What Might A Future Cyber-War Look Like?

We have entered the age of cyber war.   Believe it or not, cyber war operations are going on right now in many places across the globe.  Most of these operations are covert, and often hard to attribute directly to a particular nation-state or adversary.

Marc Cancian has written a gripping report titled Coping with Surprise in Great Power Conflicts.  It ...

Continue Reading →
3

US Cyber Command Changing the Rules of Engagement

The best defense is a good offense.  Especially if you are “defending forward.”  So what does that mean?

The US Cyber Command has a new leader.  Lt. Gen. Stephen G. Fogarty assumed command of U.S. Army Cyber Command on June 1, 2018.  His mission is to make Cyber Command more aggressive in its response to cyber-attacks on assets in the United States.  ...

Continue Reading →
0

Using DNS Proxies for Security

What if there was a simple change you could make to your computer’s network configuration that would go a long way to protecting you from picking up malware on the Internet.  This change could even protect you from accidentally clicking on malicious links in phishing emails.  What if this simple fix could keep malware already on your computer from “phoning home” to the ...

Continue Reading →
1

Sunday Funnies – A Day In The Life

What I say: I’m a computer support technician.

What people hear: I can resolve any tech issue you have or ever will have on any machine that exisits in the universe. I am an expert on every operating system and software application ever written.  I am jacked into the Matrix at all times. I am an IT god – ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

and

APTs Targeting IT Service Provider Customers

10/03/2018 10:56 AM EDT  Original release date: October 03, 2018

The National Cybersecurity and Communications Integration Center (NCCIC) has received multiple reports of advanced persistent threat (APT) actors actively exploiting trust relationships in ...

Continue Reading →
0

Exploit Targets Info Tech Support Companies

The holy grail of a cyber-attacker is the ability to achieve remote access to a computer on a network.  It is even better when the attacker can get administrator privileges.  Then they have the ability to do anything they need to do on the compromised computer to cross the network and compromise other computers and servers.  Who has this kind of access ...

Continue Reading →
0

National Cyber Security Awareness Month

This October, National Cybersecurity Awareness Month is commemorating its 15th year as an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online, while increasing the resiliency of the Nation during cyber-threats. DHS ...
Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Ten Tips for New Cybersecurity Pros (free PDF)

New to cybersecurity?  Building a successful cybersecurity career begins with taking good foundational steps. In this ebook, two InfoSec professionals share their advice for those just starting out.


Want a Great Job with the FBI?  Launch a Bot-Net

A la “Catch Me If You Can” Frank Abignale ...

Continue Reading →
0
Page 139 of 278 «...110120130137138139140141...»