A Remote Threat: The White House Drone Incident
A Remote Threat: The White House Drone Incident, , http://www.flyingpenguin.com/?p=20816, Last year I sauntered into a night-time drone meetup in San Francisco. It was sponsored by a high-powered...
View ArticleApplied Threat Intelligence: Building a TI Program
Applied Threat Intelligence: Building a TI Program, , https://securosis.com/blog/applied-threat-intelligence-building-a-ti-program, As we wrap up the Applied Threat Intelligence series, we’ve defined...
View ArticleThreat Intelligence: Reduce the Gap
Threat Intelligence: Reduce the Gap, , http://feedproxy.google.com/~r/tripwire-state-of-security/~3/lIyDc-Vq8eA/, Major cyber security incidents continue to hit the headlines. Security and privacy...
View ArticleAdvanced Threat Actor Linked to NSA Uses Spyware to Infect the Disk Drive...
Advanced Threat Actor Linked to NSA Uses Spyware to Infect the Disk Drive Firmware of Foreign Targets, , http://feedproxy.google.com/~r/tripwire-state-of-security/~3/iYv-sGfhiMw/, A security firm has...
View ArticleSecurity Slice: Exchanging Threat Exchanges
Security Slice: Exchanging Threat Exchanges, , http://feedproxy.google.com/~r/tripwire-state-of-security/~3/5iArECQt3Kc/, Facebook is the latest company to announce an cybersecurity threat sharing...
View ArticleTop 3 surprising results from the 2015 Vormetric Insider Threat Report
Top 3 surprising results from the 2015 Vormetric Insider Threat Report, , http://blog.vormetric.com/2015/01/30/top-3-surprising-results-from-the-2015-vormetric-insider-threat-report/, We had a couple...
View ArticleENISA, Threat Landscape 2014 Analysis
ENISA, Threat Landscape 2014 Analysis, , http://www.infosecurity.us/blog/2015/2/2/enisa-publishes-threat-landascape-2014-analysis, ENISA, the European Union Agency for Network and Information Security...
View ArticleApplied Threat Intelligence: Use Case #3, Preventative Controls
Applied Threat Intelligence: Use Case #3, Preventative Controls, , https://securosis.com/blog/applied-threat-intelligence-use-case-3-preventative-controls, Thus far as we’ve looked to apply threat...
View ArticleThe utterly crazy story of the death threat hacker (involves a cat)
The utterly crazy story of the death threat hacker (involves a cat), , http://www.welivesecurity.com/2015/02/04/crazy-death-threat-hacker/, How did a cat lead to a notorious death threat hacker finally...
View ArticleCat and mouse game is over for Japanese death threat hacker
Cat and mouse game is over for Japanese death threat hacker, , http://feedproxy.google.com/~r/nakedsecurity/~3/ONQe65EmlMA/, A Japanese programmer, who taunted police by leaving clues in a memory card...
View Article
More Pages to Explore .....