Blog Posts Tagged with "Intelligence"

888605c6c25c19e41bbbb986ea6d43c1

Another Paradigm Shift - I'm Getting Motion Sickness

July 08, 2013 Added by:Jim Palazzolo

Before you protect the data, find the data. Before you create security controls, find the assets. Before you think about the future, find the blueprints for today. Before you attempt to know others, know yourself first.

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The 3-C Model

December 12, 2012 Added by:Joel Harding

Information Operations is changing from a focus on the former five components to ‘how’ IO works. What is lacking is a model. Without a model we can talk about IO in a general sense but there are no ways to divvy up what we do into logical divisions, dissuading useful discussions within our field...

Comments  (0)

Ee5e595fc2be8a24327ce7cefe0f7b2c

Breaches: Digital Transparency, WARPs, and Collective Intelligence

September 19, 2012 Added by:Christopher Laing

For collective intelligence directed at security breaches, I would argue, that an effective means of transparently sharing details without fear of recrimination and embarrassment would greatly reduce the impact of such breaches. Fine idea, but how can this be achieved?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

On Project Viglio

August 21, 2012 Added by:Infosec Island Admin

A group such as this, extra-legal as they seem to be and rather deliberately evasive using the rubric of “secrecy” as their cloak should set all of your spidey senses off. At best they are a group of people seeking to do good, but in fact may be doing ill by carrying out poor OSINT...

Comments  (30)

7fef78c47060974e0b8392e305f0daf0

Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

UK Intelligence and Security Committee Annual Report

July 20, 2012 Added by:Stefano Mele

"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

What Actions Do Your Security Metrics Promote?

July 12, 2012 Added by:Tripwire Inc

“It is possible to focus on a single metric and drive it up or down, but wreak havoc on the organization through unintended side effects. Some organizations have to deal with some people “gaming the metrics”, which again can lead to unintended side effects. Other organizations use metrics as a way to begin a conversation..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Exploring Hacktivism and the Deep Web

July 03, 2012 Added by:Pierluigi Paganini

When we think of hacktivism, immediately we connect it to anonymity. In fact, those who wish to express their dissent through hacktivism most often prefer the use of anonymity. It's clear that the ultimate context in which these people can freely exchange ideas and information is through the Deep Web...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Information Warfare and Cyberspace

May 30, 2012 Added by:Joel Harding

Why do I keep running into the phrase Information Warfare? If the discussion is about cyber and warfare in cyberspace, why use the phrase Information Warfare? Has cyber ‘anything’ become so overused that we need to resort to using a much broader term to interest people in a cybersecurity discussion?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Patriot Hackers, Cyber Vigilantes, and Shot Placement

May 25, 2012 Added by:Infosec Island Admin

Governments need to get a handle on this. If they want patriot hacker units, then they will have them and they will be controlled. As opposed to the Batman vigilante model that we now have here. If they did this, there would be plenty of volunteers and it might be a good thing...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Military Intelligence Dives into Cyber

May 21, 2012 Added by:Don Eijndhoven

One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Attribution: Inductive vs. Deductive Reasoning

May 18, 2012 Added by:Infosec Island Admin

In the present day where cyberwar is all the rage, and governments as well as private sector entities are seeking to cash in on the power grab that is mostly information warfare - as the Chinese call it - too many are forgetting a core problem to the picture: Attribution...

Comments  (7)

69dafe8b58066478aea48f3d0f384820

Strategic Web Compromises and Cyber Espionage Operations

May 15, 2012 Added by:Headlines

"Cyber Espionage attacks are not a fabricated issue and are not going away any time soon... They are aiming to expand their access and steal data. Communications (primarily e-mail), research and development (R&D), intellectual property (IP), and business intelligence..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

296634767383f056e82787fcb3b94864

SEALs, Spies, Security, and Celebrity

May 01, 2012 Added by:Jeffrey Carr

When the largest security companies in the world have had their source code stolen by hackers, our present security model is broken. Matt Brazil, a former U.S. embassy commercial officer in Beijing, will show executives how to survive in China without losing their secrets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

House Republicans Declare Cyber Security Week

April 23, 2012 Added by:Headlines

"The focus of these bills... address the central issue the federal government and industry have stated must be addressed now: updating existing cybersecurity laws to provide the legal authorities to allow for information-sharing and public-private partnerships..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »