Cyber Defense

IT Security Industry Has a New Adversary

BIRMINGHAM - My coverage of the NSA's massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of the first to publish trepidation a day after the first Snowden report and again a week later. Recent events appear to validate my

By |2014-01-02T00:00:00-05:00January 2nd, 2014|Archive, Cyber Defense|

The Increasing Mobility Threat to IT Security

TENAFLY, N.J. - Any organization that has not already started to think about the impact mobility has on IT security should start doing so this year. 63% of businesses provide formal access to some of their business applications to mobile users, a Quocirca research report "Digital Identities and the Open Business," showed. Furthermore, the sheer

By |2014-01-02T00:00:00-05:00January 2nd, 2014|Archive, Cyber Defense|

US District Judge Dismisses ACLU Lawsuit Against NSA

WASHINGTON DC - A US district judge dismissed the American Civil Liberties Union's lawsuit against the government's top spy agency, ruling that bulk collection of telephony metadata by the NSA is lawful. In June, the ACLU filed suit to challenge the constitutionality of the National Security Agency's mass collection of phone records, arguing that the

By |2013-12-30T00:00:00-05:00December 30th, 2013|Archive, Cyber Defense|

2014 Year In Review – Privacy And Security

TENAFLY, N.J. - Wow, what a year 2014 has been. Most people write a "year in review" at the end of the year. We decided to beat the rush and issue our 2014 Privacy and Security year in review now. So, what a year! Some pretty interesting developments. In terms of politics, 2014 was the

By |2013-12-26T00:00:00-05:00December 26th, 2013|Archive, Cyber Defense|

Thermal Imaging Attacks; Research Heats Up!

TENAFLY, N.J. - We?ve all had or seen server room doors protected by combination locks. Most safes these days are protected by electronic keypads, like the ones used to safeguard on-site backup tapes. Using digital keypads, one?s fingers transfer a minute amount of heat to each key pressed. This heat can be read by thermal

By |2013-12-26T00:00:00-05:00December 26th, 2013|Archive, Cyber Defense|

IIA, ISACA Open Registration For Spring Security Conference

DEARBORN - The Detroit Chapters of the IIA and ISACA are co-sponsoring the 15th Annual Spring Conference scheduled for March 10-12, 2014 at The University of Michigan - Dearborn Fairlane Center North. WHEN - Monday, March 10, 2014 - Wednesday, March 12, 2014 WHERE - University of Michigan Fairlane Center North 19000 Hubbard, Dearborn, Michigan

By |2013-12-25T00:00:00-05:00December 25th, 2013|Archive, Cyber Defense|

FEC Network Hacked During October Government Shutdown

WASHINGTON DC - When the United States government was shut down back in October, all of the Federal Election Commission?s employees were furloughed. Chinese hackers reportedly took the opportunity to breach the agency?s computer systems. According to the Center for Public Integrity, the attack came shortly after an independent auditor warned that the FEC?s systems

By |2013-12-25T00:00:00-05:00December 25th, 2013|Archive, Cyber Defense|

Army Cyber Command To Be Consolidated Under One Commander For First Time

WASHINGTON DC - The United States Army announced that the Army Cyber Command Headquarters will be located at Fort Gordon, Ga., consolidating and coordinating Army cyber and network operations under one commander for the first time in its history. "Cyber threats are real, sophisticated, growing, and evolving," said ARCYBER's commanding general, Lt. Gen. Edward C.

By |2013-12-25T00:00:00-05:00December 25th, 2013|Archive, Cyber Defense|