German Approach to Cyber-Security

News Article 20 Page Report Phi Beta Iota: The German approach differs substantially from that of the US in that it avoids offensive capabilities and the expense of vaporware and sock puppets; it recognizes the importance of cyber-security across all normal elements of government, not just the “national security” zone; it places a very high …

Event: 1-2 June London Cyber-Security Summit

Program as of March 2011 Phi Beta Iota: Those organizing, and those named as confirmed and invited, are the “creme de la creme” of the old regimes.   There isnt’ a hacker, autonomous internet, cloud, anonymous/transparency, open anything participant in the whole lot.  And the youth–by invitation only, as if the organizers have any legitimacy among …

Secrecy News Extract: JASONS on Cyber-Security

JASON:  SCIENCE OF CYBER SECURITY NEEDS MORE WORK “Cyber security is now critical to our survival but as a field of research [it] does not have a firm scientific basis,” according to the Department of Defense.  “Our current security approaches have had limited success and have become an arms race with our adversaries.  In order …

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don’t think this is it.  This is a simplistic approach, the sort of thing …

Journal: Cyber-Security Etc. & Multinational Engagement

As attacks increase, U.S. struggles to recruit computer security experts Hackers break Amazon’s Kindle DRM–The great ebook ‘unswindle’ Peace, Justice and the Lord’s Resistance Army Weapons-carrying plane headed for Sri Lanka Phi Beta Iota: It has finally come to pass.  Cyber-security–like the Black Plague before it–and of course the ten high-level threats to humanity so …

Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101

COVER STORY: The Cyberwar Plan  It’s not just a defensive game; cyber-security includes attack plans too, and the U.S. has already used some of them successfully. by Shane Harris Saturday, Nov. 14, 2009 14 tech firms form cybersecurity alliance for government Lockheed Martin, top suppliers launch initiative for government market By Wyatt Kash  Nov 12, …

Journal: Microsoft, Cyber-Security, Syllable, & Integrity

Silent Install Firefox Plugin Backfires on Microsoft posted by Kroc Camen    on Sat 17th Oct 2009 05:27 UTC Now a security hole has been found in a plugin that Microsoft have  been silently installing into Firefox.  Along with .NET Framework 3.5 SP1, Microsoft have been silently  installing a Windows Presentation Foundation Plugin that allows the …