Critical Infrastructure

Is Cyberespionage Against International Law?

The recent disclosure of a purported Russian cyber-espionage campaign that targeted NATO, the European Union, and Ukraine once again brings the issue of state sponsored cyber espionage to the forefront. Despite Henry Stimson’s view as Secretary of State the “Gentlemen don’t read...  [Read More]

Cyber Attack Recovery Planning is Important for All Businesses

Last week’s Yahoo intrusion has something in common with Viagra, penicillin, and Coca-Cola – all happened by accident. The end result was not what the instigator was looking for. At first, it was thought that the Yahoo intrusion was due to a...  [Read More]

Cyber Security versus Information Security

There are two paths of thought on the issue of Internet and ICT security at the international level. The traditional Western powers in the US, European Union, and Japan speak in terms of “cybersecurity,” the protection of data, networks, and individuals as...  [Read More]

International Efforts in Critical Infrastructure Cyber Security Protection

As result of President Obama’s Executive Order on steps to improve critical infrastructure cybersecurity, the National Institute on Standards (NIST) was tasked to develop a framework to improve U.S. critical infrastructure cybersecurity. Published in February 2012, the framework is the result of...  [Read More]

Health Care Breach Affects 4.5 Million Americans

The relentless assault by hackers on the cyber systems of the nation continues to escalate as news comes of yet another cyber breach that will affect millions of Americans. According to just-released information, Community Health Systems, which runs over 200 hospitals mainly...  [Read More]

Congress Takes Action on Cyber Bill

It’s a bit of a rarity these days when Congress is able to compromise on legislation. However, on July 28 the House passed H.R. 3693, a bill known as the National Cybersecurity and Critical Infrastructure Protection Act of 2014. Passed by a...  [Read More]

Who is Behind Your Firewall?

Having only a perimeter defense is a bad idea, but knowing who is inside your company’s network is a key component of a solid defensive approach to cyber-security. Over the years, your organization may have allowed access to suppliers, customers, partners and...  [Read More]

Bank takes the fight to Criminal Hackers

The Bank of England will be going to cyber war with cyber criminals soon. Yes, The Bank of England has decided to use cyber threat intelligence methodologies for predicting and deterring cyber criminals from intruding and stealing credentials and money from their...  [Read More]

Are You safe in the Cloud?

With individuals and companies now using cloud-based services for data backups, it is good to consider the risks involved. Even if a cloud-based backup company says your data is encrypted in transit and while it is stored, how is the backup company...  [Read More]

Cloud Computing As A Public Utility

Is Cloud Computing Raining On Cyber Security? Cloud Computing is one of the latest buzzwords to hit the IT world. In a world that is dominated by its buzzwords, Cloud technology is making a big enough splash that the concept is worth...  [Read More]