Cyber warfare

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We…

12 years ago

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

12 years ago

Cyber security at large sporting events

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500…

12 years ago

The importance of security requirements in design of SCADA systems

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues…

12 years ago

ICS-CERT report, a worrying increase of cyber attacks

It's been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing…

12 years ago

A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with…

12 years ago

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…

12 years ago

Stratfor refunds clients.Concerns on subcontractors in the security chain

Last Christmas the Stratfor Global Intelligence was hacked by Anonymous who disclosed company website and also the full client list…

12 years ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

12 years ago

Cyber war, the strategic importance of the defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the…

12 years ago

This website uses cookies.