Author Archives: conrad

Cybersecurity Vs. Privacy is changing our approach to cybersecurity

                  Ted Schlein of KPCB: “We are in midst of cybersecurity technology being completely re-made –  moving from a signature-based protection environment to a more behavioral anomaly-based protection environment.” Video interview by … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cybersecurity Vs. Privacy is changing our approach to cybersecurity

Cisco Systems Report: Shortage of over a million cybersecurity experts globally

A Cisco security report released on January 16th 2014 shows that hacker threats reached “startling levels” last year and that the world is suffering from a shortage of skilled computer defenders. Cracks in defenses and weapons for attacks rose to … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cisco Systems Report: Shortage of over a million cybersecurity experts globally

Large botnet traced back to hacked refrigerator

Call it the attack of the zombie refrigerators. Computer security researchers said this week they discovered a large “botnet” which infected Internet-connected home appliances and then delivered more than 750,000 malicious emails. The California security firm Proofpoint, Inc., said hackers … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Large botnet traced back to hacked refrigerator

Cybersecurity is for the C-suite, not just the IT crowd

“Ninety-seven percent of Fortune 500 companies have been hacked,” says Peter W. Singer, “and likely the other 3% have too, they just don’t know it.” Such is the less-than-rosy picture painted by Singer — director of the Center for 21st … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cybersecurity is for the C-suite, not just the IT crowd

Top cybersecurity threats for 2013

The top  cybersecurity threats in 2013 reportedly included hacktivists targeting users’ privacy at the top spot, followed by cyberespionage campaigns – along with the newest craze of stealing bitcoins. More from the Times of India by clicking here  

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Top cybersecurity threats for 2013

A cybersecurity framework for critical infrastructure

A cybersecurity framework for critical infrastructure owners will soon become a national standard for litigators and regulators. The framework is now in its final comment stage and will be released mid-February.  The National Institute of Standards and Testing (NIST) will establish this comprehensive set of … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on A cybersecurity framework for critical infrastructure

A clear-eyed guide to Android’s actual security risks

If you’re an Android user — or want to be — you’ve likely heard about all the security risks of Google’s mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on A clear-eyed guide to Android’s actual security risks

How (un-hackable!) Quantum Cryptology Works

By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys. Check it out at HowStuffWorks.com by clicking here.

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on How (un-hackable!) Quantum Cryptology Works

How a WWII intelligence pact between the U.S. and UK forged modern surveillance

Revelations show a transatlantic intelligence pact that started during the second world war is expanding beyond states’ ability to control it. There haven’t been too many moments of levity over the past four months for those intimately involved in the story of Edward … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on How a WWII intelligence pact between the U.S. and UK forged modern surveillance

Why we are losing the cyber security war and what we can do about it

If this year’s attacks on Adobe, LexisNexis, NASDAQ, US Airways, and dozens of other large and technologically sophisticated   US enterprises didn’t provide sufficient evidence that we are losing the cyber security war, the ongoing breaches by Anonymous   make it undeniable. … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Why we are losing the cyber security war and what we can do about it