Lessons From Our Cyber Past: History of Cyber Intelligence
By AlexOlesker By AlexOleskerOn Thursday, September 27, the Atlantic Council hosted a stand-out panel discussion on the history of all-source cyber…
Three Primary Analytics Lessons Learned from 9/11
Regarding the Al Qaeda terrorist attacks on 9/11, it’s distressing to learn there were plenty of chances to stop them. …
CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More
By AlexOleskerHere is today’s federal cybersecurity and information technology news: By AlexOleskerHere is today’s federal cybersecurity and information technology news:Homeland…
Cross Platform Vulnerabilities Aiding Attackers: Big data analytics are key for security practices and more.
Micro Microsoft’s Security team examined the problems with cross-platform vulnerabilitiesISF urges business to use Big Data Analytics for security purposes…
Tracking License Plates, Tracking Cellphones, and More
Here is today’s federal cybersecurity and information technology news:
Daedalus, a cyber-attack alert visualization system (incredible video)
Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides…
Top Financial Risks of Doing Business in the Cloud
Cloud computing definitely has upside as adopters can speed delivery of analytics, gain flexibility in deployments and costs, and transfer…
Hackers and Honeypots: Getting Things Done
It’s always been fashionable in the cybersecurity industry to throw up our hands and call cyber crime an intractable problem. We don’t…
FTC report puts Data Privacy in the spotlight.
From tweets to transactions, online activity produces huge volumes of data – and while businesses are primarily focused on how…
The Amazon Effect: Zuora, Citrix and the Acceleration of the Cloud Economy
When Amazon started making their infrastructure and IT processes available outside the company firewall in 2006 it was a tipping…