Editor's note: We learned of Craxel and saw this post on their site and asked Dave Enga for permission to publish it here for your reference. It seems that Craxel can provide a key part of a comprehensive strategy to protect information. This approach should fit well with other modern approaches, including a Software Defined Perimeter (SDP), to dramatically reduce risk. - … [Read more...] about Craxel’s Digital Trust Platform, Data Security and Your Identity
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
Every year the RSA conference brings together members of the cybersecurity community for a week of presentations, discussions, tech demos and socials. Concurrent with the event there is always a flurry of press releases. Many are designed to highlight a company’s product or service. Many, like the annoucement of the new Microsoft led coalition of tech firms, might be well … [Read more...] about Global Cyber Alliance Release: Perhaps the most important of the 2018 RSA Conference Season
Fing is a nice app that runs on your smartphone or tablet that will show you who else is on your network. It puts a nice interface on capabilities like Ping, Traceroute and many others and presents information in a way that is fast. You can find links to download the app at Fing.io, and I really recommend it to everyone who has a device. Next time you decide to join a public … [Read more...] about Fingbox: Giving you something you need now more than ever, awareness and control over your home network
It can be really hard for the government to share information with citizens and businesses, for many reasons. We all wish it was easier, but the fact is that complex rules and regulations and the need to operate with some degree of certainty combines with the need to protect sources and methods. Everyone in the community wants things to improve, but I know for a fact some of … [Read more...] about Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
This is the first in a series of blog posts examining a cloud-based enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a cloud-based model. The two dominant themes in enterprise architecture today is the desire to save money by utilizing cloud services and threat of state-sponsored cyberattacks. The goal of a Secure Enclave is to help … [Read more...] about Secure Enclaves: Foundation For The Cloud-Based Enterprise
Cognilytica is an AI focused analyst firm. They are known for their industry-leading market research and deep bench of knowledgeable experts on AI. They really know AI because they stay immersed in its implementation and adoption. Their analysts publish research reports, whitepapers and briefing notes for clients. They also provide insights via a weekly newsletter. We subscribe … [Read more...] about Cognilytica’s Weekly Newsletter on AI and Related Topics
For all the benefits IT in general and the Internet specifically have given us, it has also introduced significant risks to our well-being and way of life. Yet cybersecurity is still not a priority for a majority of people and organizations. No amount of warnings about the risks associated with poor cybersecurity have helped drive significant change. Neither have real-world … [Read more...] about Cyber War: The Fastest Way to Improve Cybersecurity?