PART 2: Fix the Cyber Market Disfunction
In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes…
PART 1: Existential Cyber Threats and the Risk of a Destabilized World
The cyber landscape presents an existential risk to the West! In labeling the cyber threat existential, my underlying premise must be stated: without structural change, former NSA Director General Alexander’s…
Hunting Maturity
Photos from Africa that portray animals on the hunt for prey. The new cadre of cybersecurity professionals are gaining these skills. Why? Because with ISAOs they are learning to hunt…
Digital Memorial Tribute: Martin Zimmermann
By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to…
Botnet Terminator
Botnets are an insidious fact of the modern Internet. Botnets are groups of computers from all around the world that have been infected through some form of malware which, after…
Cybersecurity Intelligence Sharing: A Bill
H.R. 624 is currently being considered by Congress for enhancing Cybersecurity Intelligence Sharing. The bill passed the House April 18, 2013, and was referred to the Senate. What is happening…
Social Media Network Harvesting: Some considerations
Threat actors harvest email addresses, identification numbers, user name/password combinations, credit card information, health information and other personally identifiable information for nefarious purposes. This practice is what we are calling…
DFARS Regulations Pushing Small Firms to Upgrade
Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.
The Key to Success for the Cybersecurity Framework
This essay presents a short history on the development of information sharing frameworks, one feature of the recent Executive Order on cybersecurity (E.O. 13636). Comments on the proposed NIST Framework…
Digital Attack Map
Google Ideas, in collaboration with Arbor Networks, has released a new tool for monitoring Distributed Denial of Service (DDoS) worldwide attack patterns.