Cyber Security Intelligence

Twitter< Follow on Twitter>

Newsletter October #1 2015

This Newsletter reaches over 5,000  IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities. 

Cyber Peace? The U.S and China Reach an 'Understanding'

The two leaders agree that neither government will knowingly support the theft of corporate secrets.  read more  Meanwhile, Microsoft co-founder Bill Gates is one of many US tech leaders Chinese President Xi Jinping is meeting during his U.S. visit.  read more


Cyberspace: The New Frontier in Warfare

Modern attackers will destroy enemy sensors, communications & decision-making loops.  Opinion By Espen Barth Eide & Anja Kaspersen  read more  And the U.S. has been losing.  read more


State Proxies & Plausible Deniability: Challenging Conventional Wisdom

States use proxies to claim plausible deniability for their cyber attacks. Does this reduce their risk of retaliation? Opinion by Jamie Collier  read more


Snowden Wants Global Push to Expand Digital Privacy

NSA whistleblower speaks via video link at launch of 'Snowden Treaty', a global push for privacy protection in the wake of mass surveillance revelations. read more


GCHQ Has Spied on Every Web User, Ever…

Leaked documents reveal GCHQ's mass surveillance activities and Operation Karma Police - collecting the browsing habits of "every visible user on the Internet"  read more


UK's Surveillance Dragnet Legal Challenge

A challenge to UK surveillance legislation aims to discover the scope of illegal data sharing taking place between the NSA and GCHQ.  read more


Insiders Responsible for 43% of Data Breaches

Among companies experiencing data breaches, internal actors were responsible for 43% of data loss, half of which was intentional, half accidental.  read more


Cyber Liability Insurance's Data Problems

Security leaders need to understand their role in helping the insurance industry by providing greater transparency.  read more


The Differences Between Targeted Attacks and Advanced Persistent Threats

Very different and equally nasty, dealing with either calls for prudent strategy and dedication.  read more


8 Ways to Fend Off Spyware

Spyware, malware, phishing and, more recently, ransomware - the list of online threats can be confusing and daunting.  read more


Zeus and SpyEye Malware Group Arrests

Europol take down a cybercrime ring which infected tens of thousands of computers with Zeus and SpyEye malware and stole $millions.  read more


AT&T helped NSA Spy on Domestic Citizens

The relationship between AT&T and the NSA is said to be "highly collaborative," thanks to the company's "extreme willingness to help."  read more

UN Calls On Social Media to Act Against 'Misuse' by Extremists

A UN panel has called for Internet & social media companies to respond to the exploitation of their services by al-Qaida and other violent extremists. read more

New monthly Directors Report coming soon: Contact us here for details