Cyber Strategies for a World at War

OPEN SOURCE AGGREGATION & ANALYSIS

Michael Hayden on Apple’s fight with FBI


 

ADVERTISEMENT

An unprecedented high-level master narrative of America’s intelligence wars, from the only person ever to helm both CIA and NSA, at a time of heinous new threats and wrenching change… [MORE]

Advertisements

Filed under: cyber security, , , , , , , , , , , ,

Former CIA Director Talks Cyber Security

Michael_Hayden,_CIA_official_portraitFormer National Security Agency and Central Intelligence Agency Director General Michael Hayden discusses life as the nation’s premier spy, as well the pressing cyber and national security issues of the day, with Frank Sesno, Director of George Washington University‘s School of Media and Public Affairs. This event took place February 19, 2013, and was recorded by CSPAN.

One of the first topics they discuss is the huge load of evidential data the information security company Mandiant recently released that alleges the Chinese government, through its military, is complicit in persistent cyber espionage against the United States government and corporations.

Not-so breaking news, folks: According to General Hayden, the United States steals China‘s secrets, too. However, he goes on to differentiate the type of espionage between the two nations. He regards the United States’s spying against the Chinese government as being done only to protect the United States’s citizens’s liberty and security; whereas the Chinese spying is being done against the United States primarily to steal its corporate and national secrets to improve China’s industrial and technological capacity and strength.

Unfortunately, CSPAN offers no embeddable file for the event so you will need to watch it at www.c-spanvideo.org/program/311052-1

Filed under: Analysis, cyber security, cyber war, Doctrine, government, Intelligence Community, Internet, Military, News, Terrorism, Threats, , , , , , , , , ,

The Highlighter: Securing Cyberspace for the 44th Presidency – Part V

A Report of the CSIS Commission on Cybersecurity for the 44th Presidency

Part V includes highlights of:

  • Section 4 – Regulate for Cybersecurity

——————————————————————————————————————————————
CSWW is not affiliated with CSIS or the commission that produced this report. The use of “we,” “our,” “us,” etc., throughout the highlights of this report refers to the members of the CSIS Commission and not to CSWW.
——————————————————————————————————————————————

The Highlights:

4
Regulate for Cybersecurity

Recommendations

  • The president should task the NOC to work with appropriate regulatory agencies to develop and issue standards and guidance for securing critical cyber infrastructure, which those agencies would then apply in their own regulations.
  • The NOC should work with the appropriate regulatory agencies and with the National Institute of Standards and Technology (NIST) to develop regulations for industrial control systems (ICS). The government could reinforce regulation by making the development of secure control systems an element of any economic stimulus package…
  • The NOC should immediately determine the extent to which government-owned critical infrastructures are secure from cyber attack…
  • The president should direct the NOC and the federal Chief Information Officers Council, working with industry, to develop and implement security guidelines for the procurement of IT products (with software as the first priority).
  • The president should task the National Security Agency (NSA) and NIST, working with international partners, to reform the National Information Assurance Partnership (NIAP).
  • The president should take steps to increase the use of secure Internet protocols. The president should direct OMB and the NOC to develop mandatory requirements for agencies to contract only with telecommunications carriers that use secure Internet protocols.

Read the rest of this entry »

Filed under: Analysis, Biography, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Strategy, Technology, Terrorism, The Highlighter, Training, War, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

NSA Should Oversee Cybersecurity, Intel Chief Says

By Kim Zetter
February 26, 2009

E731a5a1fb39407e8bee699ef32a5f7e2

Despite the fact that many Americans distrust the National Security Agency for its role in the Bush Administration’s warrantless wiretapping program, the agency should be entrusted with securing the nation’s telecommunications networks and other cyber infrastructures, President Obama’s director of national intelligence told Congress on Wednesday.

Director of National Intelligence Admiral Dennis Blair told the House intelligence committee (.pdf) that the NSA, rather than the Department of Homeland Security which currently oversees cybersecurity, has the smarts and the skills to secure cyberspace.

“The National Security Agency has the greatest repository of cyber talent,” Blair said. “[T]here are some wizards out there at Fort Meade who can do stuff.”

Blair added that “because of the offensive mission that they have, they’re the ones who know best about what’s coming back at us and it’s defenses against those sorts of things that we need to be able to build into wider and wider circles.”

He acknowledged that the agency had a trust handicap to overcome due to its role in the Bush Administration’s secret domestic spying program, and therefore asked Congress to help convince the public that it’s the right agency for the task.

“I think there is a great deal of distrust of the National Security Agency and the intelligence community in general playing a role outside of the very narrowly circumscribed role because of some of the history of the FISA issue in years past. . . . So I would like the help of people like you who have studied this closely and served on commissions, the leadership of the committee and finding a way that the American people will have confidence in the supervision, in the oversight of the role of NSA so that it can help protect these wider bodies. So, to me, that’s one of the keys things that we have to work on here in the next few months.”

Blair is not without support for his view. Paul Kurtz, who led the cybersecurity group on Obama’s transition team and was part of Bush’s White House National Security Council, recently told Forbes that he supports the NSA taking a prominent role in cybersecurity.

Continue reading…

Filed under: Biography, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Polls, Strategy, Technology, Terrorism, The Highlighter, Training, War, , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber Threats 101

By Kim Hart
February 16, 2009
The Washington Post

An Army lieutenant may be an expert at securing borders and warding off enemies in a war zone. But when it comes to making sure hackers cannot break into the military’s communications network, officers may feel pretty defenseless.

To get a better grasp on technological threats, military officers, agency heads and government contracting executives have found one of the Defense Department’s best-kept secrets: the National Defense University.

NDU is made up of four graduate-level colleges, including the National War College, the Industrial College of the Armed Forces, and the Joint Forces Staff College. But the largest college — the Information Resources Management College — has grown the fastest over the past few years because the skills it teaches are in such high demand.

Located on the District waterfront, at Fort Lesley J. McNair, the college trains mid-career workers, in the public and private sectors, how to leverage the newest consumer technologies as well as how to protect vital information. This expertise used to be reserved for an agency’s chief information officer. But as tools like thumb drives, Facebook, Twitter and voice over Internet Protocol phone services creep into offices and bases, secure digital networks are becoming essential for all employees.

“Web 2.0 and information assurance are such big deals these days, but they are in conflict,” said Robert Childs, senior director of the college. The courses are tailored for people responsible for safeguarding the networks at the National Security Administration and the Department of Homeland Security, for example. The Defense Department is the college’s primary source of funding.

Continue reading…

Filed under: Analysis, Biography, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Polls, Strategy, Technology, Terrorism, Training, War, , , , , , , , , , , , , , , , , , , , , , , , ,

AFCEA Conference on Cyberspace and National Security

Wednesday, December 10, 2008
CSPAN.org

Homeland Security Sec. Michael Chertoff delivers one of the keynote speeches at a conference on Cyberspace and National Security. Other speakers include Deputy Sec. of Defense Gordon England; NSA’s Central Security Service head Army Lt. Gen. Keith Alexander; and Provisional Air Force Cyber Command head Maj. Gen. Bill Lord. The Armed Forces Communications and Electronics Assn. hosts this conference examining cybersecurity.

Watch the video…

Filed under: Business, cyber security, government, Intelligence Community, Military, News, , , , , , , , , , ,

The “BarackBerry” as seen on CNN

Review the Sectéra® Edge™ Secure Mobile Environment Portable Electronic Device’s Product Overview and Details.

7 Days Free – Match.com

Filed under: Business, News, , , , , , ,

The Highlighter: Securing Cyberspace for the 44th Presidency – Part I

A Report of the CSIS Commission on Cybersecurity for the 44th Presidency

Part I includes highlights of the:

  • Executive Summary
  • Summary of Recommendations
  • Introduction

————————————————————————————————–
CSWW is not affiliated with CSIS or the commission that produced this report. The use of “we,” “our,” “us,” etc., throughout the highlights of this report refers to the members of the CSIS Commission and not to CSWW.
————————————————————————————————–

The Highlights:

This report makes use of a broad definition of cyberspace that goes beyond the Internet to include all forms of networked, digital activities.

Executive Summary

(1) cybersecurity is now a major national security problem
(2) decisions and actions must respect privacy and civil liberties
(3) only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will make us more secure

We were encouraged in our work by senior officials in the Department of Defense, the intelligence community, and other agencies who told us that cybersecurity was one of the greatest security challenges the United States faces in a new and more competitive international environment.

Major agencies play key roles set by presidential directives and coordinated by the White House.

We propose creating a new office for cyberspace in the Executive Office of the President. This office would combine existing entities and also work with the National Security Council in managing the many aspects of securing our national networks while protecting privacy and civil liberties.

Government must recast its relationship with the private sector as well as redesign the public-private partnership to promote better cybersecurity.

The Bush administration took a major step toward improving federal cybersecurity with its Comprehensive National Cybersecurity Initiative.

…we face a long-term challenge in cyberspace from foreign intelligence agencies and militaries, criminals, and others, and that losing this struggle will wreak serious damage on the economic health and national security of the United States.

Read the rest of this entry »

Filed under: Analysis, cyber security, Doctrine, Policy, Politics, Strategy, The Highlighter, , , , , , , , , , , , , , , , , , ,

Secretary Napolitano Issues Additional Action Directives on Cyber Security and Northern Border Strategy

January 23, 2009
US Department of Homeland Security

U.S. Department of Homeland Security (DHS) Secretary Janet Napolitano today issued a second round of action directives on cyber security and the northern border strategy.

These action directives instruct specific offices to gather information, review existing strategies and programs, and to provide oral and written reports back to her by mid February. In the coming days, Secretary Napolitano will continue to issue additional action directives focused on the missions critical to the department: Protection, Preparedness, Response, Recovery and Immigration.

“This continuing evaluation will unify our shared efforts and help me assess where improvements need to be made,” said Secretary Napolitano.

The full action directives are below:

* Cyber Security. Given the increasingly sophisticated number of threats to all areas of national cyberspace and considering the authorities provided by the Homeland Security Act, the Post-Katrina Emergency Management Reform Act, and Homeland Security Presidential Directive 23/National Security Presidential Directive 54, what are the authorities and responsibilities of DHS for the protection of the government and private sector domains, what are the relationships with other government agencies, especially the departments of Defense, Treasury, and Energy, and the National Security Agency, and what are the programs and timeframes to achieve the department’s responsibilities and objectives? An oral report is due by Feb. 3, with a final report due Feb. 17.

* Northern Border Strategy. The northern border of the United States has become, since 9/11, important to our national security. As we have designed programs to afford greater protection against unlawful entry, members of Congress and homeland security experts have called for increased attention to the Canadian border. What are the current vulnerabilities, the overall strategy for reducing those vulnerabilities, the requirements, the programs, the budget, and the timeframe for improving security along this border and what level of risk will remain once the programs are completed? An oral report is due by Feb. 10, with a final report due Feb. 17.

Filed under: News, Policy, , , , , , , , ,

Local cyber leader meets with likely Obama cyber czar

By John Andrew Prime
January 10, 2009
Shreveport Times | The Times

The head of the Cyber Innovation Center met Friday with the man many believe will be the nation’s chief technology officer, dubbed the cyber czar, under the Obama administration.

CIC Executive Director Craig Spohn met in Washington with Paul Kurtz, whom insiders say is on a short list of technology experts vying to be President-elect Obama’s leading adviser on national cyber security issues. He has appeared on platforms with Obama on several occasions in past weeks and months.

“Paul Kurtz is a very helpful young man with excellent credentials for the position of Cyber Czar,” said Spohn, who is heading development of the center City and its associated National Cyber Research Park on 64 acres north of Barksdale Air Force Base and east of Bossier Parish Community College in Bossier City.

“His knowledge and understanding of the national cyber assets and critical infrastructure combined various agencies that have the responsibility of protecting them make him one of few people that pass the down-select process.”

Spohn said his talk with Kurtz focused on “additional agencies in the national cyber construct that would serve to complement the Air Force, among other groups, that would make good candidates for inclusion in the National Cyber Research Park.”

While Spohn has not listed them for the record, the candidates are those agencies with three, four and even five initials familiar to the public, including but not limited to the CIA, FBI and NSA.

Continue reading…

Filed under: News, Politics, , , , , , , , , , , , , ,

CWE/SANS TOP 25 Most Dangerous Programming Errors

Experts Announce Agreement on the 25 Most Dangerous Programming Errors – And How to Fix Them
Agreement Will Change How Organizations Buy Software.

By Bob Martin, MITRE (Project Manager)
Questions: top25@sans.org

(January 12, 2009) Today in Washington, DC, experts from more than 30 US and international cyber security organizations jointly released the consensus list of the 25 most dangerous programming errors that lead to security bugs and that enable cyber espionage and cyber crime. Shockingly, most of these errors are not well understood by programmers; their avoidance is not widely taught by computer science programs; and their presence is frequently not tested by organizations developing software for sale.

The impact of these errors is far reaching. Just two of them led to more than 1.5 million web site security breaches during 2008 – and those breaches cascaded onto the computers of people who visited those web sites, turning their computers into zombies.

People and organizations that provided substantive input to the project are listed below. They are among the most respected security experts and they come from leading organizations ranging from Symantec and Microsoft, to DHS’s National Cyber Security Division and NSA’s Information Assurance Division, to OWASP and the Japanese IPA, to the University of California at Davis and Purdue University. The MITRE and the SANS Institute managed the Top 25 Errors initiative, but the impetus for this project came from the National Security Agency and financial support for MITRE’s project engineers came from the US Department of Homeland Security’s National Cyber Security Division. The Information Assurance Division at NSA and National Cybersecurity Division at DHS have consistently been the government leaders in working to improve the security of software purchased by the government and by the critical national infrastructure.

What was remarkable about the process was how quickly all the experts came to agreement, despite some heated discussion. “There appears to be broad agreement on the programming errors,” says SANS Director, Mason Brown, “Now it is time to fix them. First we need to make sure every programmer knows how to write code that is free of the Top 25 errors, and then we need to make sure every programming team has processes in place to find, fix, or avoid these problems and has the tools needed to verify their code is as free of these errors as automated tools can verify.”

The Office of the Director of National Intelligence expressed its support saying, “We believe that integrity of hardware and software products is a critical element of cybersecurity. Creating more secure software is a fundamental aspect of system and network security, given that the federal government and the nation’s critical infrastructure depend on commercial products for business operations. The Top 25 is an important component of an overall security initiative for our country. We applaud this effort and encourage the utility of this tool through other venues such as cyber education.”

Until now, most guidance focused on the ‘vulnerabilities’ that result from programming errors. This is helpful. The Top 25, however, focuses on the actual programming errors, made by developers that create the vulnerabilities. As important, the Top 25 web site provides detailed and authoritative information on mitigation. “Now, with the Top 25, we can spend less time working with police after the house has been robbed and instead focus on getting locks on the doors before it happens.” said Paul Kurtz, a principal author of the US National Strategy to Secure Cyberspace and executive director of the Software Assurance Forum for Excellence in Code (SAFECode).

What You Will Find In This Announcement:

  • Which People and Organizations Made Substantive Contributions to the Top 25 Errors List?
    Please note that the proposed procurement guidelines incorporates in part language utilizing the OWASP Secure Software Contract Annex.
    https://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex
  • How Will the Top 25 Errors Be Used?
  • How Important Are the Top 25 Errors?
  • What Errors Are Included in the Top 25?
  • Resources to Help Organizations Eliminate The Errors

Continue reading…

TAKE THE CSWW POLL LOCATED TO THE RIGHT OF THIS PAGE

Filed under: Business, cyber security, News, Training, , , , , , , , , , , , , , ,

Global Trends

"The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, and robotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction."
 
Global Trends and Key Implications Through 2035 from the National Intelligence Council Quadrennial Report GLOBAL TRENDS: The Paradox of Power

A World at War

The World is at War. It is a world war that is being fought right now, in real time, virtually everywhere on the planet. It is a world war that is, perhaps, more encompassing and global in nature than any other world war in history because, not only is it being fought by nations and their governments, it is also being fought by non-state actors such as terrorists, organized crime, unorganized crime, and many other known and unknown entities. It is a total world war being fought every day on the hidden and dark battle fields of the cyber domain. It is a war that, according to some intelligence estimates, has the potential to be as nearly as serious and as deadly as a nuclear war... [MORE]

 


 


ADVERTISEMENT

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real... [MORE]

RSS ODNI News

  • An error has occurred; the feed is probably down. Try again later.

ADVERTISEMENT

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity... [MORE]


ADVERTISEMENT

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications... [MORE]

RSS NSA News


ADVERTISEMENT

“When it comes to what government and business are doing together and separately with personal data scooped up from the ether, Mr. Schneier is as knowledgeable as it gets…. Mr. Schneier’s use of concrete examples of bad behavior with data will make even skeptics queasy and potentially push the already paranoid over the edge.” (Jonathan A. Knee - New York Times)... [MORE]

RSS CIA News


ADVERTISEMENT

The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics... [MORE]

RSS Defense Advanced Research Projects Agency (DARPA)

  • 2018/08/17 Robotic Payload for RSGS Mission Moves to Next Phase of Development August 17, 2018
    DARPA has completed a major review milestone for its Robotic Servicing of Geosynchronous Satellites, or RSGS, program. Results from a recently completed preliminary design review showed that the robotic payload design – coupled with a spacecraft bus that Space Systems Loral (SSL) is providing through a partnership agreement – is on track to fulfill a multi-y […]
  • 2018/08/09 Restoring Trust in Electronic Documents August 9, 2018
    Today, the expeditious delivery of electronic documents, messages, and other data is relied on for everything from communications to navigation. As the near instantaneous exchange of information has increased in volume, so has the variety of electronic data formats–from images and videos to text and maps. Verifying the trustworthiness and provenance of this […]
  • 2018/07/24 DARPA Selects Teams to Unleash Power of Specialized, Reconfigurable Computing Hardware July 24, 2018
    The general-purpose computer has remained the dominant computing architecture for the last 50 years, driven largely by the relentless pace of Moore's Law-the transistor-scaling that has allowed for a half-century of rapid progress in electronics. As this trajectory shows signs of slowing, however, it has become increasingly more challenging to achieve p […]
  • 2018/07/24 Research Teams Selected to Lower Barriers to Modern System-on-Chip Design Announced July 24, 2018
    A once highly manual process, circuit design has been transformed by the advent of electronic design automation (EDA) tools and modular design methodologies. Despite continuing advances in automation technologies, the demand for increasingly complex System-on-Chip (SoC) platforms has shown no sign of slowing. Today's SoCs incorporate billions of transis […]
  • 2018/07/24 Research Teams Selected to Uncover Novel Materials and Approaches to Circuit Integration July 24, 2018
    The use of intellectual-property (IP) blocks–discrete, modular, reusable blocks that deliver frequently used circuit functions-has significantly streamlined the design and creation of microchips. Just as the number of transistors per chip has grown dramatically in line with Moore's Law-the transistor scaling that has allowed for 50 years of electronics […]

ADVERTISEMENT

RSS Cyber News (Google)

  • This RSS feed URL is deprecated August 20, 2018
    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
  • Addressing the Cyber Skills Gap with Great Talent - CSO Online August 20, 2018
    Addressing the Cyber Skills Gap with Great TalentCSO OnlineOne of the most pressing concerns of today's CSO is filling positions in their security teams with qualified, trained, and motivated security professionals. The few applicants trickling out of universities may have deep theoretical skills, but few have ...
  • Donald Trump Tweet-Attacks Former CIA Chief After Melania Delivers Anti-Cyber Bully Speech - Deadline August 20, 2018
    DeadlineDonald Trump Tweet-Attacks Former CIA Chief After Melania Delivers Anti-Cyber Bully SpeechDeadlineShortly after First Lady Melania Trump delivered a nationally televised speech about cyber bullying, saying “Let's face it, most children are more aware of the benefits and pitfalls of social media than some adults,” her husband demonstrated that fa […]
  • Army cyber protection teams upgrade training with a 'real' city - FCW.com August 20, 2018
    FCW.comArmy cyber protection teams upgrade training with a 'real' cityFCW.comWhile far from the Army cyber team's first cyber training exercise, this is the first with a full-scale cityscape. The 45-acre facility offers typical metropolitan trappings, physical and cyber infrastructures and control systems -- water facilities, a ...
  • As Cyber Insurance Market Grows, Accumulation Risk Is Key Concern: Geneva Assn. - Insurance Journal August 20, 2018
    Insurance BusinessAs Cyber Insurance Market Grows, Accumulation Risk Is Key Concern: Geneva Assn.Insurance JournalAlthough cyber risk premiums have expanded sizably in recent years with loss ratios that compare favorably to other product lines, the danger of accumulation risks is a key concern for the market, according to a study released by insurance indust […]
  • Tech giants warn Coalition bill opens customers up to cyber attack - The Guardian August 20, 2018
    The GuardianTech giants warn Coalition bill opens customers up to cyber attackThe GuardianFergus Hanson, the head of international cyber policy at the Australia Strategic Policy Institute said the government proposal was “a big improvement” on earlier suggestions companies could be required to introduce systemic vulnerabilities. Hanson said ...and more » […]
  • DARPA wants 'Cyber-Hunting at Scale' - Defense Systems August 19, 2018
    Defense SystemsDARPA wants 'Cyber-Hunting at Scale'Defense SystemsThe goal is to create dynamic and adaptable threat-hunting technologies that can be used in any large government or commercial organization beyond just the military, said Sam Hamilton, a chief scientist in BAE Systems Inc.'s cyber technology group.
  • Tracking Hackers: How to Work in Cyber Security - U.S. News & World Report August 20, 2018
    U.S. News & World ReportTracking Hackers: How to Work in Cyber SecurityU.S. News & World ReportInspired by art and literature, Wanca studied the humanities and earned a law degree before becoming intrigued by the growing problems posed by cyber security threats. That interest led her to return to school, where she sharpened her technology skills ...
  • Marines hire 'friendly hackers' to expose cyber security vulnerabilities - WTHR August 20, 2018
    Marines hire 'friendly hackers' to expose cyber security vulnerabilitiesWTHRLAS VEGAS (WTHR) — The United States Marines are paying "friendly hackers" to cyber-attack them. The Department of Defense recruited 100 of the world's top hackers to find security gaps in the military's public websites before enemies does. It's an […]
  • Teens tackle cyber security programme - GOV.UK August 20, 2018
    GOV.UKTeens tackle cyber security programmeGOV.UKAround 45 students, aged 13 to 17, have taken part in the CyberFirst scheme, a government-recognised programme, developed by GCHQ's National Cyber Security Centre and run by Energus in west Cumbria. The group worked alongside industry specialists ...
  • Technology in Government - Women and diversity in cyber - CSO Australia August 20, 2018
    The Australian Financial ReviewTechnology in Government - Women and diversity in cyberCSO AustraliaIt's become a staple of many technology conferences - the almost mandatory "Women in..." panel. Amy Roberts, from the Australian Cyber Security Centre chaired a "Women in Cyber" panel at this year's Technology in Government event, […]

ADVERTISEMENT

RSS Cyber War News (Bing)


ADVERTISEMENT

RSS Cyber Tag (Icerocket)

  • How to Align Your Media and Influencer Outreach Efforts for Better Results August 19, 2018
    Influencer marketing has become increasingly popular as a marketing and PR strategy. The market is estimated to be worth $2 billion in 2017 and set to reach $10 billion by…Read More >>>
    Meltwater
  • 10 Reasons Your Organization Needs an Internal Newsletter August 18, 2018
    Most communications pros are focused on getting the word out, not in. But, as we've recently covered, internal communications are important and there's plenty of overlap between the priorities of…Read More >>>
    Meltwater
  • IGTV: Welcome to Instagram’s Youtube-Like Video Channel August 16, 2018
    Instagram has officially announced its intention to become a video platform that lies somewhere between Snapchat and Youtube. The video app and hub will be known as IGTV (Instagram TV)…Read More >>>
    Meltwater
  • Dip Your Toe Into Immersive Experiences August 12, 2018
    Immersive Experiences are the Next Frontier in PR and Brand MarketingThere's a new trend afoot.PR-driven immersive experiences are taking the art world by storm and it's turning an entire industry…Read More >>>
    Meltwater
  • Infographic: Supercharge Your Marketing with Statistics August 11, 2018
    How do you captivate and appeal to an audience with an elusive attention span?Supercharge your marketing with statistics and you'll grab them with take-notice data! This infographic unpacks how to use…Read More >>>
    Meltwater

ADVERTISEMENT

RSS Cyberwar Tag (Wordpress)


ADVERTISEMENT


 
The Art of Attention

© 2016 PROSOCHĒ. All Rights Reserved.
Fair Use Policy ҩ Terms of Service ҩ Privacy Policy ҩ Contact

Cyber Threat Assessment

 


ADVERTISEMENT

In this New York Times bestselling investigation, Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared... [MORE]


ADVERTISEMENT

As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan... [MORE]


ADVERTISEMENT

ADVERTISEMENT

Support CSWW

Please help improve CSWW by providing us with your comments, concerns, and questions at our FEEDBACK page.

Editor, CSWW

Kurt Brindley is a retired U.S. Navy Senior Chief who specialized in the fields of tele-communications and C4SRI systems Upon retirement from the navy, he spent nearly a decade as a defense industry consultant. He now writes full time... [MORE]


ADVERTISEMENT

Now in development for film by 20th Century Fox, award-winning CyberStorm depicts, in realistic and sometimes terrifying detail, what a full scale cyber attack against present-day New York City might look like from the perspective of one family trying to survive it... [MORE]