Six (More) Technical Reasons Why Undermining Encryption is a Bad Idea
Two weeks ago some of the biggest names in cryptography published a paper on the threats posed by intentionally weakened encryption. Titled
Two weeks ago some of the biggest names in cryptography published a paper on the threats posed by intentionally weakened encryption. Titled
Threat feeds in the industry are a valuable way to gather information regarding adversaries and their capabilities and infrastructure. Threa
The State of Security in Control Systems Today was a SANS survey conducted with 314 ICS community members and was released on June 25th. A f
The sharing of cyber threat data has garnered national level attention, and improved information sharing has been the objective of several p
An article released today in Sueddeutsche (the largest German national daily newspaper) by Hakan Tanriverdi revealed new information that fu
This is the beginning of a short blog series on the topic of cyber intelligence, its sub-disciplines, and its uses. As an Adjunct Lecturer a
In this edition we will cover more in depth what it means to be a cyber intelligence analyst in terms of understanding intelligence products
The topic of Intelligence Collection Operations sounds inherently military or government based in nature especially with the use of the word
In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were