There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a […]

FBI Provides An Update On #SonyHack Investigation Including Some Tech Details On Attribution

The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It is true they have been […]

Most Violent Cyber Attack Noted To Date: 2008 Pipeline Explosion Caused By Remote Hacking

Reporting by Jordan Robertson and Michael Riley in Bloomberg is shedding new light on a destructive attack against an oil pipeline that caused a massive explosion in Refahiye Turkey in 2008. The event occurred six years ago, but information is just coming out indicating the cyber attack component of this event. Robertson and Riley’s reports […]

For Want of a Patch (& a Supply Chain)

For Want of a Patch For want of a patch the component was lost. For want of a component the stack was lost. For want of a stack the system was lost. For want of a system the message was lost. For want of a message the cyberbattle was lost. For want of a battle the enterprise was […]

Anonymous Identifies Israel as Next Target

Anonymous, the decentralized network of hacktivists that often targets organizations accused of rights abuses or hindering freedom, posted a video to YouTube last week condemning Israel’s actions on the Gaza Strip and threatening the Israeli government with a slew of upcoming cyber attacks. Accusing Israel of “violations of international law and crimes against humanity”, the video […]

Obama Administration Chose Cooperation over Counterattacks

Throughout 2012, Iran targeted United States banks and companies with a series of distributed denial-of-services cyber attacks. The attacks doubled and sometimes tripled the amount of traffic that the American websites were capable of handling. Many considered the attacks retaliation, revenge for the destruction wrought by Stuxnet on Iran’s nuclear program. The cyber attacks presented […]