We have written before about the importance of all of us recognizing that we are in a cyber conflict. The fact is that we are all targets. We all have to keep our wits about us. This includes tracking the cyber threat and best practices to mitigate the threat. A period of significantly enhanced vulnerability is during travel. It is especially important to maintain best … [Read more...] about OODA Produces A Traveling Executive’s Guide to Cybersecurity
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
Microsoft has admitted that its Outlook.com security breach was worse than the company initially revealed. The software maker started notifying some Outlook.com users late on Friday night that a hacker was able to access accounts for months earlier this year. Microsoft’s notification revealed that hackers could have viewed account email addresses, folder names, and subject … [Read more...] about Microsoft admits Outlook.com hackers were able to access emails
Security researcher John Page warns that Microsoft's Internet Explorer has a critical security flaw that allows hackers to spy on you and steal personal data from your PC. That warning may seem irrelevant to you since Internet Explorer was officially discontinued in 2015. It's now an archaic web browser, only in use by about 7% of Windows users. But if take into account the … [Read more...] about Warning: Internet Explorer Just Became A Silent But Serious Threat To Every Windows User
Facebook CEO Mark Zuckerberg gave access to sensitive user data to dozens of app developer friends, according to thousands of leaked documents. Zuckerberg reportedly used the data as a reward to third-party companies and developers who either had a favorable relationship with company executives or spent considerable amounts on ads. Companies were also incentivized to share … [Read more...] about Mark Zuckerberg shared private user data with Facebook ‘friends Leaked documents reveal
The first computer password was introduced for use at MIT in 1961. Of course, this isn’t human beings’ first dalliance with the idea of a password, but this isn’t a history lesson. What this means is that the pesky password is here to stay for a while. But a password is often the weakest link in a security chain. We both love and loathe our passwords, and our obsession and … [Read more...] about Lock It Down: Password Security Do’s and Don’ts