Cyber
41 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Wojciech Filipkowski from National Security Issues
Scoop.it!

Global Civilization and Counterterrorism | Combating Terrorism Center at West Point


Via ArthurGPeterson
more...
ArthurGPeterson's curator insight, July 30, 2015 12:05 AM

Some deep thoughts on the nature of global security and societal disruption.

Scooped by Wojciech Filipkowski
Scoop.it!

Identifying back doors, attack points, and surveillance mechanisms in iOS devices

more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Cyber-security White hats to the rescue - The Economist

Cyber-security White hats to the rescue - The Economist | Cyber | Scoop.it
Cyber-security White hats to the rescue The Economist A “white hat” hacker in techie jargon, Mr Whitaker leads a team of security specialists at Knowledge Consulting Group who spend their days trying to worm their way into clients' computer systems...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Russia, China the most dangerous countries for mobile cyber attacks - Sydney Morning Herald

Russia, China the most dangerous countries for mobile cyber attacks - Sydney Morning Herald | Cyber | Scoop.it
Russia, China the most dangerous countries for mobile cyber attacks Sydney Morning Herald In news accounts of cyber attacks plaguing computer networks around the world, the bad actors are almost always the same – faceless adversaries hailing from...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Hackers Using Mobile Devices To Expose Sensitive Information In Cyber Attacks - CBS Local

Hackers Using Mobile Devices To Expose Sensitive Information In Cyber Attacks - CBS Local | Cyber | Scoop.it
Hackers Using Mobile Devices To Expose Sensitive Information In Cyber Attacks CBS Local COLLEGE PARK, Md. (WJZ) — Target, Neiman Marcus, Michaels and the University of Maryland. They're all major retailers and institutions hit by hackers.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Korea beefs up training to counter cyber terrorism - Arirang News

Korea beefs up training to counter cyber terrorism - Arirang News | Cyber | Scoop.it
Korea beefs up training to counter cyber terrorism Arirang News Then students are taught a wide range of topics including cyber law and cyber policies, all so they are able to deal with incoming cyber threats and cyber terrorism." Similar joint...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Protecting Singapore Businesses from Cyber-Espionage | InfoWar ...

Protecting Singapore Businesses from Cyber-Espionage | InfoWar ... | Cyber | Scoop.it
“Over the few decades, Singapore's economy has moved up from a mere producer of material goods to a creative inventor of ideas. This success stands on two main pillars: Firstly, heavy investment has been made in ...
more...
No comment yet.
Rescooped by Wojciech Filipkowski from Chinese Cyber Code Conflict
Scoop.it!

New Study: Senior U.S. Military Schools Struggle to Include Cyber Education in Curricula

New Study: Senior U.S. Military Schools Struggle to Include Cyber Education in Curricula | Cyber | Scoop.it
New study finds mismatch between the challenges posed by cyber threats to national security and the limited exposure students receive at the nation’s senior military schools Newport, R.I.

Via Red-DragonRising
more...
ArthurGPeterson's curator insight, August 23, 2013 6:01 PM

Need to ramp this up as the cyber threat is growing.

Rescooped by Wojciech Filipkowski from Security Sector Reform and Governance
Scoop.it!

Police reform and the security sector - BusinessWorld Online Edition

Police reform and the security sector BusinessWorld Online Edition A civil society-led oversight group, BantayBayanihan (BB) had devised an M&E tool that would monitor the conduct of the AFP, CSOs and LGUs in the context of the implementation of...

Via CoPeSeNetwork
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Cyber Warfare: What Are the Rules? - Huffington Post

Cyber Warfare: What Are the Rules? - Huffington Post | Cyber | Scoop.it
Cyber Warfare: What Are the Rules? Huffington Post What is not cyber warfare? Al-Qaeda terrorists fly two jetliners into the twin towers killing almost 3,000 people.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

How Cyberwarfare and Drones Have Revolutionized Warfare

How Cyberwarfare and Drones Have Revolutionized Warfare | Cyber | Scoop.it
Tim Hsia and Jared Sperli write that the next few decades will be dominated by advancements in software and hardware (cyber and robotics, including drones) just as the last decade was dominated by counterinsurgency.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

DHS hopes get same cyber-spying powers as NSA - Daily Caller

DHS hopes get same cyber-spying powers as NSA - Daily Caller | Cyber | Scoop.it
DHS hopes get same cyber-spying powers as NSA Daily Caller Bills such as the Cyber Intelligence Sharing and Protection Act and the Cybersecurity Act of 2012 have sought to clearly define the relationship between the two agencies, but struggled to...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Honeywell's Cote: Cyber Threats Scare Me the Most - Wall Street Journal (blog)

Honeywell's Cote: Cyber Threats Scare Me the Most - Wall Street Journal (blog) | Cyber | Scoop.it
Honeywell's Cote: Cyber Threats Scare Me the Most Wall Street Journal (blog) Mr. Cote explained that companies' and governments' inability to fully protect themselves against cyber-attacks is unnerving.
more...
No comment yet.
Rescooped by Wojciech Filipkowski from Convergence -- Global Illicit Networks and National Security
Scoop.it!

It’s time to take cyberattacks seriously and install a deterrence plan

It’s time to take cyberattacks seriously and install a deterrence plan | Cyber | Scoop.it
Cyberattacks are one of the greatest threats to our national security. We need a credible deterrent.

Via ArthurGPeterson
more...
ArthurGPeterson's curator insight, July 27, 2015 3:06 PM

It would be good if Congress would take some threats seriously.

Scooped by Wojciech Filipkowski
Scoop.it!

Israel Electric Opens Cyber-War Room to Defend Against Power-Grid Hacks - Bloomberg

Israel Electric Opens Cyber-War Room to Defend Against Power-Grid Hacks - Bloomberg | Cyber | Scoop.it
Israel Electric Opens Cyber-War Room to Defend Against Power-Grid Hacks Bloomberg In 2012, Netanyahu formed the National Cyber Bureau, which said last month that it plans to establish an emergency-response team for cyber-attacks.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Cyber attacks on companies are inevitable, security expert says - Pioneer Press

Cyber attacks on companies are inevitable, security expert says - Pioneer Press | Cyber | Scoop.it
Cyber attacks on companies are inevitable, security expert says Pioneer Press Cyber-security expert Kevin Mandia told a gathering of Twin Cities executives on Thursday morning that attacks on their companies' computer networks are inevitable -- but...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Energy sector a prime target for cyber attacks - CSO

Energy sector a prime target for cyber attacks - CSO | Cyber | Scoop.it
Energy sector a prime target for cyber attacks CSO Heat, refrigeration, water, factories, financial services, power equipment, groceries, retail, and entertainment — they all depend on the power grid.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

White House unveils guidelines for protecting critical systems ...

White House unveils guidelines for protecting critical systems ... | Cyber | Scoop.it
The US government clearly knows a thing or two about internet security when it deals with (and dishes out) cyber attacks on a regular basis, and it's now ready to share that wisdom with others. The White House has just ...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Anti-theft software could be exploited by cyber attackers: Kaspersky Lab - Zee News

Anti-theft software could be exploited by cyber attackers: Kaspersky Lab - Zee News | Cyber | Scoop.it
Anti-theft software could be exploited by cyber attackers: Kaspersky Lab Zee News The team has published a report which has revealed that following the weak implementation of anti-theft software marketed by Absolute Software, cyber attackers were...
more...
No comment yet.
Rescooped by Wojciech Filipkowski from Big Data Security Analytics
Scoop.it!

The Four Pillars of Advanced Fraud Analytics - 21CT

The Four Pillars of Advanced Fraud Analytics - 21CT | Cyber | Scoop.it
The Four Pillars of Advanced Fraud Analytics create an economy of scale in fraud investigations to achieve measurable results and provide rapid time-to-value.

Via cysap
more...
Fàtima Galan's curator insight, October 2, 2013 8:53 AM

"

Together, the Four Pillars create an economy of scale in fraud investigations to achieve measurable results and provide rapid time-to-value:

Analyze massive data stores and fuse multiple data sourcesHunt for patterns of hidden fraudulent behavior and find the unknown unknownsIdentify and exploit common points of compromise to augment existing investigations and spawn new onesUncover false negatives more rapidly, reduce false positives, and ultimately put the pressure on fraudsters and their weak pointsBe inductive and deductive, allowing exploratory link analysis to work in conjunction with top-down mathematical approachesVisualize findings including suspicious payments, criminal techniques and methods, good vs. bad"
Rescooped by Wojciech Filipkowski from Big Data Security Analytics
Scoop.it!

Data+ Awards: Intel uses BI to quickly contain and remediate security threats

ollowing two security lapses several years ago, Intel executives pushed for an information security overhaul.

Via cysap
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

The Public/Private Cooperation We Need on Cyber Security - blogs.hbr.org (blog)

The Public/Private Cooperation We Need on Cyber Security blogs.hbr.org (blog) Not that long ago, cybersecurity was an issue for the back room. Now, it's made its way to the boardroom and the Situation Room.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Scientists working to develop most powerful cyber security - Economic Times

Scientists working to develop most powerful cyber security - Economic Times | Cyber | Scoop.it
Economic Times Scientists working to develop most powerful cyber security Economic Times MELBOURNE: Australian scientists are working on Quantum mechanics which is being applied to computing in order to develop most powerful and impenetrable cyber...
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Coming to Wall Street This Month: Quantum Dawn 2 -- Cyberwar! - All Things Digital

Coming to Wall Street This Month: Quantum Dawn 2 -- Cyberwar! - All Things Digital | Cyber | Scoop.it
Coming to Wall Street This Month: Quantum Dawn 2 -- Cyberwar! All Things Digital If anything seems a little off on Wall Street later this month, you can blame the cyberwar. Or rather the simulated cyber attack exercise dubbed Quantum Dawn 2.
more...
No comment yet.
Scooped by Wojciech Filipkowski
Scoop.it!

Cold War throwback: US-Russia to use nuclear 'hotline' for new cyber showdown - Washington Times

Cold War throwback: US-Russia to use nuclear 'hotline' for new cyber showdown - Washington Times | Cyber | Scoop.it
Cold War throwback: US-Russia to use nuclear 'hotline' for new cyber showdown Washington Times View results.
more...
No comment yet.