated the Billboard charts. Our local universities have responded to this shift with programs designed for the state’s new (and […]

R9B EXPANDS EXECUTIVE TEAM

JAN. 24, 2018

COLORADO SPRINGS, Colo., Jan. 24, 2018 /PRNewswire-USNewswire/ — R9B (root9B, LLC), a leading provider of advanced cybersecurity products, services, and training, today announced two new additions to its executive team to meet the needs of the company’s growth. The additions to the R9B executive team include Steve Picot as Chief Revenue Officer, who will lead the company’s customer-facing and marketing […]

THE 4-1-1 ON CYBER INSURANCE

TIMES SQUARE CHRONICLES
JAN. 17, 2018

Even though the cybersecurity insurance market is barely 20 years old, cybersecurity insurance companies have already collectively grossed more than $2 billion in premiums. This implies both good news and bad news. The bad news is the demand for cybersecurity insurance demonstrates that hackers and data thieves are stepping up their game. Businesses and industries of […]

COLORADO SPRINGS CYBERSECURITY FIRM WINS CONTRACTS, PLANS EXPANSION

WAYNE HEILMAN
JAN. 13, 2018

The Gazette, a Colorado Springs publication, highlighted R9B’s recent contract wins and expansion plans. Read the article, here.

R9B AWARDED OVER $5.5M IN NEW GOVERNMENT AND COMMERCIAL CYBERSECURITY CONTRACTS DURING FOURTH QUARTER

JAN. 10, 2018

COLORADO SPRINGS, Colo., Jan. 10, 2018 /PRNewswire/ — R9B (root9B, LLC), a leading provider of advanced cybersecurity products, services, and training, announced today that during the last quarter of 2017 it received more than $5.5 million dollars in Government and Commercial contracts focused on providing HUNT and other advanced cybersecurity services both onsite and from the R9B Adversary Pursuit Centers […]

2018 TRAINING SCHEDULE

JAN. 3, 2018 | THE FRONT LINE

2018 Training Schedule Texas Adversary Tactics and Techniques Jan 8 – Feb 9 Mar 12 – Apr 13 Apr 23 – May 25 May 29 – Jun 29 Jul 30 – Aug 31 Oct 8 – Nov 9 Cyber Threat Intelligence Analysis Feb 12 – 16 Jul 16 – 20 Oct 1 – 5 HUNT Certification Courses Mar 12 – […]

Meet the Team: Keith Smith

DEC. 29, 2017 | THE FRONT LINE

One of the factors that sets r9B (root9B) apart is the talent the company has attracted. Keith Smith, Vice President of Threat Intelligence, sat down to answer a few questions and give some personal insight for this month’s “Meet the Team.” Like many of our team members, Keith spent much of his military career working […]

THREAT INTELLIGENCE: HOLIDAY SHOPPING SECURITY

DEC. 15, 2017 | THE FRONT LINE

IT’S THAT TIME OF YEAR…FOR CYBER SECURITY ARTICLES ON HOLIDAY SHOPPING! According to PwC’s annual Global State of Information Security Survey 2017, the retail and consumer sector suffered over 4,000 security incidents over the last year. SecurityScorecard’s analysis of the 50 least secure U.S. retail companies revealed that 30% of the bottom performers were clothing […]

R9B AWARDED SUBCONTRACT SUPPORTING UNITED STATES CYBER COMMAND (USCYBERCOM)

NOV. 16, 2017

Firm Awarded Multiple Contracts Since Becoming an Independent, Privately-Held Company in September Colorado Springs, CO, November 16, 2017 – R9B (root9B, LLC), a leading provider of advanced cybersecurity services and training for commercial and government clients, announced today that it has been awarded a subcontract from prime contractor Science Applications International Corp. (NYSE: SAIC) to […]

ROOT9B, LLC ACQUIRED BY TRACKER CAPITAL MANAGEMENT

SEP. 29, 2017

COLORADO SPRINGS, Colo., Sept. 28, 2017 /PRNewswire/ — root9B, LLC (“root9B”), a leading provider of advanced cybersecurity products, services, and training, has been acquired by an affiliate of Tracker Capital Management, LLC (“Tracker Capital”), an early stage investor focused principally on emerging technologies and companies with the potential to advance U.S. national security interests. root9B will now operate […]

PASSWORDS IN THE 21ST CENTURY

SAM BREJCHA | @SAMBREJCHA
AUG. 10, 2017 | THE FRONT LINE

At the end of my last post, I said my next topic would be event logs, but when I sat down to write, my brain said, “Nope! Try again next time!” So, I am going to delay that entry, and instead, I will discuss some rather unusual claims that Microsoft has made about passwords.1 In […]

THREAT INTELLIGENCE: HACKING MSPS TO TARGET PHARMACEUTICALS

JUL. 24, 2017 | THE FRONT LINE

PHARMA IS NOT IMMUNE TO NATION-STATE HACKING Cyberattacks against pharmaceutical companies go beyond downtime and lost revenue as corporate losses can result in lawsuits for breach of contract, result in the need to repeat clinical trials, and delay the release of new medicines. Nation-states are interested in pharmaceutical data to gain an edge in technology, […]

SHELLTEA + POSLURP MALWARE: YARA RULES

ROOT9B
JUN. 29, 2017 | THE FRONT LINE

MEMORY-RESIDENT POINT-OF-SALE MALWARE Retail Point-of-Sale (PoS) systems remain a top target for the financially-motivated hacker. Theft of payment card data in large volume exists not only as its own segment within financial crime, but also serves to facilitate other even more harmful motives of today’s criminal elements. To the businesses targeted by cyber criminals, the […]

THREAT INTELLIGENCE: TAILORED POINT-OF-SALE ATTACKS AGAINST THE RETAIL & HOSPITALITY INDUSTRIES

JUN. 28, 2017 | THE BOARDROOM

MADE TO ORDER: TAILORED POINT-OF-SALE ATTACKS IN RETAIL INDUSTRIES Since the 2013 Target breach that resulted in 40 million compromised cards, adversaries have adapted point-of-sale (PoS) attacks by finding more creative avenues of attack to overcome security protocols. Notable PoS attacks in 2016 included Cici’s Pizza, Wendy’s, Chipotle, Ruby Tuesday, and Baja Fresh. This suggests […]

ROOT9B REMAINS #1 ON CYBERSECURITY 500 FOR 6TH CONSECUTIVE QUARTER

JUN. 26, 2017

COLORADO SPRINGS, Colo., June 23, 2017 /PRNewswire/ — In response to remaining #1 on the Cybersecurity 500 for six consecutive quarters, root9B’s Chief Executive Officer Eric Hipkins issued the following statement: “root9B’s continued #1 presence on the Cybersecurity 500 is a direct reflection on the quality of our people, products, and services and we continue to be honored by this recognition. […]

ROOT9B RELEASES TECHNICAL ANALYSIS ON ACTIVE MALWARE CAMPAIGN AFTER BRIEFING LAW ENFORCEMENT

JUN. 22, 2017

Shelltea and PoSlurp; Advanced memory-resident malware targets Point-of-Sale systems; Will host Webinar Monday COLORADO SPRINGS, Colo., June 22, 2017 /PRNewswire/ — root9B, a root9B Holdings Inc. (NASDAQ:   RTNB) company, and leading provider of advanced cybersecurity products, services, and training, has released an in-depth technical analysis report on a newly identified active campaign targeting point-of-sale systems. The report provides technical details of the […]

SHELLTEA + POSLURP MALWARE

root9B
JUN. 19, 2017 | THE FRONT LINE

Retail Point-of-Sale (PoS) systems remain a top target for the financially-motivated hacker. Theft of payment card data in large volume exists not only as its own segment within financial crime, but also serves to facilitate other even more harmful motives of today’s criminal elements. To the businesses targeted by cyber criminals, the negative effects are […]

GENERAL MICHAEL HAYDEN JOINS ROOT9B ADVISORY BOARD

JUN. 6, 2017

COLORADO SPRINGS, Colo., June 6, 2017 /PRNewswire/ — root9B, a root9B Holdings, Inc. (NASDAQ:  RTNB) company and leading provider of advanced cybersecurity products and services, announced that General Michael Hayden has joined the company’s Advisory Board. General Hayden is a retired four-star general who served as director of the Central Intelligence Agency (2006-2009) and the National Security Agency (1999-2005). As head of the […]

LOCAL ADMINISTRATORS AND LAPS

SAM BREJCHA | @SAMBREJCHA
MAY. 19, 2017 | THE FRONT LINE

Last time, we discussed the importance and impact of User Rights Assignments on your network.  When coupled with a solid delegation model and group policy settings such as Restricted Groups, they can create a strong defensive posture for your network.  In this entry, I want to address the problem of local administrative accounts and Microsoft’s […]

MEET THE TEAM: JOHN HARBAUGH

APR. 24, 2017 | THE FRONT LINE

At root9B, the main differentiator is the talent that the company is able to attract. John Harbaugh, Chief Operating Officer, sat down to answer a few questions and give some personal insight for this month’s “Meet the Team.” As root9B’s Chief Operating Officer, John focuses on the execution of business. His goal? To make sure […]

ROOT9B ANNOUNCES RELEASE OF ORKOS 2.0 – CREDENTIAL RISK ASSESSMENT AND REMEDIATION SOLUTION

APR. 19, 2017

COLORADO SPRINGS, Colo., April 19, 2017 /PRNewswire/ — root9B, a root9B Holdings Inc. (NASDAQ:  RTNB) company and leading provider of advanced cybersecurity products and services, today announced the May 15th, 2017 release of ORKOS version 2.0. ORKOS is a unique solution that visualizes, scores, and provides recommendations for the credential and adversary lateral movement risks within network breaches. Stolen credentials and […]

5 WAYS TO KEEP VIRTUAL ASSISTANTS FROM SHARING YOUR COMPANY’S SECRETS

APR. 19, 2017

46Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees? Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious […]

ORION: DETECTING FILELESS MALWARE

MATTHEW WEEKS | @SCRIPTJUNKIE
APR. 17, 2017 | THE FRONT LINE

Adversaries are constantly improving their tradecraft and modifying cyber tactics, techniques, and procedures to avoid detection. They create malware to look like legitimate programs or libraries, often modifying existing trusted programs and libraries to add a small malicious component, or using trusted programs to execute malicious scripts. Many modern adversaries conduct intrusions without any malicious […]

USER RIGHTS ASSIGNMENTS

SAM BREJCHA | @SAMBREJCHA
APR. 11, 2017 | THE FRONT LINE

Last time, I talked about the importance and effects that Restricted Group settings can have on your network. Another powerful group policy setting that system administrators can employ is User Rights Assignments. What are User Rights Assignments?  These settings define who can log on to a system and what method they can use to log on. Most users […]

PROACTIVE CYBER DEFENSE: INNOVATION AND COLLABORATION

ERIC STRIDE | SVP | ROOT9B
MAR. 29, 2017 | THE FRONT LINE

Data breaches increased 40% in 2016 compared to 2015. Within that increase, 62% of breaches came from small and medium-sized businesses that weren’t properly protected or prepared for the breach. The attackers are getting more cunning in order to gain access to sensitive information. As the first quarter of 2017 draws to a close, we […]

EXPERTS: CYBERSECURITY IN CITY SET TO SURGE

MAR. 28, 2017

Colorado Springs ranks 16th nationally in the new Best Cities for Cybersecurity Professionals report, and experts say it is uniquely placed for a surge in growth and recognition as a cybersecurity hub. Personal finance website GoodCall.com analyzed data from 221 cities for the report, highlighting Colorado Springs’ excellent cybersecurity job prospects and desirable lifestyle — […]

ORKOS: PREVENTING THE 9 STEPS TO DOMAIN COLLAPSE

MATT WEEKS | @SCRIPTJUNKIE1
MAR. 9, 2017 | THE FRONT LINE

In a large organization, no matter how thorough the network security team, attackers will be able to compromise at least one server or workstation or user account. The greatest weakness of organizational networks remains internal weaknesses that allow an attacker who has compromised a single system or user to expand their reach and take over […]

ROOT9B GOES HUNTING FOR HACKERS

John P. Mello, Jr.
MAR. 8, 2017

Eric Hipkins is a bit of a contrarian. In an industry hot to automate every aspect of information security, the CEO of root9B is promoting a solution with flesh and blood at its core. Current thinking about securing networks embraces the idea of “defense in depth.” That calls for defenses to be layered. A firewall, for example, […]

ROOT9B REMAINS #1 ON THE CYBERSECURITY 500 FOR 5TH CONSECUTIVE QUARTER

MAR. 1, 2017

COLORADO SPRINGS, Colo., March 1, 2017 /PRNewswire/ — In response to remaining #1 on the Cybersecurity 500 for  Q1 2017, root9B’s Chief Executive Officer Eric Hipkins issued the following statement: “root9B is extremely proud to remain as the #1 company on the Cybersecurity 500 for the fifth consecutive quarter. Our team continues to set the standard in the Manned Information […]

NETWORK CREDENTIAL MANAGEMENT: RESTRICTING YOUR GROUP MEMBERSHIP

SAM BREJCHA | @SAMBREJCHA
FEB. 28, 2017 | THE FRONT LINE

In my last blog, I wrote about the purpose of formalizing a delegation model for your domain. Now, it is time to talk about how to enforce that model through technical configurations. Thankfully, it is not as complicated as you might think.  In this post, I will outline one of two specific group policy object […]

NETWORK CREDENTIAL MANAGEMENT: THE PYRAMIDS OF DELEGATION

BYSAM BREJCHA | @SAMBREJCHA
JAN. 17, 2017 | THE FRONT LINE

The Pyramids of Delegation Securing an enterprise against credential theft is, I believe, a painfully dull topic to discuss, yet I also believe this is one of cybersecurity’s most important subjects.  Delegation models lay the foundation of what permissions users should have and where those permissions are valid.  Instead of deploying the latest and greatest threat analytical platform […]

BANKING CIO OUTLOOK’S “BANKING COMPLIANCE, RISK, AND REGULATORY REQUIREMENTS: PLAYBOOK FOR THE ATTACKER”

Mike Morris, CTO, root9B
JAN. 16, 2017

The multitude of compliance, risk, and regulatory requirements for financial institutions continues to increase – leading to additional costs and complexities. Because of these costs, complexities, and often times organizational structure, it is extremely difficult to satisfy business operations, new security initiatives, and regulatory requirements. As a result, financial institutions, and organizations maintaining financial information, […]

WHERE TO GET A MASTER’S DEGREE IN CYBERSECURITY

JAN. 13, 2017

2017 list of universities that offer a Master of Science (M.S.) in cybersecurity A Master’s in cyber is attainable from a growing number of universities in the U.S. Robert Herjavec, founder of Herjavec Group, a leading information security firm and a Shark Investor on ABC’s Shark Tank, says “As an industry, cybersecurity presents incredible opportunity for […]

CYBERSECURITY COMPANY MOVES ITS HEADQUARTERS TO COLORADO SPRINGS

JAN. 10, 2017

Root9B LLC is sinking deeper roots in Colorado Springs as part of a corporate strategy of its parent company to narrow the company’s focus to cybersecurity by selling off subsidiaries in other industries. The Springs-based company employs 40 locally and 40 more at three other offices to provide cybersecurity services that include advanced vulnerability analysis, […]

CYBERATTACKS RAISE ALARM FOR U.S. POWER GRID

REBECCA SMITH
JAN. 5, 2017

Experts believe Russian hackers linked to the DNC breach are also behind attacks on utilities in Ukraine and U.S., leaving domestic power grid exposed Dec. 30, 2016 12:58 p.m. ET Cyberattacks that have knocked out electric utilities in Ukraine, including one suspected hack earlier this month, have renewed concern that computer criminals could take down […]

A BOLD APPROACH TO CYBER SECURITY

JAN. 4, 2017

root9B, a Colorado based cybersecurity firm, has devised a novel and bold countermeasure to cyber attackers. Called the HUNT technique, it monitors a client’s system from the inside following any adversary that breaks in. It proceeds undetected and sees what the attacker sees and can identify what the adversary is looking for. Root9B CEO Eric […]

3 TOP CYBERSECURITY NEWS STORIES OF 2016

JAN. 4, 2017

2016 was an interesting year for the cybersecurity market, and the three top cybersecurity stories of the year are indicative that investors remain interested in the industry. 1.  Top Cybersecurity Companies A perennial favourite for our readers, first up is Top Cybersecurity Companies, as according to Cybersecurity Ventures’ Cybersecurity 500 list. Unsurprisingly, this remains a hit, as our […]

MOVERS AND SHAKERS – 10 CYBER SECURITY FIRMS WORTH EXPLORING

Josh Hamilton
DEC. 28, 2016

Cyber Security Firms There are so many different options for cyber security for businesses, even wading through the CyberSecurity 500 is a daunting task. To that end we have assembled a list (in no particular order) of some of the leading cybersecurity firms around at the moment. These are some of the movers and shakers. The companies […]

EVIDENCE-BASED PASSWORD POLICIES

MATT WEEKS @SCRIPTJUNKIE1
DEC. 28, 2016 | THE FRONT LINE

The Communications of the ACM recently published a study on the efficacy of tactics for defending password-protected networks from guessing attacks. The authors discovered that “Enterprises that impose stringent password-composition policies appear to suffer the same fate as those that do not,” reaching three main conclusions: It has long been accepted that making users choose more complex […]

CYBERSECURITY IS A LEADING GLOBAL ISSUE. COLORADO’S GROWING CLUSTER AIMS TO PROVIDE SOLUTIONS

DEC. 22, 2016

“If you know your enemy and know your network, you need not fear the rest.” Those words adorn the wall at the Colorado Springs headquarters of root9B, where Colorado Governor John Hickenlooper on May 20, 2016, signed into law the Colorado Cybersecurity Initiative.  The day before, root9B was named No. 1 on Cybersecurity 500’s list of World’s […]

ROOT9B AND SAIC PARTNER TO OFFER ADVANCED CYBERSECURITY SIMULATION AND TRAINING

DEC. 20, 2016

COLORADO SPRINGS, Colo., Dec. 20, 2016 /PRNewswire/ — root9B, a root9B Holdings (OTCQB: RTNBD) company and leading provider of advanced cybersecurity products, services, and training is teaming with Science Applications International Corp. (NYSE: SAIC) to provide advanced cybersecurity training and simulation environments to government clients. As part of the agreement, root9B and SAIC will focus on redefining how organizations […]

ROOT9B AWARDED $4 MILLION MULTI-YEAR CYBERSECURITY CONTRACT WITH GLOBAL SECTOR LEADER

DEC. 15, 2016

COLORADO SPRINGS, Colo., Dec. 15, 2016 /PRNewswire/ — root9B, a root9B Holdings (OTCQB: RTNBD) company and leading provider of advanced cyber defense products, services, and training for commercial and government clients, announced today it has signed a multi-year agreement with a global sector leader. This partnership enhances the client’s existing cybersecurity environment to protect their critical global […]

HEAD ITALIA PARTNERS WITH ROOT9B TO PROVIDE CYBERSECURITY SOLUTIONS

DEC. 13, 2016

COLORADO SPRINGS, Colo., Dec.12, 2016 /PRNewswire/ — root9B, a root9B Holdings (OTCQB: RTNBD) company and leading provider of advanced cybersecurity products, services, and training announced today its partnership with Head Italia, specialized in the integration, sale, and technical support of advanced military systems. This partnership will provide Italian government and defense customers with cybersecurity solutions to protect […]

INTERNATIONAL LAW ENFORCEMENT STEPS UP BATTLE AGAINST ‘DARKNET’ IP THEFT

DEC. 7, 2016

17/11/2016 BY BRUCE GAIN FOR INTELLECTUAL PROPERTY WATCH A recent multinational crackdown on illegal activity in the anonymous channels of the socalled Darknet resulting in multiple arrests around the world was intended to thwart rampant online intellectual property theft. But how much the dragnet will help to thwart cybercrime in the future remains in question. […]

WHAT ALL OF US BLUE TEAMERS NEED TO DO

SAM BREJCHA | @SAMBREJCHA
DEC. 6, 2016 | THE FRONT LINE

Alright, so I lied in my last blog post. I said I was going to talk about delegation models in this post, and I know everyone has been hitting the refresh page on our website to see the article drop. After a lot of reflection and listening to talks on YouTube, I decided to switch […]

ROOT9B ANNOUNCES $790,000 CYBER DEFENSE CONTRACT EXTENSION WITH FORTUNE 500 COMPANY

NOV. 22, 2016

COLORADO SPRINGS, Colo., Nov. 22, 2016 /PRNewswire/ — root9B, a root9B Technologies Company (OTCQB: RTNB) and leading provider of advanced cyber defense operations, services, and products for commercial and government clients, announced today a contract extension with a Fortune 500 company.  This new contract extends root9B’s HUNT Operations through October 2017, with a value of more than $790,000. root9B will […]

THE TOP FIVE NAMES IN CYBERSECURITY

Steve C. Morgan
NOV. 21, 2016

Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies. http://www.cybersecurity500.com The Q4 2016 edition was just published by Cybersecurity Ventures. Going down the list, we take a look at the top five names from a branding and marketing perspective. Criteria for the top […]

ROOT9B REMAINS #1 ON THE CYBERSECURITY 500 FOR 4TH CONSECUTIVE QUARTER

NOV. 18, 2016

COLORADO SPRINGS, Colo., Nov. 17, 2016 /PRNewswire/ — In response to remaining #1 on the Cybersecurity 500 for Q4 and the entirety of 2016, root9B’s Chief Executive Officer Eric Hipkins issued the following statement: “The root9B team is very excited and humbled to be listed yet again as the #1 company on the Cybersecurity 500 for the 4th Quarter in a […]

PROTECTING AGAINST THE GROWING THREAT OF A CYBER BREACH

NOV. 17, 2016

U.S. companies are currently experiencing annual losses of more than $525 million due to cybercrime, with the majority of these losses stemming from malicious code and denial of service attacks. And the extent of cyberattacks is not confined to companies. The list of high profile CEOs whose accounts have been compromised this year is long. […]

BLOCKING LOCAL NETWORK HIJACKING ATTACKS

MATT WEEKS | @SCRIPTJUNKIE1
NOV. 17, 2016 | THE FRONT LINE

Adversaries who have compromised one system in a network frequently hijack the network traffic of other systems on the same subnet to intercept passwords, infect software downloads and updates, spy on browsing or email traffic, or launch other denial-of-service or man-in-the-middle attacks. The easiest and most common ways adversaries accomplish this is by responding to NetBIOS or LLMNRbroadcast […]

3 CYBERSECURITY CONCERNS IN MERGERS AND ACQUISITIONS

NOV. 14, 2016

Law360, New York (November 2, 2016, 11:51 AM EDT)—In a typical M&A transaction, the idea is to combine the strengths of the two entities while minimizing their combined liabilities, thus returning growth and profit to the shareholders. Company combinations can occur either as a purchase of the assets of the target company (asset sale) or […]

NETWORK CREDENTIAL MANAGEMENT – SO IT BEGINS…

SAM BREJCHA | @SAMBREJCHA
NOV. 2, 2016 | THE FRONT LINE

There is a lot of talk in the world today about the attacks that happen in corporate America. Most (if not all) of these events have involved adversaries stealing network credentials. When compromising a network, adversaries will use a combination of different stolen network accounts to gain deeper access into your domain. Let me illustrate […]

COLORADO SPRINGS COMPANY JOINS FORCES WITH ACADEMY TO COUNTER CYBERATTACKS

NOV. 1, 2016

Colorado Springs-based cybersecurity provider root9B announced Monday that it will work with the Air Force Academy to develop technology to counter cyberattacks. Under the agreement, root9B and the academy will create a research team to recognize and protect industrial control systems from threats and add to existing information on intrusion detection and protection for industrial […]

ROOT9B ANNOUNCES COLLABORATIVE EFFORT WITH UNITED STATES AIR FORCE ACADEMY

OCT. 24, 2016

COLORADO SPRINGS, Colo., Oct. 24, 2016 /PRNewswire/ — root9B, a root9B Technologies (OTCQB: RTNB) company and leading provider of advanced Cybersecurity products, services, and training for commercial and government clients, announced a collaborative effort with United States Air Force Academy (USAFA) to develop effective Intrusion Detection Tools for Industrial Control Systems (ICS).  Working with USAFA, root9B will advance the overall […]

ROOT9B AWARDED DEPARTMENT OF DEFENSE AND CRITICAL INFRASTRUCTURE CONTRACTS

OCT. 20, 2016

Ongoing Business Development Activities Yield More Than $12M in Contracts and Increased Industry Visibility COLORADO SPRINGS, Colo., Oct. 19, 2016 /PRNewswire/ — root9B, a root9B Technologies (OTCQB: RTNB) company, and leading provider of advanced cybersecurity products, services, and training, announced today that it has been awarded more than $750,000 in Department of Defense and commercial critical infrastructure contracts. The United […]

ROOT9B CEO ERIC HIPKINS JOINS CYBERSECURITY VENTURES BOARD OF ADVISORS

OCT. 20, 2016

COLORADO SPRINGS, Colo., Oct. 20, 2016 /PRNewswire/ — Eric Hipkins, Chief Executive Officer of root9B, a root9B Technologies (OTCQB: RTNB) company, has been named to the Board of Advisors of Cybersecurity Ventures, the world’s leading researcher and publisher of reports covering global cybercrime damage projections, cybersecurity spending forecasts, and cybersecurity employment figures.  Mr. Hipkins joins a Board that has extensive […]

Q&A WITH FOUNDER, CHAIRMAN AND CEO OF CYBER DEFENSE FIRM ROOT9B

MATTHEW WEEKS @SCRIPTJUNKIE
OCT. 20, 2016

The editors at Cybersecurity Ventures recently caught up with Eric Hipkins, Founder, Chairman and Chief Executive Officer at root9B, a rapidly expanding, publicly-traded cyber defense firm focused on advanced adversary pursuit — a.k.a. HUNT. Hipkins has served as CEO since May 2011. He has built a team of more than 50 tier-I Cyber Network Operators […]

INTERCEPTING PASSWORDS TO ESCALATE PRIVILEGES ON OS X

MATTHEW WEEKS @SCRIPTJUNKIE
OCT. 19, 2016 | THE FRONT LIN

A few weeks ago, a lot of attention was paid to Dropbox for “hacking” macs. Dropbox asked for your admin password when it was installed, then used that root access to enable privileges later even if you try to disable them. Despite the internet’s indignation and Dropbox’s impoliteness, Dropbox wasn’t exploiting any vulnerability or breaking any security […]

ROOT9B ANNOUNCES LAUNCH OF CYBER HUNT CERTIFICATION FOR COMMERCIAL SECTOR

JUN. 13, 2016

COLORADO SPRINGS, Colo., May 25, 2016 /PRNewswire/ — root9B, a root9B Technologies (OTCQB: RTNB) company, and leading provider of advanced cybersecurity services and training to commercial and government clients, announced today the launch of its HUNT Certification offerings in New York City and Charlotte, NC. The initial courses are scheduled for this summer at the NASDAQ […]

HUNT: SECURING THE COMMERCIAL SECTOR SINCE 2013

ERIC HIPKINS, JOHN HARBAUGH, MICHAEL MORRIS & DAVID AUCSMITH
MAY. 25, 2016 | HUNT OPS

“As the organization that first introduced proactive HUNT operations to the commercial space in 2013, root9B has developed and refined its proprietary capabilities and methodologies to create the necessary shift from the current dependence on automated passive technologies.” The current approach of cybersecurity is not working. This has been made abundantly clear by the media […]

ROOT9B REMAINS #1 ON CYBERSECURITY 500

MAY. 19, 2016

For the 2nd consecutive quarter root9B remains #1 on Cybersecurity 500’s World’s Hottest Security Companies. “It’s an honor to be #1 on the Cybersecurity 500 for the 2nd straight quarter,” said Chief Executive Officer Eric Hipkins. “Cybersecurity Ventures does an exceptional job at analyzing the companies involved in this important space and providing a road map for organizations needing cybersecurity services.” Read […]

COLORADO SPRINGS, HUB OF CYBERSECURITY INDUSTRY

APR. 12, 2016

root9B was featured in The Gazette’s series on Colorado Springs and its emergence as both the cybersecurity capital in the country, as well as being a key player on a global scale. Read more on why the city is becoming a hub for the industry.

COLORADO SPRINGS COMPANY NAMED WORLD’S TOP CYBERSECURITY COMPANY

JAN. 28, 2016

The Gazette, a Colorado Springs publication, highlighted root9B’s recent recognition as the world’s top provider of cybersecurity services by Cybersecurity Ventures. Read the article, here.

‘PATRIOTIC HACKERS’ ATTACKING ON BEHALF OF MOTHER RUSSIA

JAN. 27, 2016

root9B’s vice president of threat intelligence, Keith Smith, offered his opinion to Fox News on the subject of a cybersecurity proxy war, pitting numerous foreign institutions against Russian-speaking cyber militias. Read the full article, here.

ROOT9B OPENS FIRST ADVERSARY PURSUIT CENTER IN SAN ANTONIO

JAN. 22, 2016

Earlier this week root9B opened its first Adversary Pursuit Center at the Tower Life Building in San Antonio, TX where the company’s network defense operations center will also be housed. Read more about our future plans in the building, here.

ROOT9B MOVES TO #1 ON THE CYBERSECURITY 500 LIST FOR 2016

JAN. 19, 2016

COLORADO SPRINGS, Colo., Jan. 19, 2016 /PRNewswire/ — root9B, a root9B Technologies Company (OTCQB: RTNB) and leading provider of advanced cybersecurity services and training for corporate and government clients, has moved to the Number One position on the Cybersecurity 500 ranking of the world’s hottest and most innovative cybersecurity companies for 2016. The Cybersecurity 500 is a global […]

ROOT9B SIGNS COLLABORATIVE RESEARCH AND DEVELOPMENT AGREEMENT WITH DEPARTMENT OF HOMELAND SECURITY

JAN. 11, 2016

COLORADO SPRINGS, Colo., Jan. 11, 2016 /PRNewswire/ — root9B, a root9B Technologies Company (OTCQB: RTNB) and a leading provider of advanced cybersecurity services and training for commercial and government clients, announced today it has signed a Collaborative Research and Development Agreement (CRADA) with the Department of Homeland Security (DHS). Under this agreement, root9B will work with DHS to […]

INTRODUCING ORKOS BY ROOT9B: ASSESSING CREDENTIAL RISKS & LATERAL MOVEMENT – CLOSING THE GAP IN SECURITY PROGRAMS

JAN. 8, 2016

What tactic is used to compromise computers more often than any other in a network breach? Stolen credentials and lateral movement. Remote exploits are rarely seen today; instead most attackers rely on social engineering – they trick a user into helping them break into a system. Once there, the attacker then steals the user’s credentials […]

ROOT9B AWARDED UNIVERSITY OF WASHINGTON CYBERSECURITY SERVICES CONTRACT

DEC. 11, 2015

Colorado Springs, CO, December 10, 2015 – root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients announced today that it has been awarded a cybersecurity services contract by the University of Washington (UW).  The award is a three (3) year agreement with an option […]

ORKOS WEBINAR: CLOSING THE GAP IN SECURITY PROGRAMS

DEC. 7, 2015

Introducing Orkos by root9B: Assessing Credential Risks & Lateral Movement – Closing the Gap in Security Programs. occurs several times. Please register for the date and time that works best for you: https://attendee.gotowebinar.com/rt/1724098374705319682 What tactic is used to compromise computers more often than any other in a network breach? Stolen credentials and lateral movement. Remote […]

ROOT9B AWARDED SUBCONTRACT SUPPORTING DEFENSE ADVANCED RESEARCH PROJECT AGENCY (DARPA) INFORMATION INNOVATION OFFICE (I2O)

NOV. 25, 2015

Colorado Springs, CO, (November 23, 2015) – root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients announced today that it has been awarded a subcontract from prime contractor Boston Fusion Corp. The contract, sponsored by the Air Force Research Laboratory (AFRL) and the Defense […]

ROOT9B AWARDED NORTH CAROLINA STATEWIDE SECURITY ASSESSMENT SERVICES CONTRACT

NOV. 2, 2015

Colorado Springs, CO, (November 2, 2015) – root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients, announced today that it has been selected to participate in the North Carolina Statewide Security Assessment Services Contract (918a) for future Statements of Work. The award will be […]

ROOT9B SELECTED AS FINALIST FOR 2015 DEFENSE INNOVATION TECHNOLOGY ACCELERATION CHALLENGE (DITAC)

OCT. 30, 2015

Colorado Springs, CO, (October 29, 2015) – root9B, a root9B Technologies Company (OTCQB: RTNB), and leading provider of advanced cybersecurity products and services for commercial and government clients, has been selected as a 2015 Defense Innovation Technology Acceleration Challenges (DITAC) Finalist. DITAC 2015, which takes place in Austin, Texas, is a summit that connects the […]

ROOT9B FEATURED ON CBS THIS MORNING TO EXPLAIN “HUNT” STRATEGY

OCT. 26, 2015

root9b’s Eric Hipkins, John Harbaugh, and Mike Morris, were recently featured on CBS This Morning to discuss root9b’s unique “Hunt” cyber capabilities. CBS sat down with root9b to get a behind-the-scenes glimpse of how the cybersecurity company hunts down the adversary with footage and interviews from root9B’s headquarters in Colorado Springs. Watch the video here.

LIVE WEBINAR: ORKOS, ROOT9B’S NEWEST CREDENTIAL ASSESSMENT PRODUCT

October 19 or October 23

What are a few of network hackers’ favorite things? Stealing credentials and lateral movement, to name two – tactics that make compromising networks and systems a breeze. Remote exploits are rarely seen today; instead, most attackers rely on social engineering – tricking a user into helping them break into a system. Once there, the attacker […]

ROOT9B ANNOUNCES RELEASE OF ORKOS – CREDENTIAL RISK ASSESSMENT AND REMEDIATION SOLUTION

OCT. 15, 2015

COLORADO SPRINGS, Colo. (Oct. 15, 2015) — root9B, a root9B Technologies (OTCQB: RTNB) company, and leading provider of advanced cybersecurity services and training for commercial and government clients, today announced that its new Credential Risk Assessment and Remediation Solution, ORKOS, will be released later this month. ORKOS is a unique solution that combats the risk of credential theft and […]

THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION (NERC) ANNUAL GRID SECURITY CONFERENCE 2015

OCT. 13, 2015 | PHILADELPHIA, PA

This fall root9B will be attending and presenting at the 5th annual North American Electric Reliability Corporation (NERC) Grid Security Conference held at the Hilton Regency at Penn’s Landing in Philadelphia, PA from October 13th through October 16th, 2015. The conference, dubbed GridSecCon, series brings together cybersecurity and physical security experts from industry and government […]

ROOT9B BREAKS TOP 25 ON THE CYBERSECURITY 500 LIST

OCT. 13, 2015

COLORADO SPRINGS, Colo. (Oct. 12, 2015) —  root9B, a leading provider of advanced cybersecurity services and tailored active defense capabilities, is now listed as #22 in the Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. root9B is a root9B Technologies company (OTCQB: RTNB). “root9B is paving the way for […]

ROOT9B JOINS THE RETAIL CYBER INTELLIGENCE SHARING CENTER

OCT. 6, 2015

COLORADO SPRINGS, Colo., (Oct. 5, 2015) – root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients, announced today it has joined the Retail Cyber Intelligence Sharing Center (R-CISC) as a Supporting Associate.  The R-CISC, created by retailers in response to the increased number and sophistication of […]

ROOT9B ANNOUNCES OPENING OF ADVERSARY PURSUIT CENTER OFFERING 24/7/365 CYBER DEFENSE CAPABILITIES

Colorado Springs, CO, (September 21, 2015) – root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients,  today announced that its state-of-the-art Adversary Pursuit Center (APC) is completed and servicing clients. The APC will serve as the nerve center of root9B’s manned cyber security HUNT […]

GENERALS HILL, HAWKINS AND WOOTON JOIN ROOT9B ADVISORY BOARD; SENIOR NATIONAL CYBER EXPERTS JOIN ROOT9B STAFF

SEP. 28, 2015

COLORADO SPRINGS, Colo., (Sept. 28, 2015) – root9B today announced the appointment of three decorated military leaders as new members of its Advisory Board. root9B, a root9B Technologies Company (OTCQB: RTNB), is a leading provider of advanced cybersecurity services and training for commercial and government clients. Joining the root9B Advisory Board are: Gen. James T Hill (Army), […]

MATT WEEKS TO PRESENT AT DERBYCON 5.0 ON CREDENTIAL ASSESSMENT PRIVILEGE ESCALATION AT SCALE

SEP. 26, 2015 | LOUISVILLE, KY

On September 26, root9b’s Matt “sciptjunkie” Weeks will be presenting a talk on “Credential Assessment: Mapping Privilege Escalation at Scale” at DerbyCon in Louisville, Kentucky. DerbyCon is in its fifth year and is a three-day conference for security professionals, running September 25-27, 2015. The theme for this year’s DerbyCon is “Unity.” Weeks’ talk will discuss […]

ROOT9B CTO MIKE MORRIS TALKS TO GLOBAL FINANCE ABOUT THE WAR ON DIGITAL ATTACKERS

SEP. 21, 2015

At this point, it’s pretty much assumed that hackers are going to break into corporate computer networks. Global Finance talked with Michael Morris, chief Technology Officer of root9B, which offers cybersecurity services to corporate and government entities, about the war on digital attackers—and how businesses can retake some ground. Read the interview here.

ROOT9B’S NEW VIDEO—LET THERE BE DARKNESS

SEP. 21, 2015

root9B’s new video depicts the threat imposed when the most skilled cyber adversary in the world penetrates your veil of darkness. Watch it here.

TIME WARNER CABLE FEATURES ROOT9B SAN ANTONIO EXPANSION PLANS IN NEW VIDEO

AUG. 21, 2015

root9B was recently featured in a Time Warner Cable San Antonio news segment on the growing technology and cyber boom in the region and root9B’s aggressive expansion and facility in the Historic Tower Life Building. Senior Vice President Scott Myers is featured as part of the segment with discussion of the strategic location of San […]

TECHNICAL FOLLOW UP – APT28 MALWARE ANALYSIS

AUG. 20, 2015

In May 2015, root9B released an APT28 Threat Defiance report (1) detailing pre-event indicators and threat information regarding a pending attack on several entities. This follow-up report is focused on providing additional insight and technical analysis of a malware sample that was originally reported. Approximately 45 days after the release of the root9B report, Netzpolitik released a […]

ANNOUNCING A ROOT9B STRATEGIC COMMUNICATIONS PARTNERSHIP WITH ADG CREATIVE

JUL. 15, 2015

root9B announces that Columbia, MD-based ADG Creative has been selected as our agency of record, a partnership that will add tremendous value to our strategic communications initiatives. Read the press release here.

ROOT9B ANNOUNCES FIRST-OF-ITS-KIND ADVERSARY PURSUIT CENTER (APC)

JUN. 25, 2015

Designed from the ground up as an unparalleled space for 24/7 manned cyber operations,root9B’s Adversary Pursuit Center (APC) nears completion this July. The APC is a significant venture pairing sophisticated technical capabilities with a rapid build out. The APC will serve as the nerve center of root9B’s manned cyber security HUNT operations, creating an always-on […]

ROOT9B COO JOHN HARBAUGH TALKS RUSSIAN HACK PRE-DISCOVERY ON FOX BUSINESS

JUN. 3, 2015

root9B COO John Harbaugh and root9B Technologies CEO Joe Grano were recently featured on Fox Business with Neil Cavuto discussing the recent Russian hacking pre-discovery aimed at a variety of banks. The segment, which originally aired May 14, comes on the heels of root9B’s announcement of discovering and thwarting the hack aimed at US and […]

ROOT9B UNCOVERS PLANNED SOFACY CYBER ATTACK TARGETING SEVERAL INTERNATIONAL AND DOMESTIC FINANCIAL INSTITUTIONS

JUN. 3, 2015

root9B, a root9B Technologies company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients, announced today that it had uncovered plans by the Sofacy group (APT28), a known Russian hacking organization, to target several international financial institutions. While performing surveillance for a root9B client, the company discovered malware […]

ROOT9B ENTERS INTO STRATEGIC CYBER DEFENSE CONTRACT WITH FORTUNE 500 COMPANY

JUN. 3, 2015

root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced active cyber defense operations, cybersecurity services, and training for commercial and government clients, announced today it has entered into an agreement with a Fortune 500 company to enhance the company’s network security posture. root9B will actively identify, mitigate, and eradicate advanced cyber actors […]

ROOT9B SURGES TO #45 ON THE CYBERSECURITY 500

JUN. 3, 2015

root9B, a leading provider of advanced cybersecurity services and tailored active defense capabilities, has been moved from #216 to #45 on the Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch. The company was previously covered in the Cybersecurity Ventures Q2 Market Report. root9B is a root9B Technologies company (OTCBB: RTNB). “root9B […]

ROOT9B ANNOUNCES DEVELOPMENT OF FIRST-EVER CREDENTIAL RISK ASSESSMENT AND REMEDIATION SOLUTION

JUN. 3, 2015

root9B, a leading provider of advanced cybersecurity services and tailored active defense capabilities, announced today the development of Orkos, a revolutionary product to identify critical credential theft risks in organizational networks. root9B is a root9B Technologies company (OTCMKTS: RTNB). Major network breaches follow a pattern of three phases – attackers first exploit a vulnerable system; […]

IMPRIMIS, INC. AND ROOT9B AWARDED A $1.7M NORTHCOM INDUSTRIAL CONTROL SYSTEM CYBERSECURITY CONTRACT

JUN. 3, 2015

NORAD-USNORTHCOM is the sponsoring defense agency for a $1.7M award through the Department of Defense Rapid Innovation Fund Program for an industrial control cyber security system to Imprimis, Inc. and root9B, a root9B Technologies Company (OTCQB: RTNB). Imprimis, Inc. (i2) has partnered with root9B to develop an advanced network Intrusion Detection System (IDS) designed to optimize Industrial […]

DETECTING ADVANCED THREATS WITH SYSMON, WEF, AND ELASTICSEARCH

JOSH LEWIS | THE FRONT LINE
JUN. 3, 2015

From an advanced threat detection perspective, most analysts are relatively blind at the host level until they receive network telemetry or a security agent alert (Anti-Virus/HIPS). Based on my experience, network telemetry data is typically collected at network egress points and Anti-Virus/HIPS is poor at detecting pivot and memory based attacks. One approach to overcome […]

ATTACKING WINDOWS FALLBACK AUTHENTICATION

MATT WEEKS | THE FRONT LINE
JUN. 3, 2015

BACKGROUND – KERBEROS AND NTLM On a Windows domain, users authenticate to resources like file shares using the Kerberos protocol by default. Older versions of Windows defaulted to the NTLM protocol, which is still enabled on newer systems (in the updated NTLMv2 form), but only used by default when accessing a non-domain resource, or accessing […]

IS YOUR INITIAL ROOT FILESYSTEM SAFE? INITRD-BASED ROOTKITS

ERIC FLEMING | THE FRONT LINE
JUN. 3, 2015

The initrd (initial ramdisk) is an initial temporary root file system that is mounted prior to the real root file system. When the initrd is mounted, it presents an opportunity for programs to be executed from it.  Afterwards, a new root file system can be mounted from a different device.  The previous root (from initrd) […]

MEET ORION THE HUNTER, ROOT9B’S NEWEST CYBER WARRIOR

JOHN HARBAUGH
JUN. 3, 2015 | HUNT OPS

root9B recently announced the launch of proprietary cybersecurity active adversary pursuit platform, ORION. Named after none other than the famous huntsman from Greek Mythology, the ORION platform is the bleeding edge of manned hunt operations in cyberspace. The system is a tailored cybersecurity product suite that provides cyber defense operators with an agile remote-access capability […]

AIR FORCE AWARDS ROOT9B APPLIED CYBER OPERATIONS TRAINING CONTRACT

MAR. 23, 2016

A cyber operations training contract was granted to root9B by the United States Air Force, a four-year Blanket Purchase Agreement (BPA) with an estimated value of $5.3 million. Read more about the contract on Yahoo Finance.

CYBERSECURITY – GROWING AN ECOSYSTEM

DENVER, CO
EVENT ON APR. 19, 2016

Join us at the University of Denver for Project X-ite, where innovation, technology and entrepreneurship intersect. Led by the deans of three of the University’s schools and colleges, as well as a working group of academic and industry leaders, root9B’s Eric Hipkins will be on the panel. The half-day event will cover a broad range of critical topics on […]