<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Life, liberty and the pursuit of happiness in a digital world

Cybersecurity

Life, liberty and the pursuit of happiness in a digital world

It’s almost impossible to tell where our “real” (i.e. kinetic) lives end and our cyber lives begin. The line has become blurred and is already affecting the “human experience” in many ways at work and at play, in art and in science and beyond. The promise of technology to change what it means to be human for the better is exhilarating and exciting.

How a US cyber attack against Russia could impact CISOs

CISO

How a US cyber attack against Russia could impact CISOs

CISOs in the U.S. should expect the Russian government to respond with an attack of its own if the Obama administration decides to launch a retaliatory cyber attack against the country for attempting to interfere with the upcoming presidential election.

How hackers could influence November's election without changing a vote

Nation-state Attack

How hackers could influence November's election without changing a vote

Last week the FBI warned state government to shore up the defenses around their voter registration databases. Hackers have been scanning them in an effort to find vulnerabilities to exploit, FBI Director James Comey told U.S. lawmakers last Wednesday.

Behavioral detection becomes critical as nation-state hacking capabilities go mainstream

Nation-state Attack

Behavioral detection becomes critical as nation-state hacking capabilities go mainstream

Sophisticated hacking tools that can penetrate even the most heavily defended organizations are no longer the exclusive property of nation-states. Nation-state hacking has become much more mainstream, meaning Russia, China and the U.S. are not the only entities capable of pulling off advanced attacks using complex hacking tools.

The company you keep: why even your business could be targeted by an APT

Advanced Persistent Threat

The company you keep: why even your business could be targeted by an APT

Major corporations with high-value assets aren’t the only organizations targeted by advanced persistent threats. While your company may not possess information coveted by cyber criminals, like nation-state secrets or credit-card account details on thousands of customers, it could be linked to organizations that do have this data.

Is Fancy Bear really behind the World Anti-Doping Agency and DNC hacks?

Nation-state Attack

Is Fancy Bear really behind the World Anti-Doping Agency and DNC hacks?

Russian hackers are in the news once again. This time the Fancy Bear hacking group supposedly hacked into the World Anti-Doping Agency and released medical information this week on U.S. Olympic athletes, including gymnast Simone Biles and tennis stars Venus and Serena Williams. That’s according to a statement from the World Anti-Doping Agency, which sets and oversees anti-doping policies for sports organizations across the world.

Nation-state Attack

Hack the vote: How attackers could meddle in November’s elections

Political action committees aren’t the only entities attempting to influence the upcoming U.S. presidential election.

Nation-state Attack

Lior Div in Network World: How attackers could meddle in November’s election

Recent news stories alleging that Russia is behind a series of attacks aimed at influencing November’s election raises questions on just exactly how hackers could meddle with voting. While infiltrating electronic voting machines and changing or deleting votes is a commonly discussed method, there are other techniques that don’t involve touching a ballot.

Why utility providers will benefit from the NSA's Cyber Mission Force

Nation-state Attack

Why utility providers will benefit from the NSA's Cyber Mission Force

Cyber operations are playing an increasingly greater role in modern warfare. To U.S. military officials, the battlefield is no longer limited to the land, sea and air. In this new defense paradigm, protecting and attacking computer networks are just as important to national security.

The challenge of offensive hacking: the NSA and zero days

Nation-state Attack

The challenge of offensive hacking: the NSA and zero days

Over the last few days, we’ve learned that a group calling itself the Shadow Brokers has obtained and released snippets of what appears to be top-secret malware used by the Equation Group, an elite hacking team thought to be associated with the National Security Agency, to hack its targets.