Watch out: Russia’s tactics will evolve | CEPA

By | 2017-10-17T10:32:18+00:00 October 17th, 2017|

The belated is merely annoying; all the people now fussing about Kremlin interference in last year’s U.S. presidential election seem to think this was the first instance of Russian political warfare. In fact, it was just the latest and most conspicuous. Hardened participants in the struggle for freedom and democracy in and around Russia should

Don’t Worry About KRACK – Lawfare

By | 2017-10-17T10:14:05+00:00 October 17th, 2017|

DayZero: Cybersecurity Law and Policy KRACK–the vulnerability in the WPA2 security protocol proven this morning–is an interesting and amusing vulnerability from a technical standpoint and a great lesson in how our computer security is “dancing madly on the lip of a volcano”. It demonstrates a sober lesson for cybersecurity policy, showing just how tough seemingly

Government security tokens hackable-Politico Morning Cybersecurity

By | 2017-10-17T10:12:34+00:00 October 17th, 2017|

From Politico Morning Cybersecurity The physical security tokens carried by senior government officials and industry executives can be hacked, according to blockbuster research revealed Monday. The software used to generate private cryptographic keys for the tokens' chips, which are manufactured by a company called Infineon, can be reverse-engineered, letting hackers "factor" - or identify - the keys and

CyberSecure My Business – Stay Safe Online SME Seminar Series

By | 2017-10-16T10:59:12+00:00 October 16th, 2017|

CyberSecure My Business is a comprehensive national program led by the National Cyber Security Alliance (NCSA) to help businesses of all sizes learn to be safer and more secure online and is housed on the staysafeonline.org website. As the cornerstone of the program, NCSA has translated the (NIST) Cybersecurity Framework into simpler language and incorporated