CPNI has launched six short, animated films that convey key personnel security messages:
https://www.youtube.com/user/UKCPNI
Cyber security expert Eugene Kaspersky says cyber ‘hactivists’ the greatest threat at next year’s G20 Summit:
The Former CIA Officers, Analysts, and Intelligence Professionals Who You Should Be Following on Twitter:
Military strategies and tactics that may work in the physical world do not have a place in guiding “cyberwarfare”, and those that attempt to use them demonstrate a key lack of understanding:
http://www.zdnet.com/us-government-has-no-idea-how-to-wage-cyberwar-ranum-7000015840/
Iranian-backed hackers have escalated a campaign of cyberassaults against U.S. corporations by launching infiltration and surveillance missions against the computer networks running energy companies:
Using automated hacking tools, NSA cyberspies pilfer 2 petabytes of data every hour from computers worldwide……:
http://www.businessweek.com/articles/2013-05-23/how-the-u-dot-s-dot-government-hacks-the-world
The bad news is most IT security professionals haven’t developed the necessary skills to communicate effectively with non-technical executives:
http://www.darkreading.com/management/security-pros-fail-in-business-lingo/240155523
This paper will dig into the seedy underbelly of the phishing trade, starting with an explanation of how large-scale phishers operate:
https://securosis.com/assets/library/reports/Securosis_Email-basedThreatIntelligence_FINAL.pdf
Identify Back Doors in Firmware By Using Automatic StringAnalysis:
http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html
Malware Similarity and Clustering Made Easy:
http://www.slideshare.net/SilvioCesare/simseercom-malware-similarity-and-clustering-made-easy