iOS app Android app

Cyber Attacks

Federal and Private Sectors' Approaches to Cyber Collide

Peter B. LaMontagne | Posted 04.22.2015 | Technology
Peter B. LaMontagne

In the 21st century and the post-9/11 global risk environment, we are seeing the emergence of a new type of technology crossover involving national security and the commercial tech market -- or 'cross-convergence.'

Sustainable Cybersecurity

Scott J. Shackelford | Posted 04.02.2015 | Technology
Scott J. Shackelford

In the search for analogies to get a better handle on the multifaceted cyber threat, we should not ignore the green movement. Consider the Aria hotel in Las Vegas, which is famous for more than its slot machines -- it is also known for its wet towels.

17 Tips You Can Do Today to Protect Your Online Passwords

Arkady Bukh | Posted 05.06.2015 | Technology
Arkady Bukh

Failing to take noral precautions with cyber security can wreck your day -- and all of the days you have coming. All of the talk about cyber security, hackers and identity theft can leave the average person befuddled.

Are Banks In Store For An 'Armageddon' Cyber Attack?

HuffPost Live | Posted 03.02.2015 | HuffPost Live 321

As with most things in the modern age, our banking has largely shifted from physical, brick-and-mortar banks to a "secure" website or app that handles...

Defending Data Post-Anthem

Brian E. Finch | Posted 04.14.2015 | Business
Brian E. Finch

Cyber criminals know that their electronic attacks are likely to be both successful and profitable, and therefore no one should expect any drop in the pace or intensity of such attacks. There are steps companies can take to minimize the losses associated with such attacks.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | World
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.

After Decades of Conflict, Time to Engage North Korea's Kim Dynasty

Doug Bandow | Posted 03.12.2015 | World
Doug Bandow

A small, poor nation, the Democratic People's Republic of Korea should be an international nullity, irrelevant to global affairs. Yet it again dominated headlines in the U.S. with the hacking of Sony and cancellation of the broad release of the movie The Interview, a comedy featuring the assassination of the younger Kim.

Hysteria Over North Korean Hacking Is Unwarranted

Ivan Eland | Posted 02.21.2015 | Politics
Ivan Eland

Although John McCain's sidekick in threat exaggeration and bellicose strutting, Lindsay Graham, was outraged that President Obama called North Korea's action "cyber vandalism," that is probably the best description.

Could North Korea Take Over the Internet?

Scott J. Shackelford | Posted 02.20.2015 | Technology
Scott J. Shackelford

The vulnerabilities that Dr. Charlie Miller points to are real and require our attention if we are to ensure that fiction does not become reality, and that the most recent cyber attacks on Sony are the end and not the beginning of a new era in state-sponsored cyber attacks.

Solving the Threat to our Energy Grid

Rebecca Abrahams | Posted 01.21.2015 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems Admiral Michael Rogers, Director of the National Security Agency and head of the US ...

Five Cyber Security Takeaways From the Mid-Term elections

Brian E. Finch | Posted 01.11.2015 | Business
Brian E. Finch

While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be have yet to be determined, but here are some thoughts on probably outcomes.

The Axiom Report: Cybersecurity and Its Impact on China-U.S. Relations

Franz-Stefan Gady | Posted 01.05.2015 | Politics
Franz-Stefan Gady

While the actual impact of the Novetta report on making U.S. systems more secure from Chinese attacks in the long run will be negligible on the diplomatic front, the recent Axiom revelations will allow the U.S. government to press the Chinese side harder on contentious cybersecurity issues.

Hacking Back and the Cyber Balance of Power

Rebecca Abrahams | Posted 12.14.2014 | Technology
Rebecca Abrahams

The Washington Post front page article on October 10 "Hacked Firms Quietly Talk about Fighting Fire with Fire" about growing corporate anger over successive cyber attacks has a new message: go on the offensive. Hack back! They are not alone.

Watch Your (Supply) Tail

Brian E. Finch | Posted 11.30.2014 | Technology
Brian E. Finch

In a report, the Senate detailed how various contractors for the U.S. military's Transportation Command (TRANSCOM) had been the subject of repeated and serious cyber intrusions in a period spanning 2012 through 2013.

Cyber Attack: Coming to a Store Near You

Rebecca Abrahams | Posted 11.17.2014 | Business
Rebecca Abrahams

BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w...

Something's Wrong With Home Depot's Explanation of the Hack

Rebecca Abrahams | Posted 11.10.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystems Something is wrong with Home Depot's explanation of the hack on the point of their cas...

Gerry Smith

Former NSA Chief Is Working For Wall Street Now | Gerry Smith | Posted 07.09.2014 | Technology

Wall Street has tapped former National Security Agency director Keith Alexander to form a council that would coordinate how banks and the government r...

Toward a Positive Cyber Peace

Scott J. Shackelford | Posted 08.23.2014 | Technology
Scott J. Shackelford

Defining and fostering cyber peace is no easy feat; in fact, it has been said that "achieving and maintaining cyber-peace can be as demanding as starting a cyberwar."

The Admiral Sets A Good Course

Brian E. Finch | Posted 08.20.2014 | Politics
Brian E. Finch

If an enemy army or air fleet is clearly on its way to attack targets in the United States, the military has a plan to respond. It has assets deployed domestically and overseas to intercept such attacks, and has tactics and strategies in place to respond to such aggressive maneuvers.

Reexamining Article 5: NATO's Collective Defense in Times of Cyber Threats

Klara Tothova Jordan | Posted 08.13.2014 | World
Klara Tothova Jordan

NATO must move past its current cyber defense policy and provide operational capabilities to defend itself and its allies by collective preemptive and retaliatory actions.

Five Essential Tips for Small Business Data Security

Guy Chiarello | Posted 05.13.2014 | Small Business
Guy Chiarello

While marketing and promotion strategies can accomplish the first two, are small businesses really doing enough to protect their customers' data and reassure them that their personal information is safe?

Cybercrime's First CEO Casualty: Avoidable Error

Harlan Loeb | Posted 07.06.2014 | Business
Harlan Loeb

In the earliest days of the breach, Target began circulating data on the number of customers impacted. Subsequently, though, it continually revised the number upward to the point that everyone stopped paying attention.

Why Ignoring the NIST Framework Could Cost You

Scott J. Shackelford | Posted 07.02.2014 | Technology
Scott J. Shackelford

As courts begin to shape a cybersecurity duty of care in this "new era," the NIST Framework could be used to determine whether a company's duty has been successfully met.

The Danger Signs Are Adding Up

Brian E. Finch | Posted 06.08.2014 | Technology
Brian E. Finch

Namely warnings about cyber threats are growing more specific, and the language being used to urge action is growing more aggressive. Taken together, one starts to see a very interesting picture develop.

First Public NSA Speech: "De-Militarization" of Cyber Space

Brian E. Finch | Posted 06.04.2014 | Technology
Brian E. Finch

Our efforts are likely better focused on drawing laws of cyber war, as well as making it clear that use of cyber weapons to attack America will be met with a digital and physical response as appropriate.