CTOvision hardly ever calls for more regulation in the tech world. There are usually just too many unintended consequences when rules are applied by legislators who do not have a good grasp of technology. It is usually most prudent for legislators to move slowly and carefully consider a wide range of inputs before crafting new rules. But here is one that makes me want to stand … [Read more...] about Sometimes We Love The EU and Their Regulations: Tech Firms Face Prospect of Fines in Europe Over Terror Propaganda
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
Read Travis Greene's article explaining the new normal in cybersecurity on Forbes : Even the most insulated CXOs are certainly cognizant of the constant stream of news related to cyber attacks. News feeds are full of reports of IT security breaches, to the point where awareness is no longer an issue. My own mother mails me cybersecurity articles cut out from her local … [Read more...] about Explaining The ‘New Normal’ In Cybersecurity To The C-Suite
The average cost of a data breach has risen to $3.86 million, according to a new report from IBM. The latest version of its annual report shows a 6.6 percent increase in costs; including direct losses, indirect costs related to time and effort in dealing with a breach, and lost opportunities such as customer churn as result of bad publicity. “There is an expectation, because of … [Read more...] about What is the cost of a data breach?
A security researcher had found a flaw which allows potential hackers to spoof URLs in Safari and Edge while visiting a malicious link. However. even weeks after disclosure, while Microsoft has patched the flaw, Apple hasn't yet shown interest in patching it. The vulnerability is the result of what researcher Rafay Baloch describes as a race condition that would potentially … [Read more...] about Safari, Edge fans: Is that really the website you think you’re visiting? URL spoof bug blabbed
The British Airways data breach is proof that hackers are getting more and more sophisticated. It took only 22 lines of code for the hackers to break into user data of the UK's largest airline and steal data from up to 380,000 people. But the hackers behind British Airways' data breach, which took place from late August into early September, left behind a trail of evidence … [Read more...] about That British Airways breach shows hackers fine-tuning e-commerce attacks