As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation...
Hi, what are you looking for?
As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation...
The Spiegel reports that the cyber-attack against the half-state owned telecommunications provider Belgacom was an operation executed by the UK’s GCHQ, based on documents...
For many victims of an information security breach, prioritization of vulnerabilities becomes an act forced upon them a priori. “Ooops, that one was serious,...
In the weeks since the Mandiant APT1 Report was released, the conclusions presented by Mandiant have been extensively repeated and commented on by pretty...
European Aeronautic Defence and Space Company and ThyssenKrupp Breached, Germany Calls for Mandatory Breach Disclosure
The first two months of 2013 witnessed a level of escalation in cyber espionage and cyber exploitation incidents that few would have predicted or...
What would happen if Chinese or Russian agents were to conduct a covert operation, sabotaging America’s electricity grid using targeted bombs, leading to widespread...
Let He Who is Free of Vulnerabilities Cast the First Exploit.
The Greatest Problem With the Perception of Cyberwar is That it is a Separate Thing to Conventional Warfare. That is Just the Novelty Factor.
The Red Menace Blame Game - Why China is the World's Favorite Usual Suspect in Cyber Attacks
Last month, an (electronic) age old debate was rekindled by an article penned by Dave Aitel titled “Why you shouldn't train employees for security...
Like the Romans, We are Highly Trained and Hold Technological Superiority to Most of the Threats We Face, Yet We are Beaten by the...