The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem in the same fashion as we have …
Likelihood of Cyber Attacks From Iran Increasing: Here is what to know and do
Since 2012 Iran has shown increasingly sophisticated capabilities to conduct cyber attacks, including the incredibly destructive attacks against Saudi Aramco, attacks against US banks and …
Continue Reading about Likelihood of Cyber Attacks From Iran Increasing: Here is what to know and do
The Cyber Threat Analysis Report Volume 1, Edition 1
Spike in Hacking of US Networks is said to be Tied to China and Iran US businesses and government agencies have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts …
Continue Reading about The Cyber Threat Analysis Report Volume 1, Edition 1
Iran indictments show even U.S. intelligence officials are vulnerable to basic hacking schemes
As the story broke about the charges against former U.S. Air Force intelligence specialist who defected to Iran and support targeted hacking against some of her former colleagues, one clear takeaway …
DoD Releases New Strategy Report Outlining Path Forward for Artificial Intelligence
The DoD released a new summary of its AI strategy this Tuesday (February 12) titled “Harnessing AI to Advance Our Security and Prosperity” and outlining its future plans for AI development and …
Is China about to abandon its ‘no first use’ nuclear weapons policy?
As China advances its nuclear weapons programs and works to close some of the major nuclear gaps between it and other major powers, some controversy is developing over whether these developments will …
Continue Reading about Is China about to abandon its ‘no first use’ nuclear weapons policy?
Understanding China’s AI Strategy
China’s views, strategies, and prospects for A.I. in the areas of economics and national security will play a significant role in world politics and U.S. foreign relations. It is important, therefore, …
The Navy Needs 2 Tons of Storage Devices Burned to Ash
What do you do when you need to destroy massive of classified information stored on digital devices? If you are the U.S. Navy, you issue a solicitation for incineration services able to reduce 4,000 …
Continue Reading about The Navy Needs 2 Tons of Storage Devices Burned to Ash
Ex-NSA cyberspies reveal how they helped hack foes of UAE
A new exclusive report from Reuters traces the shadowy "Project Raven,” a program run by the United Arab Emirates that hired ex-NSA cyberspies to hack the devices of targets around the world. The only …
Continue Reading about Ex-NSA cyberspies reveal how they helped hack foes of UAE
FAA Declares the Super Bowl a ‘No Drone Zone’
The FAA has declared a “no drone zone” in and around the Mercedes-Benz Stadium in Atlanta, home over Super Bowl LIII on February 3. The limit restricts any drone from flying within one nautical mile …
Continue Reading about FAA Declares the Super Bowl a ‘No Drone Zone’