The following are some of the cybersecurity related topics we wanted to bring to your attention: Russian company had access to Facebook user data through apps Facebook's woes continue! Facebook apps from Mail.Ru are being reviewed as part of Facebook's probe into user data misuse. Even after the huge public outcry for letting Chinese phone companies access sensitive user … [Read more...] about Facebook lets Mail.Ru access to sensitive user information, Macy’s mega data breach, Apple insider stole driverless car secrets, YouTube’s Incognito Mode
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
One of the great things about the DoDIIS Worldwide Conference (Aug 12-15 Omaha, Nebraska) is the expo floor. It is unlike any other tech conference. This one is filled with providers of great technology who know the importance of support to national security missions. The problem is that there are so many great solutions demonstrated at the conference that no single person can … [Read more...] about The Technology To See at the 2018 DoDIIS Worldwide Conference
We all know that technology alone will not stop the dynamically changing actors seeking to steal information. Proven best practices and a respect for the history of cyber conflict dictate a comprehensive approach. That said, cyberspace is a technological domain and choosing the right technology to enhance your defense is absolutely key. One of the big problems in selecting the … [Read more...] about The CTOvision Guide To The Cybersecurity Technology Marketplace
The following are a few of the cybersecurity stories we want to bring to your attention. It is not just a coincidence that Facebook figures into many of these stories, they wanted to be the biggest platform connecting people in the world and cybersecurity issues come with that territory. Addressing WhatsApp's Fake News problems After the recent spate of lynchings in India, … [Read more...] about Sometimes it seems every cybersecurity story is a Facebook story
Twitter adds support for login verification with a USB key Twitter has taken a step towards providing better security by adding support for login verification through physical USB security keys, such as YubiKey. Twitter said that the above exercise was a part of a two-factor authentication process and will protect Twitter accounts from being hacked. The new tool will allow … [Read more...] about Twitter adds USB key verification, Florida names first Crypto Officer, Comcast’s data breach, WPA3 is finally here and why rebranding cybersecurity is necessary