By Shannon Perry Fight for the Future, a nonprofit that advocates for digital rights and Internet freedom, is spearheading an anti- National Security Agency protest on June 5th to Reset the Net. Marking the one-year anniversary of the first Edward Snowden report on the NSA, the protest seeks to erad...
Posts Tagged: New York Times
By Bob Gourley We have previously discussed research and analysis we did for the Cyber Conflict Studies Association on the many “Wake-Up Calls” the nation’s policy makers have declared themselves to have had regarding cyber security. If history is any predictor of the past, we will still be...
By Ryan Kamauff Here are the top cyber news and stories of the day. DHS CIO Spires put ‘on leave’ – “FedScoop has learned that Department of Homeland Security’s Chief Information Officer Richard Spires has been put on immediate ‘on leave’ status with no further explanat...
By Jose Nazario February was an incredible month of developments. Obviously the two big stories are the Mandiant report on the group tagged APT 1, and the White House’s reactions to the cyber espionage issue by using international trade efforts. Even the NYT, WaPo and WSJ hacks all pale in com...
By Bob Gourley There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those ...
By SeanLawson This is the headline that should have been affixed to the New York Times’ most recent story about supposed Iranian cyber attacks against oil and natural gas companies in Saudi Arabia and Qatar, as well as banks in the United States. In fact, it is the most appropriate headline for pr...
By RyanKamauff Here is the top cyber stories and news of the day. In response to WikiLeaks adding a paywall, Anonymous has declared war on WikiLeaks – the site is adopting similar measures to New York Times and others, preventing access “unless you tweet, share, pay, or wait.” F...
[This post by CTOVision contributor Sean Lawson was also published at Forbes.com.] Experts who theorize about cyber conflict talk about the ability to “project” power in and through cyberspace. They also warn of the danger from the “insider threat,” a trusted individual with ...