Author: Raj Samani

Raj Samani VP, CTO for EMEA, Intel Security Samani is Vice President, Chief Technical Officer for Intel Security in Europe, the Middle East, and Africa. He was previously the chief information security officer for a large public-sector organisation in the United Kingdom. Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. He was previously the vice president for communications in the ISSA UK Chapter, having presided over the award for Chapter communications programme of the year 2008 and 2009. Samani has published numerous security papers and has appeared on television (ITV and More4). Samani is the author of 'Applied Cyber Security and the Smart Grid.' He can be found on twitter @Raj_Samani.

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without actually being an insider—all while […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]

How to make sense of the market for stolen information. Personal data about you, me, and, most importantly, your customers is being openly sold via online marketplaces. Stolen data has become a mature commodity market, not unlike oil or metals, with supply-driven price fluctuations, different qualities of product, and a range of values and scarcities. […]

That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in the theft of terabytes worth of data. Actually, the exact words were “So we’ve been hacked, eh? Well, it’s Friday afternoon now so I […]

A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal. Corporate cyberespionage made the front page yesterday with the news of Morpho, also known as Wild Neutron. Regardless of what you call it, these revelations were the latest reminder of the growing […]