Is the Cloud Really Safe?
With the rise of Apple’s iCloud and file-sharing solutions such as Dropbox and Sharepoint, it’s no surprise that SaaS and…
Back It Up! The Cloud’s Not As Safe As “They” Say
I recently ran across a blog by Matt Winer regarding his experience with cloud computing that I felt was really important to…
Michigan Cyber Initiative Reports ‘People’ as Weakest Link in IT Security
Not sure where I was last year, but I somehow missed the entire Michigan Cyber Initiative launched by the State…
Cyber Summit 2012: Big Data, Small Presentations and Rock and Roll
Last week Cyber Summit 2012: Leading the Way in the Age of Big Data took place in Banff (October 1-3). Last week Cyber…
Lessons From Our Cyber Past: History of Cyber Intelligence
By AlexOlesker By AlexOleskerOn Thursday, September 27, the Atlantic Council hosted a stand-out panel discussion on the history of all-source cyber…
Three Primary Analytics Lessons Learned from 9/11
Regarding the Al Qaeda terrorist attacks on 9/11, it’s distressing to learn there were plenty of chances to stop them. …
CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More
By AlexOleskerHere is today’s federal cybersecurity and information technology news: By AlexOleskerHere is today’s federal cybersecurity and information technology news:Homeland…
Cross Platform Vulnerabilities Aiding Attackers: Big data analytics are key for security practices and more.
Micro Microsoft’s Security team examined the problems with cross-platform vulnerabilitiesISF urges business to use Big Data Analytics for security purposes…
Tracking License Plates, Tracking Cellphones, and More
Here is today’s federal cybersecurity and information technology news:
Daedalus, a cyber-attack alert visualization system (incredible video)
Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides…

