Author: Raj Samani

Raj Samani VP, CTO for EMEA, Intel Security Samani is Vice President, Chief Technical Officer for Intel Security in Europe, the Middle East, and Africa. He was previously the chief information security officer for a large public-sector organisation in the United Kingdom. Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. He was previously the vice president for communications in the ISSA UK Chapter, having presided over the award for Chapter communications programme of the year 2008 and 2009. Samani has published numerous security papers and has appeared on television (ITV and More4). He is the author of 'Applied Cyber Security and the Smart Grid'. He can be found on twitter @Raj_Samani.

In a live roundtable webcast yesterday, five Intel Security experts discussed predictions from the McAfee Labs 2016 Threats Predictions report, which was published at the end of last year. The webcast was moderated by Raj Samani, Intel Security VP & CTO. Raj was joined by Intel Security experts Bruce Snell, Security & Privacy Director, Matthew […]

This post was written by Raj Samani and Christiaan Beek of Intel Security. In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness for hours. Threat researchers soon confirmed that the BlackEnergy malware package, first developed in 2007, was the culprit. They also discovered that […]

This post was written by Raj Samani and Christiaan Beek of Intel Security, and Shane D. Shook, PhD. Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate providers, or to withdraw entirely from a […]

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without actually being an insider—all while […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]