Cyber Security Intelligence

Twitter< Follow on Twitter>


Newsletter October #1 2015

This Newsletter reaches over 5,000  IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities. 

Cyber Peace? The U.S and China Reach an 'Understanding'

The two leaders agree that neither government will knowingly support the theft of corporate secrets.  read more  Meanwhile, Microsoft co-founder Bill Gates is one of many US tech leaders Chinese President Xi Jinping is meeting during his U.S. visit.  read more

 

Cyberspace: The New Frontier in Warfare

Modern attackers will destroy enemy sensors, communications & decision-making loops.  Opinion By Espen Barth Eide & Anja Kaspersen  read more  And the U.S. has been losing.  read more

 

State Proxies & Plausible Deniability: Challenging Conventional Wisdom

States use proxies to claim plausible deniability for their cyber attacks. Does this reduce their risk of retaliation? Opinion by Jamie Collier  read more

 

Snowden Wants Global Push to Expand Digital Privacy

NSA whistleblower speaks via video link at launch of 'Snowden Treaty', a global push for privacy protection in the wake of mass surveillance revelations. read more

 

GCHQ Has Spied on Every Web User, Ever…

Leaked documents reveal GCHQ's mass surveillance activities and Operation Karma Police - collecting the browsing habits of "every visible user on the Internet"  read more

 

UK's Surveillance Dragnet Legal Challenge

A challenge to UK surveillance legislation aims to discover the scope of illegal data sharing taking place between the NSA and GCHQ.  read more

 

Insiders Responsible for 43% of Data Breaches

Among companies experiencing data breaches, internal actors were responsible for 43% of data loss, half of which was intentional, half accidental.  read more

 

Cyber Liability Insurance's Data Problems

Security leaders need to understand their role in helping the insurance industry by providing greater transparency.  read more

 

The Differences Between Targeted Attacks and Advanced Persistent Threats

Very different and equally nasty, dealing with either calls for prudent strategy and dedication.  read more

 

8 Ways to Fend Off Spyware

Spyware, malware, phishing and, more recently, ransomware - the list of online threats can be confusing and daunting.  read more

 

Zeus and SpyEye Malware Group Arrests

Europol take down a cybercrime ring which infected tens of thousands of computers with Zeus and SpyEye malware and stole $millions.  read more

 

AT&T helped NSA Spy on Domestic Citizens

The relationship between AT&T and the NSA is said to be "highly collaborative," thanks to the company's "extreme willingness to help."  read more

UN Calls On Social Media to Act Against 'Misuse' by Extremists

A UN panel has called for Internet & social media companies to respond to the exploitation of their services by al-Qaida and other violent extremists. read more


New monthly Directors Report coming soon: Contact us here for details

SUBSCRIBE TO THIS NEWSLETTER