July 31, 2012
Former White House Cybersecurity Coordinator Howard Schmidt offers his opinions on the issues surrounding the strengthening of the relationship between government and the private sector, as well as the urgent need for the passage of effective cybersecurity legislation...
May 07, 2012
Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...
March 30, 2012
"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."
March 03, 2012
According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...
October 30, 2011
"Criminals and nation-states have adopted traditional physical intelligence techniques for the cyber world. Jeff Bardin examines various CYBINT and OSINT methods, information mining of social networking sites and the tools in use for gathering information on targets of opportunity...
February 20, 2011
Anthony M. Freed interviews Richard Steinnon, author of the thought provoking book "Surviving Cyber War" (Government Institutes). He regularly contributes content to Infosec Island from his security blog ThreatChaos.com, and is the founder of IT-Harvest, an independent analyst firm that researches the 1,200 IT security vendors. He was previously Chief Marketing Officer for Fortinet, Inc. the leadi...
February 17, 2011
Anthony M. Freed interviews Larry Clinton, President of the ISA. As a result of his work at ISA, Larry is known as one of the most reliable sources on cyber security in Washington, D.C. He has been featured on CBS News, Fox News, CNN, C-SPAN, CNBC “Power Lunch” and CNBC, "Squawk on the Street"...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013