The findings and conclusions of malware “analysis” are not in fact analysis; they are, however, a collection of data points linked together by assumptions whose validity and credibility have not been evaluated. This lack of analytic methodology could prove exceedingly problematic for those charged with making decisions about cyber security.
Unmanned aerial vehicles have become the signature of American offensive military operations. While far from perfect, drones are now critical to achieving US goals in an effective and efficient manner. But how do the nations considered the United States’ closest “near peers,” Russian and China, compare in this critical capability?
Governments and NGOs alike have lauded the explosion of cellular phones in the developing world. The World Telecommunications Union reported in 2011 that 79% of the population in developing states have a mobile phone. The planet now boasts over 6 billion cellular phone subscriptions. Landlines and internet availability have never
“When conflict breaks out in social groups, individuals make strategic decisions about how to behave based on their understanding of alliances and feuds in the group.” Source: How computation can predict group conflict: Fighting among captive pigtailed macaques provides clues
Analysts, policymakers, and defenders often paint a bleak picture of the cybersecurity landscape. The Internet was built for resiliency, convenience, and openness, not security, and barriers to entry are low, meaning that criminals, foreign intelligence, activists, and states have many opportunities to launch countless attacks, especially if they are automated.
This article discusses some ongoing programs in the Emergency Services Sector (ESS) that can help your agency to identify its cyber footing. . Protecting and ensuring the continuity and resilience of the critical infrastructure and key resources (CIKR) of the United States are essential to the Nation’s security, public
The leak that the U.S. was apparently behind the Stuxnet worm that impacted the Nataz nuclear enrichment facility in Iran came – as it always does – with a rash of analysis and opinion related to the hazards associated with “sophisticated” malware and “cyber weapons.” But it is a reliance
Federal Cyber Security professionals have long considered the “insider threat” as the most insidious, hardest to protect against threat vector. This has always been the toughest form of threat, even before computers were created. Now that every employee in the entire organization must have access to IT the cyber version
Interesting application of crowd sourced data drawn from social media streams and geolocation data. “A smartphone application, enabling people in the middle of riots to find safety, has been shown off at the TEDGlobal event in Edinburgh. The app has been developed by Salvatore Iaconesi, a newly created TED Fellow.
“The fourth undersea linking East Africa to the rest of the world – Lower Indian Ocean Network submarine cable (LION2) has gone live, offering another redundancy route (an alternative option) to Internet service operators. “ Source: Fourth sea cable linking East Africa goes live – Corporate News |businessdailyafrica.com