May 2019

Israel’s military said yesterday that it neutralized a major cyberattack by Hamas, and subsequently destroyed the building in the Gaza Strip that housed the terrorist group’s cyber operatives. Israel’s use of physical force against Hamas cyberwarriors as the latter engaged in cyberattacks apparently marks a historical milestone – the first publicly-disclosed, real-time military response to […]

Updated May 30, 2019 15:48:24 Photo: Producers have been confronted with abuse on social media over their livestock practices. (ABC Rural: Jo Prendergast) Australian farmers and animal activists alike are being targeted in an online battlefield, with threats of violence and death delivered via popular social media platforms, an ABC investigation has found. Cyberhate expert […]

David Ignatius One of the least discussed but perhaps most consequential comments by special counsel Robert S. Mueller III during his appearance before reporters this week was his blunt counterintelligence assessment: “Russian intelligence officers, who are part of the Russian military, launched a concerted attack on our political system.” Here’s why this judgment is so […]

Only a few have gone through the extensive background checks needed to access Plum Island — where a secretive branch of the US government runs exercises to prepare for all-out cyber war. The speck of land in the Long Island Sound, owned by the Department of Homeland Security is largely deserted. The main attractions are […]

The escalating global threat of cyber attacks against nation-states took a turn yesterday when Israel’s military announced that they had “thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work.” The tweet included the highlighted image of the targeted building. “HamasCyberHQ.exe has […]

This column was originally published on Roger Waldron’s blog at The Coalition for Government Procurement and was republished here with permission from the author. Earlier this month, the General Services Administration, in consultation with the Office of Management and Budget, issued the Phase II Report related to the implementation of Section 846 of the fiscal year 2018 […]

“We have relied heavily on a unique blend of focused data science concepts, advanced machine-enabled collection, and intelligence subject matter expertise, always with an eye toward the usability of the intelligence that we present to our clients — be it government agencies, large corporations, or forward-leaning companies,” said Christopher Ahlberg, co-founder and CEO of Recorded […]

Moody’s recently announced a rating outlook downgrade for Equifax, linking the decision to spiraling costs from the massive 2017 data breach that topped $690 million last quarter and are anticipated to remain high as the company continues investing in cybersecurity infrastructure. In today’s modern cyber threat environment, the impacts of a fumbled incident response are […]

Cybersecurity is probably the most rapidly changing area of IT, and cyber-criminals are becoming increasingly more sophisticated in their bid to breach an organization’s security and steal their crown jewels – their information. Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized […]