Cyber Security Intelligence

Twitter< Follow on Twitter>


Newsletter December #2 2015

This Newsletter reaches over 5,000  IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities.

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns. read more The constant vigilance required to protect US government systems and the systems themselves might not be up to the task. read more. Some experts think that attack is the best form of cyber defense, anyway. read more

 

First Ever EU Rules On Cybersecurity

Europe's critical digital infrastructure will be required to meet basic security standards. read more  The European Commission wants to stimulate the smart use of digital technologies to create new businesses. read more

 

Cyber Warfare Is Integral To Modern International Politics

Cyber-operations are being used for information warfare and  intelligence gathering purposes, especially in the war between Russia and Ukraine. read more

 

Anonymous Declares December 11th ISIS 'trolling day'

Hacktivist group Anonymous has declared a cyber war on ISIS under the hashtag #OpParis. read more

 

The Current Chinese Cybercriminal Underground

Trend Micro analyses the cybercrime economy in China and finds it very sophisticated and thriving more than ever. read more

 

OPM Hack Was Criminal - Not China Government Sponsored

Surprise: China's official investigation into the massive breach affecting 22 million US federal workers finds it was a criminal enterprise. read more

 

Gateway For Hackers

Routers - devices that connect people to the Web, sometimes called "the backbone of the Internet", are dangerously vulnerable to hackers. read more

 

Hackers Can Use Holes In The Internet of Things

Vulnerabilities in IOT devices such as fitness bands, smart-watches, drones and connected appliances could all be exploited by Hackers. read more

 

Insurance Tech Faces the Internet of Things Arms Race

As business intelligence and analytics technologies improve, insurers are developing strategies around easily accessible external data sources. read more

 

Building a Narrative-Driven Security Model

Most organizations suffer from alert fatigue - they find themselves inundated with far too many alerts, each of which has too little context. read more The task for IT security leaders needs to evolve to a higher level where they think proactively and strategically. read more

 

How to Spot a Fake LinkedIn Profile in 60 Seconds

The LinkedIn social media platform is an important professional tool. It is also rife with fraud and deceit. read more

 

Young People's Concerns About Job Automation

It turns out many young Britons have no understanding at all of how automation could impact their career. read more

 

 

New monthly Directors Report coming soon: Contact us here for details

SUBSCRIBE TO THIS NEWSLETTER